Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe

Overview

General Information

Sample name:SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe
Analysis ID:1430716
MD5:a96ef52e95bb72ff1cfb04a8fe9fd14c
SHA1:6f52dcd60eb5f373345791d6e2f745793f692315
SHA256:b47316ca08d8a0d5b9f7c1479612c74dbd2922251adca3552e9c5cdf2e785731
Tags:exe
Infos:

Detection

Score:36
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Snort IDS alert for network traffic
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:04/24/24-04:28:01.933308
SID:2043421
Source Port:49710
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\Jenkins\WorkSpace\workspace\Common_Downloader\Branches\InstallWithoutUninstall\release\Setup.pdb source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp

Networking

barindex
Source: TrafficSnort IDS: 2043421 ET MALWARE Tensorshare Google Analytics Checkin 192.168.2.5:49710 -> 142.251.2.100:80
Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
Source: unknownDNS query: name: ip-api.com
Source: global trafficHTTP traffic detected: GET /csv HTTP/1.1Accept: */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; MyIE2; .NET CLR 1.1.4322)Host: ip-api.comCache-Control: no-cache
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_00462620 libssh2_scp_recv,libssh2_session_last_errno,0_2_00462620
Source: global trafficHTTP traffic detected: GET /csv HTTP/1.1Accept: */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; MyIE2; .NET CLR 1.1.4322)Host: ip-api.comCache-Control: no-cache
Source: unknownDNS traffic detected: queries for: www.tenorshare.com
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2316041826.0000000005D55000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486545605.0000000005D55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://curl.haxx.se/docs/http-cookies.html#
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://dl.tenorshare.net/AnyDataRecovery_any_x64.exe
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://dl.tenorshare.net/AnyDataRecovery_net_x64.exe
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://dl.tenorshare.net/AnyDataRecovery_ts_x64.exe
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://download.wondershare.com/cbs_down/drfone_recover_full3366.exe
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004BF6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486149405.00000000051DD000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/csv
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://ocsp.digicert.com0
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://update.tenorshare.cn/download/checkCross?cross_end_id=%s
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://update.tenorshare.com/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://update.tenorshare.com/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s&package_type=2h
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2315698031.0000000005D7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486594205.0000000005D84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.google-analytics.com/collect
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.google-analytics.com/collect&av=&an=&el=&ea=&t=event&ec=&cid=v=1&tid=
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2315698031.0000000005D7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486594205.0000000005D84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.google-analytics.com/collectB570DC9;J
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2315698031.0000000005D7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486594205.0000000005D84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.google-analytics.com/collectB570DC9WJ
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2315698031.0000000005D7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486594205.0000000005D84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.google-analytics.com/collectct
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485257293.0000000000A49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tenorshare.com/downloads/service/softwarelog.txt
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.tenorshare.com/downloads/service/softwarelog.txthttp://ip-api.com/csvsuccess/QueryTools?L
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://analytics-test.afirstsoft.cn/collector
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://analytics-test.afirstsoft.cn/collectorurl:mac
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://analytics.afirstsoft.cn/collect
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://check.mobie.app
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485204905.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://check.mobie.appcloudd$L
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: https://download.any-data-recovery.com/downloads/extra/AnyDataRecovery_any_x64.exe
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485204905.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.tenorshare.com/down
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485204905.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.tenorshare.com/downad
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C9B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486454657.0000000005CD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exe
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2316041826.0000000005CD2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486454657.0000000005CD2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exe;
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exexD
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2022813160.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2022904676.0000000000A79000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2315512780.0000000000A8C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485286343.0000000000AAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exey
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: https://download.tenorshare.com/downloads/extra/AnyDataRecovery_ts_x64.exe
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: https://download.tenorshare.net/downloads/extra/AnyDataRecovery_net_x64.exe
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485204905.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.tenorshh
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://integrated.tenorshare.com/api/v1/ticket/feedback
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://integrated.tenorshare.com/api/v1/ticket/feedback&subject=&version=&log_id=&content=&useremai
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://product-alert.afirstsoft.cn/api/exception/send
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://product-alert.afirstsoft.cn/api/exception/sendpid=%d&type=2&exception_code=Hash_Check_Fail_C
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://update.tenorshare.cn/download/checkCross?cross_end_id=%s
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://update.tenorshare.cn/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://update.tenorshare.com/download/checkCross?cross_end_id=%s
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://update.tenorshare.com/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://update.tenorshare.com/queryDownloader?LanguageId=1033&SoftWareID=%d&SiteID=1%s
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2315698031.0000000005D7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486594205.0000000005D84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/g/collect
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004CAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/g/collect?v=2&_ss=1&_c=1&sid=1677653616&cid=1B2303A8ECF4BB570DC9
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/g/collect?v=2&_ss=1&_c=1&sid=1677653616&cid=1B2303A8ECF4BB570DC9&ti
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.google-analytics.com/g/collect?v=2&_ss=1&_c=1&sid=1677653616&cid=SoftDataReport
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tenorshare.com/
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tenorshare.com/downloads/service/softwarelog.txt
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tenorshare.com/downloads/service/softwarelog.txtnQ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_00474DE0 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00474DE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004FC7D00_2_004FC7D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005094D40_2_005094D4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005097B00_2_005097B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004F5FB80_2_004F5FB8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004FE0250_2_004FE025
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_0053C1500_2_0053C150
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005E21E00_2_005E21E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005F05F00_2_005F05F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004668200_2_00466820
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_00506AA30_2_00506AA3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_00432B500_2_00432B50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005FCCF00_2_005FCCF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_0050504E0_2_0050504E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005E301A0_2_005E301A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_006090CD0_2_006090CD
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004FB3DA0_2_004FB3DA
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004F145C0_2_004F145C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005E97DB0_2_005E97DB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004638700_2_00463870
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004679200_2_00467920
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005E9A0A0_2_005E9A0A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005E9C390_2_005E9C39
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004FBDCB0_2_004FBDCB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004F9E9E0_2_004F9E9E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: String function: 005CAC20 appears 35 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: String function: 0052A7A0 appears 40 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: String function: 005F7169 appears 55 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: String function: 0048BF00 appears 38 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: String function: 005CA540 appears 72 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: String function: 00465C70 appears 224 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: String function: 00555D20 appears 47 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: String function: 0053A000 appears 36 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: String function: 00485D60 appears 35 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: String function: 004A8EC0 appears 66 times
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus36.winEXE@1/1@3/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_00502C49 FindResourceW,LoadResource,FreeResource,SizeofResource,LockResource,FreeResource,0_2_00502C49
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeMutant created: \Sessions\1\BaseNamedObjects\AFS_Downloader_437
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeFile created: C:\Users\user\AppData\Local\Temp\4ddigdllfixer_4ddigJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: id-cmc-addExtensions
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: set-addPolicy
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: /AddUserLog?USER_ID=
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeString found in binary or memory: /AddRegLog?USER_ID=
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: sensapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: fwpolicyiomgr.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: msftedit.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: windows.globalization.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: globinputhost.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: dlnashext.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: wpdshext.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{304CE942-6E39-40D8-943A-B913C40C9CD4}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeFile opened: C:\Windows\SysWOW64\msftedit.dllJump to behavior
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeStatic file information: File size 2009360 > 1048576
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x1c2c00
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\Jenkins\WorkSpace\workspace\Common_Downloader\Branches\InstallWithoutUninstall\release\Setup.pdb source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004D61F0 LoadLibraryW,GetProcAddress,GetSystemInfo,GetVersionExW,GetSystemMetrics,GetSystemMetrics,0_2_004D61F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005CAC66 push ecx; ret 0_2_005CAC79
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_0045DDB0 push ecx; mov dword ptr [esp], ebx0_2_0045DDB1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005C9F6A push ecx; ret 0_2_005C9F7D
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeWindow / User API: threadDelayed 6733Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeWindow / User API: threadDelayed 3181Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-69201
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe TID: 3140Thread sleep time: -3366500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe TID: 3140Thread sleep time: -1590500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004D61F0 LoadLibraryW,GetProcAddress,GetSystemInfo,GetVersionExW,GetSystemMetrics,GetSystemMetrics,0_2_004D61F0
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C01000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
Source: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004CAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005E7470 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005E7470
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004D61F0 LoadLibraryW,GetProcAddress,GetSystemInfo,GetVersionExW,GetSystemMetrics,GetSystemMetrics,0_2_004D61F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005F9427 mov eax, dword ptr fs:[00000030h]0_2_005F9427
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005E7470 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005E7470
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005C9B35 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005C9B35
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004386C0 cpuid 0_2_004386C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00608149
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: EnumSystemLocalesW,0_2_005FF266
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: GetLocaleInfoW,0_2_005FF730
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00607811
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: EnumSystemLocalesW,0_2_00607AD4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: EnumSystemLocalesW,0_2_00607A89
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: EnumSystemLocalesW,0_2_00607B6F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00607F75
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_005C8160 GetLocalTime,_swprintf_s,0_2_005C8160
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_004D61F0 LoadLibraryW,GetProcAddress,GetSystemInfo,GetVersionExW,GetSystemMetrics,GetSystemMetrics,0_2_004D61F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exeCode function: 0_2_0045B4B0 libssh2_channel_forward_listen_ex,libssh2_session_last_errno,0_2_0045B4B0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
1
Input Capture
1
System Time Discovery
Remote Services1
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory1
Query Registry
Remote Desktop Protocol11
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)21
Obfuscated Files or Information
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Software Packing
NTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture12
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
Application Window Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
System Network Configuration Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem34
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe8%ReversingLabs
SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe4%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.mic0%URL Reputationsafe
https://download.tenorshh0%Avira URL Cloudsafe
https://analytics.afirstsoft.cn/collect0%Avira URL Cloudsafe
https://product-alert.afirstsoft.cn/api/exception/sendpid=%d&type=2&exception_code=Hash_Check_Fail_C0%Avira URL Cloudsafe
https://analytics-test.afirstsoft.cn/collector0%Avira URL Cloudsafe
https://update.tenorshare.cn/download/checkCross?cross_end_id=%s0%Avira URL Cloudsafe
https://product-alert.afirstsoft.cn/api/exception/send0%Avira URL Cloudsafe
https://analytics-test.afirstsoft.cn/collectorurl:mac0%Avira URL Cloudsafe
https://analytics-test.afirstsoft.cn/collector0%VirustotalBrowse
https://check.mobie.appcloudd$L0%Avira URL Cloudsafe
http://update.tenorshare.cn/download/checkCross?cross_end_id=%s0%Avira URL Cloudsafe
https://analytics.afirstsoft.cn/collect0%VirustotalBrowse
https://product-alert.afirstsoft.cn/api/exception/send0%VirustotalBrowse
https://check.mobie.app0%Avira URL Cloudsafe
https://analytics-test.afirstsoft.cn/collectorurl:mac0%VirustotalBrowse
https://update.tenorshare.cn/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s0%Avira URL Cloudsafe
https://product-alert.afirstsoft.cn/api/exception/sendpid=%d&type=2&exception_code=Hash_Check_Fail_C0%VirustotalBrowse
https://update.tenorshare.cn/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s0%VirustotalBrowse
https://update.tenorshare.cn/download/checkCross?cross_end_id=%s0%VirustotalBrowse
https://check.mobie.app0%VirustotalBrowse
http://update.tenorshare.cn/download/checkCross?cross_end_id=%s0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
ip-api.com
208.95.112.1
truefalse
    high
    www.tenorshare.com
    unknown
    unknownfalse
      high
      update.tenorshare.com
      unknown
      unknownfalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://ip-api.com/csvfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://dl.tenorshare.net/AnyDataRecovery_any_x64.exeSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exefalse
            high
            http://dl.tenorshare.net/AnyDataRecovery_net_x64.exeSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exefalse
              high
              https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exe;SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2316041826.0000000005CD2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486454657.0000000005CD2000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://download.wondershare.com/cbs_down/drfone_recover_full3366.exeSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exefalse
                  high
                  https://analytics.afirstsoft.cn/collectSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exeySecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2022813160.0000000000A4F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2022904676.0000000000A79000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2315512780.0000000000A8C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485286343.0000000000AAB000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://integrated.tenorshare.com/api/v1/ticket/feedbackSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                      high
                      http://curl.haxx.se/docs/http-cookies.html#SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exefalse
                        high
                        http://crl.micSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000003.2316041826.0000000005D55000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486545605.0000000005D55000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://download.tenorshhSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485204905.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://download.any-data-recovery.com/downloads/extra/AnyDataRecovery_any_x64.exeSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exefalse
                          high
                          https://download.tenorshare.com/downadSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485204905.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://www.tenorshare.com/downloads/service/softwarelog.txtSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://download.tenorshare.com/downSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485204905.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://product-alert.afirstsoft.cn/api/exception/sendpid=%d&type=2&exception_code=Hash_Check_Fail_CSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exexDSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C01000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://update.tenorshare.cn/download/checkCross?cross_end_id=%sSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.openssl.org/support/faq.htmlSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                    high
                                    http://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                      high
                                      https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exeSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C9B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4486454657.0000000005CD2000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://www.tenorshare.com/downloads/service/softwarelog.txtnQSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://integrated.tenorshare.com/api/v1/ticket/feedback&subject=&version=&log_id=&content=&useremaiSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                            high
                                            https://www.tenorshare.com/SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485724599.0000000004C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://download.tenorshare.net/downloads/extra/AnyDataRecovery_net_x64.exeSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exefalse
                                                high
                                                https://update.tenorshare.com/queryDownloader?LanguageId=1033&SoftWareID=%d&SiteID=1%sSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                  high
                                                  https://update.tenorshare.com/download/checkCross?cross_end_id=%sSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                    high
                                                    https://update.tenorshare.com/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%sSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                      high
                                                      https://analytics-test.afirstsoft.cn/collectorSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                      • 0%, Virustotal, Browse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://product-alert.afirstsoft.cn/api/exception/sendSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                      • 0%, Virustotal, Browse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.tenorshare.com/downloads/service/softwarelog.txtSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485257293.0000000000A49000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.tenorshare.com/downloads/service/softwarelog.txthttp://ip-api.com/csvsuccess/QueryTools?LSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                          high
                                                          http://update.tenorshare.com/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s&package_type=2hSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                            high
                                                            https://analytics-test.afirstsoft.cn/collectorurl:macSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                            • 0%, Virustotal, Browse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://check.mobie.appcloudd$LSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4485204905.0000000000A0E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            low
                                                            https://download.tenorshare.com/downloads/extra/AnyDataRecovery_ts_x64.exeSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exefalse
                                                              high
                                                              http://update.tenorshare.cn/download/checkCross?cross_end_id=%sSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                              • 0%, Virustotal, Browse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://check.mobie.appSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                              • 0%, Virustotal, Browse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://dl.tenorshare.net/AnyDataRecovery_ts_x64.exeSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exefalse
                                                                high
                                                                http://update.tenorshare.com/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%sSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                                  high
                                                                  https://update.tenorshare.cn/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%sSecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe, 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                                  • 0%, Virustotal, Browse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  208.95.112.1
                                                                  ip-api.comUnited States
                                                                  53334TUT-ASUSfalse
                                                                  Joe Sandbox version:40.0.0 Tourmaline
                                                                  Analysis ID:1430716
                                                                  Start date and time:2024-04-24 04:27:07 +02:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 8m 0s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:4
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe
                                                                  Detection:SUS
                                                                  Classification:sus36.winEXE@1/1@3/1
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:Failed
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                  • Excluded IPs from analysis (whitelisted): 104.17.192.141, 104.17.207.155, 104.18.24.249, 104.18.25.249, 142.251.2.100, 142.251.2.139, 142.251.2.102, 142.251.2.138, 142.251.2.113, 142.251.2.101
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, update.tenorshare.com.cdn.cloudflare.net, slscr.update.microsoft.com, www.tenorshare.com.cdn.cloudflare.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, www.google-analytics.com
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  TimeTypeDescription
                                                                  04:28:42API Interceptor13211944x Sleep call for process: SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  208.95.112.1explorer.exeGet hashmaliciousRedLine, XWormBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  X1.exeGet hashmaliciousXWormBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  Output.exeGet hashmaliciousRedLine, XWormBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  X2.exeGet hashmaliciousXWormBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  55HUe105hhh123333.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  PI88009454 007865EQ.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  Request for Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  Factura E24000319v00. SL.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  QUOTATION_APRQTRA031244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  Wire Transfer Payment Receipt#2024-22-04.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • ip-api.com/line/?fields=hosting
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  ip-api.comexplorer.exeGet hashmaliciousRedLine, XWormBrowse
                                                                  • 208.95.112.1
                                                                  X1.exeGet hashmaliciousXWormBrowse
                                                                  • 208.95.112.1
                                                                  Output.exeGet hashmaliciousRedLine, XWormBrowse
                                                                  • 208.95.112.1
                                                                  X2.exeGet hashmaliciousXWormBrowse
                                                                  • 208.95.112.1
                                                                  55HUe105hhh123333.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 208.95.112.1
                                                                  PI88009454 007865EQ.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 208.95.112.1
                                                                  file.exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                                                                  • 208.95.112.1
                                                                  Request for Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 208.95.112.1
                                                                  Factura E24000319v00. SL.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                  • 208.95.112.1
                                                                  QUOTATION_APRQTRA031244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                  • 208.95.112.1
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  TUT-ASUSexplorer.exeGet hashmaliciousRedLine, XWormBrowse
                                                                  • 208.95.112.1
                                                                  X1.exeGet hashmaliciousXWormBrowse
                                                                  • 208.95.112.1
                                                                  Output.exeGet hashmaliciousRedLine, XWormBrowse
                                                                  • 208.95.112.1
                                                                  X2.exeGet hashmaliciousXWormBrowse
                                                                  • 208.95.112.1
                                                                  55HUe105hhh123333.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 208.95.112.1
                                                                  PI88009454 007865EQ.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 208.95.112.1
                                                                  file.exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                                                                  • 208.95.112.1
                                                                  Request for Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 208.95.112.1
                                                                  Factura E24000319v00. SL.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                  • 208.95.112.1
                                                                  QUOTATION_APRQTRA031244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                  • 208.95.112.1
                                                                  No context
                                                                  No context
                                                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):546
                                                                  Entropy (8bit):5.181924274021568
                                                                  Encrypted:false
                                                                  SSDEEP:12:hVAykSh2KnVAy00GGfVAypy7YhLskkNZWr5TkNZWr5xqkN9rK37TrKxi:7wKVAGtH+3WdQ3WdxZTGrTGxi
                                                                  MD5:64E8CA1280736A6F04FC5B393FA53C77
                                                                  SHA1:DC26E81CCAF9E8B9FBDA68E07BA211910D2EFE5B
                                                                  SHA-256:19BE1A1E087AF046836CE6C28315E6187C3479477341FB347DDA73CAEEAF0514
                                                                  SHA-512:7DF0E2FC5EFD638BDDBE4DD3F90DAF301E8609C9FEE85371AD945091A50CD8094264C754EDF955F6E91A314242DB155815B5765FE35A53445BE21CA3543EFF40
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:2024-04-24 05:47:55,837--[Thread](3060) Downloader version: 2.7.11.0, 64Bit: True..2024-04-24 05:47:55,837--[Thread](3060) Screen: 1280*1024, 1..2024-04-24 05:47:55,837--[Thread](3060) Request For Product Config -- [Downloader Id]: 437 [Site Id]: 66 [Language Id]: 1033..2024-04-24 05:47:56,852--[Thread](5684) Verify CEI step1..2024-04-24 05:47:56,852--[Thread](5684) Verify CEI step4: 0..2024-04-24 05:47:56,852--[Thread](3436) GetDownloaderInfo(Async).....2024-04-24 05:47:58,493--[Thread](3436) GetDownloaderInfo(Async, com) return 0..
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                                  Entropy (8bit):7.832162940503418
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.66%
                                                                  • UPX compressed Win32 Executable (30571/9) 0.30%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe
                                                                  File size:2'009'360 bytes
                                                                  MD5:a96ef52e95bb72ff1cfb04a8fe9fd14c
                                                                  SHA1:6f52dcd60eb5f373345791d6e2f745793f692315
                                                                  SHA256:b47316ca08d8a0d5b9f7c1479612c74dbd2922251adca3552e9c5cdf2e785731
                                                                  SHA512:495c84e2920396ad2004eb60bf1b9dde95b69c21cc390eb5c1ef8a27fbf429740b510cb9e34799b614be033f70c8964c8e101449e73e7becc0f3624a006822b6
                                                                  SSDEEP:49152:F1Ohg9sIP9Kz+p9lnoSjbjlmTnFRMsK+j+lMFgWtjCu:F1arIg+zFoSjbj8LjMH+j+lghtjCu
                                                                  TLSH:B795E0C2686342F9C5A30FF6A83C5EA457551DCE19DC02316D537A1E9CF3AAA4B8F603
                                                                  File Content Preview:MZ......................@...................................P...........!..L.!This program cannot be run in DOS mode....$.......K.SJ.l=..l=..l=......l=......l=......l=......l=.42>..l=..28..l=..l=..l=......m=...9..l=...8.-l=......l=.428.ql=.429.(l=......l=
                                                                  Icon Hash:6187133b3b1f8671
                                                                  Entrypoint:0x7c57e0
                                                                  Entrypoint Section:UPX1
                                                                  Digitally signed:true
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x65A10D0D [Fri Jan 12 09:57:33 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:1
                                                                  File Version Major:5
                                                                  File Version Minor:1
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:1
                                                                  Import Hash:fe5fb373dbec3ba73ffb51335d1fc086
                                                                  Signature Valid:true
                                                                  Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                  Signature Validation Error:The operation completed successfully
                                                                  Error Number:0
                                                                  Not Before, Not After
                                                                  • 07/07/2021 02:00:00 12/07/2024 01:59:59
                                                                  Subject Chain
                                                                  • CN="Tenorshare Co., Ltd.", O="Tenorshare Co., Ltd.", L=Wan Chai, C=HK
                                                                  Version:3
                                                                  Thumbprint MD5:17F44DC1840AD7EC6484C284A5B3D3CE
                                                                  Thumbprint SHA-1:59FECDA87C479A14A82E3EF696F9E6A9002A3752
                                                                  Thumbprint SHA-256:EF4D9D322077E97381CFFEC61C1F7A70CDC7B16A87F85FCBCDCD2682737CFF2D
                                                                  Serial:0170C5D8E62ABAC7DB20918F8C95B7E8
                                                                  Instruction
                                                                  pushad
                                                                  mov esi, 00603000h
                                                                  lea edi, dword ptr [esi-00202000h]
                                                                  mov dword ptr [edi+002CD47Ch], 929B7F38h
                                                                  push edi
                                                                  jmp 00007FB050712B43h
                                                                  nop
                                                                  nop
                                                                  nop
                                                                  nop
                                                                  nop
                                                                  nop
                                                                  nop
                                                                  mov al, byte ptr [esi]
                                                                  inc esi
                                                                  mov byte ptr [edi], al
                                                                  inc edi
                                                                  add ebx, ebx
                                                                  jne 00007FB050712B39h
                                                                  mov ebx, dword ptr [esi]
                                                                  sub esi, FFFFFFFCh
                                                                  adc ebx, ebx
                                                                  jc 00007FB050712B1Fh
                                                                  mov eax, 00000001h
                                                                  add ebx, ebx
                                                                  jne 00007FB050712B39h
                                                                  mov ebx, dword ptr [esi]
                                                                  sub esi, FFFFFFFCh
                                                                  adc ebx, ebx
                                                                  adc eax, eax
                                                                  add ebx, ebx
                                                                  jnc 00007FB050712B3Dh
                                                                  jne 00007FB050712B5Ah
                                                                  mov ebx, dword ptr [esi]
                                                                  sub esi, FFFFFFFCh
                                                                  adc ebx, ebx
                                                                  jc 00007FB050712B51h
                                                                  dec eax
                                                                  add ebx, ebx
                                                                  jne 00007FB050712B39h
                                                                  mov ebx, dword ptr [esi]
                                                                  sub esi, FFFFFFFCh
                                                                  adc ebx, ebx
                                                                  adc eax, eax
                                                                  jmp 00007FB050712B06h
                                                                  add ebx, ebx
                                                                  jne 00007FB050712B39h
                                                                  mov ebx, dword ptr [esi]
                                                                  sub esi, FFFFFFFCh
                                                                  adc ebx, ebx
                                                                  adc ecx, ecx
                                                                  jmp 00007FB050712B84h
                                                                  xor ecx, ecx
                                                                  sub eax, 03h
                                                                  jc 00007FB050712B43h
                                                                  shl eax, 08h
                                                                  mov al, byte ptr [esi]
                                                                  inc esi
                                                                  xor eax, FFFFFFFFh
                                                                  je 00007FB050712BA7h
                                                                  sar eax, 1
                                                                  mov ebp, eax
                                                                  jmp 00007FB050712B3Dh
                                                                  add ebx, ebx
                                                                  jne 00007FB050712B39h
                                                                  mov ebx, dword ptr [esi]
                                                                  sub esi, FFFFFFFCh
                                                                  adc ebx, ebx
                                                                  jc 00007FB050712AFEh
                                                                  inc ecx
                                                                  add ebx, ebx
                                                                  jne 00007FB050712B39h
                                                                  mov ebx, dword ptr [esi]
                                                                  sub esi, FFFFFFFCh
                                                                  adc ebx, ebx
                                                                  jc 00007FB050712AF0h
                                                                  add ebx, ebx
                                                                  jne 00007FB050712B39h
                                                                  mov ebx, dword ptr [esi]
                                                                  sub esi, FFFFFFFCh
                                                                  adc ebx, ebx
                                                                  adc ecx, ecx
                                                                  add ebx, ebx
                                                                  jnc 00007FB050712B21h
                                                                  jne 00007FB050712B3Bh
                                                                  mov ebx, dword ptr [esi]
                                                                  sub esi, FFFFFFFCh
                                                                  adc ebx, ebx
                                                                  jnc 00007FB050712B16h
                                                                  add ecx, 02h
                                                                  cmp ebp, 00000000h
                                                                  Programming Language:
                                                                  • [ C ] VS2013 UPD5 build 40629
                                                                  • [C++] VS2008 SP1 build 30729
                                                                  • [ C ] VS2008 SP1 build 30729
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x2ba6400xfecUPX1
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x3e82040x46c.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c60000x22204.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x1e58000x5110UPX0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x3e86700x24.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x3c59d40x18UPX1
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3c59f40x5cUPX1
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  UPX00x10000x2020000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  UPX10x2030000x1c30000x1c2c00c351f9596f7e59432d1872d73f6507b2False0.9839828584303938data7.903737396672126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0x3c60000x230000x2280073864620870d94f9e582433995f9465eFalse0.1427833446557971data5.0042794144950005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  ZIPRES0x2d32800xa5a6adataChineseChina0.9738911667693433
                                                                  RT_ICON0x3c627c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 8504 x 8504 px/mChineseChina0.1044451673961907
                                                                  RT_ICON0x3d6aa80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 8504 x 8504 px/mChineseChina0.12528904771915073
                                                                  RT_ICON0x3dff540x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 8504 x 8504 px/mChineseChina0.17442135096835143
                                                                  RT_ICON0x3e41800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 8504 x 8504 px/mChineseChina0.2287344398340249
                                                                  RT_ICON0x3e672c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 8504 x 8504 px/mChineseChina0.3271575984990619
                                                                  RT_ICON0x3e77d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 8504 x 8504 px/mChineseChina0.5824468085106383
                                                                  RT_GROUP_ICON0x3e7c440x5adataChineseChina0.7777777777777778
                                                                  RT_VERSION0x3e7ca40x2d0dataChineseChina0.5166666666666667
                                                                  RT_MANIFEST0x3e7f780x28bXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5529953917050692
                                                                  DLLImport
                                                                  ADVAPI32.dllRegCloseKey
                                                                  COMCTL32.dll
                                                                  GDI32.dllSaveDC
                                                                  gdiplus.dllGdipFree
                                                                  IMM32.dllImmGetContext
                                                                  IPHLPAPI.DLLGetAdaptersInfo
                                                                  KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                                                                  ole32.dllCoCreateGuid
                                                                  OLEAUT32.dllVariantClear
                                                                  SensApi.dllIsNetworkAlive
                                                                  SHELL32.dllShellExecuteW
                                                                  SHLWAPI.dllPathFileExistsW
                                                                  USER32.dllGetDC
                                                                  VERSION.dllVerQueryValueW
                                                                  WINHTTP.dllWinHttpGetIEProxyConfigForCurrentUser
                                                                  WININET.dllInternetOpenA
                                                                  WINMM.dlltimeGetTime
                                                                  WINTRUST.dllWinVerifyTrust
                                                                  WLDAP32.dll
                                                                  WS2_32.dllWSACleanup
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  ChineseChina
                                                                  EnglishUnited States
                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                  04/24/24-04:28:01.933308TCP2043421ET MALWARE Tensorshare Google Analytics Checkin4971080192.168.2.5142.251.2.100
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Apr 24, 2024 04:27:59.615612984 CEST4970880192.168.2.5208.95.112.1
                                                                  Apr 24, 2024 04:27:59.775105953 CEST8049708208.95.112.1192.168.2.5
                                                                  Apr 24, 2024 04:27:59.775183916 CEST4970880192.168.2.5208.95.112.1
                                                                  Apr 24, 2024 04:27:59.775427103 CEST4970880192.168.2.5208.95.112.1
                                                                  Apr 24, 2024 04:27:59.935609102 CEST8049708208.95.112.1192.168.2.5
                                                                  Apr 24, 2024 04:27:59.935703993 CEST4970880192.168.2.5208.95.112.1
                                                                  Apr 24, 2024 04:28:34.684195042 CEST8049708208.95.112.1192.168.2.5
                                                                  Apr 24, 2024 04:28:34.684369087 CEST4970880192.168.2.5208.95.112.1
                                                                  Apr 24, 2024 04:28:48.658759117 CEST8049708208.95.112.1192.168.2.5
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Apr 24, 2024 04:27:57.799346924 CEST5597053192.168.2.51.1.1.1
                                                                  Apr 24, 2024 04:27:58.686635971 CEST5514953192.168.2.51.1.1.1
                                                                  Apr 24, 2024 04:27:59.460575104 CEST5094753192.168.2.51.1.1.1
                                                                  Apr 24, 2024 04:27:59.614844084 CEST53509471.1.1.1192.168.2.5
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Apr 24, 2024 04:27:57.799346924 CEST192.168.2.51.1.1.10x95b9Standard query (0)www.tenorshare.comA (IP address)IN (0x0001)false
                                                                  Apr 24, 2024 04:27:58.686635971 CEST192.168.2.51.1.1.10x1819Standard query (0)update.tenorshare.comA (IP address)IN (0x0001)false
                                                                  Apr 24, 2024 04:27:59.460575104 CEST192.168.2.51.1.1.10xa294Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Apr 24, 2024 04:27:58.213491917 CEST1.1.1.1192.168.2.50x95b9No error (0)www.tenorshare.comwww.tenorshare.com.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                                                                  Apr 24, 2024 04:27:58.904994011 CEST1.1.1.1192.168.2.50x1819No error (0)update.tenorshare.comupdate.tenorshare.com.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                                                                  Apr 24, 2024 04:27:59.614844084 CEST1.1.1.1192.168.2.50xa294No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                  • ip-api.com
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.549708208.95.112.1803572C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Apr 24, 2024 04:27:59.775427103 CEST223OUTGET /csv HTTP/1.1
                                                                  Accept: */*
                                                                  Accept-Language: zh-cn
                                                                  Accept-Encoding: gzip, deflate
                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; MyIE2; .NET CLR 1.1.4322)
                                                                  Host: ip-api.com
                                                                  Cache-Control: no-cache
                                                                  Apr 24, 2024 04:27:59.935609102 CEST309INHTTP/1.1 200 OK
                                                                  Date: Wed, 24 Apr 2024 02:27:59 GMT
                                                                  Content-Type: text/plain; charset=utf-8
                                                                  Content-Length: 138
                                                                  Access-Control-Allow-Origin: *
                                                                  X-Ttl: 60
                                                                  X-Rl: 44
                                                                  Data Raw: 73 75 63 63 65 73 73 2c 55 6e 69 74 65 64 20 53 74 61 74 65 73 2c 55 53 2c 4e 56 2c 4e 65 76 61 64 61 2c 4c 61 73 20 56 65 67 61 73 2c 38 39 31 30 31 2c 33 36 2e 31 36 38 35 2c 2d 31 31 35 2e 31 31 36 34 2c 41 6d 65 72 69 63 61 2f 4c 6f 73 5f 41 6e 67 65 6c 65 73 2c 41 53 31 37 34 2c 2c 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 2c 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 0a
                                                                  Data Ascii: success,United States,US,NV,Nevada,Las Vegas,89101,36.1685,-115.1164,America/Los_Angeles,AS174,,AS174 Cogent Communications,154.16.105.36


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Target ID:0
                                                                  Start time:04:27:55
                                                                  Start date:24/04/2024
                                                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe"
                                                                  Imagebase:0x400000
                                                                  File size:2'009'360 bytes
                                                                  MD5 hash:A96EF52E95BB72FF1CFB04A8FE9FD14C
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:7.3%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:3.4%
                                                                    Total number of Nodes:2000
                                                                    Total number of Limit Nodes:103
                                                                    execution_graph 67541 465a40 67542 465a4b __except_handler4 67541->67542 67571 54ba60 67542->67571 67544 465a56 67545 465a5f 67544->67545 67596 529590 64 API calls 67544->67596 67547 465a7f 67548 465a8b 67547->67548 67597 555500 68 API calls 67547->67597 67598 522ee0 64 API calls 67548->67598 67551 465a98 67599 54dd20 91 API calls 2 library calls 67551->67599 67553 465aa7 67600 522fa0 63 API calls 67553->67600 67555 465aaf 67556 465ab6 67555->67556 67557 465ad4 67555->67557 67558 465b30 67555->67558 67560 465afd 67557->67560 67561 465ad9 67557->67561 67604 4658c0 64 API calls 67558->67604 67602 465980 64 API calls 67560->67602 67601 521930 64 API calls 67561->67601 67563 465b50 67605 521930 64 API calls 67563->67605 67564 465b1d 67603 521930 64 API calls 67564->67603 67567 465b5b 67569 465b28 67570 465af5 67606 54bb50 67571->67606 67573 54ba70 67574 54baf8 67573->67574 67575 54ba79 GetLastError 67573->67575 67643 523280 64 API calls 67574->67643 67639 527f70 64 API calls 67575->67639 67578 54bb02 67580 54bb19 67578->67580 67581 54bb0b 67578->67581 67579 54ba93 67640 5275c0 64 API calls 67579->67640 67645 522ee0 64 API calls 67580->67645 67644 5e7e28 67 API calls 2 library calls 67581->67644 67584 54baae 67586 5eb479 _memcpy_s 20 API calls 67584->67586 67585 54bb11 67585->67544 67588 54bab6 67586->67588 67590 54badb 67588->67590 67591 54babb 67588->67591 67589 54bb2c 67589->67544 67642 527f70 64 API calls 67590->67642 67641 527f70 64 API calls 67591->67641 67594 54bad3 67594->67544 67595 54baf0 67595->67544 67596->67547 67597->67548 67598->67551 67599->67553 67600->67555 67601->67570 67602->67564 67603->67569 67604->67563 67605->67567 67607 54bb5d __wsopen_s 67606->67607 67608 54bb7f MultiByteToWideChar 67607->67608 67609 54bba7 GetLastError 67608->67609 67610 54bc05 ___crtLCMapStringA 67608->67610 67611 54bbb6 MultiByteToWideChar 67609->67611 67612 54bbd8 GetLastError 67609->67612 67615 54bc10 MultiByteToWideChar 67610->67615 67611->67610 67611->67612 67613 54bbe5 67612->67613 67614 54bcb6 67612->67614 67617 5ec2cc 29 API calls 67613->67617 67616 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67614->67616 67615->67614 67618 54bc33 MultiByteToWideChar 67615->67618 67619 54bcc8 67616->67619 67620 54bbee 67617->67620 67618->67614 67623 54bc59 67618->67623 67619->67573 67622 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67620->67622 67624 54bc01 67622->67624 67646 5ec2aa 67623->67646 67624->67573 67627 54bca0 67628 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67627->67628 67630 54bcb2 67628->67630 67629 5eb479 _memcpy_s 20 API calls 67631 54bc73 67629->67631 67630->67573 67632 54bc82 67631->67632 67633 5eb479 _memcpy_s 20 API calls 67631->67633 67634 5ec2cc 29 API calls 67632->67634 67635 54bc7d 67633->67635 67636 54bc89 67634->67636 67635->67627 67635->67632 67637 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67636->67637 67638 54bc9c 67637->67638 67638->67573 67639->67579 67640->67584 67641->67594 67642->67595 67643->67578 67644->67585 67645->67589 67649 5ec1de 67646->67649 67648 54bc65 67648->67627 67648->67629 67650 5ec1ea _Ungetc 67649->67650 67651 5ec1f8 67650->67651 67654 5ec228 67650->67654 67652 5eb479 _memcpy_s 20 API calls 67651->67652 67653 5ec1fd 67652->67653 67674 5e763a 26 API calls _memcpy_s 67653->67674 67656 5ec22d 67654->67656 67657 5ec23a 67654->67657 67658 5eb479 _memcpy_s 20 API calls 67656->67658 67659 600bd3 23 API calls 67657->67659 67664 5ec208 _Ungetc 67658->67664 67660 5ec243 67659->67660 67661 5ec249 67660->67661 67662 5ec256 67660->67662 67665 5eb479 _memcpy_s 20 API calls 67661->67665 67668 6023c1 67662->67668 67664->67648 67665->67664 67669 602331 67668->67669 67676 5f1930 67669->67676 67672 5ec269 67675 5ec288 RtlLeaveCriticalSection _Ungetc 67672->67675 67674->67664 67675->67664 67677 5f1961 std::_Locinfo::_Locinfo_dtor 67676->67677 67684 5f1aaa 67677->67684 67691 6023d7 40 API calls _memcpy_s 67677->67691 67678 5eb479 _memcpy_s 20 API calls 67679 5f1b60 67678->67679 67694 5e763a 26 API calls _memcpy_s 67679->67694 67681 5f1ab5 67681->67672 67688 5f92db 67681->67688 67683 5f1afe 67683->67684 67692 6023d7 40 API calls _memcpy_s 67683->67692 67684->67678 67684->67681 67686 5f1b1d 67686->67684 67693 6023d7 40 API calls _memcpy_s 67686->67693 67695 5f894f 67688->67695 67690 5f92f6 67690->67672 67691->67683 67692->67686 67693->67684 67694->67681 67697 5f895b _Ungetc 67695->67697 67696 5f8969 67698 5eb479 _memcpy_s 20 API calls 67696->67698 67697->67696 67700 5f89a2 67697->67700 67699 5f896e 67698->67699 67753 5e763a 26 API calls _memcpy_s 67699->67753 67706 5f8fb2 67700->67706 67705 5f8978 _Ungetc 67705->67690 67755 5f8cfd 67706->67755 67709 5f8ffd 67773 5f262e 67709->67773 67710 5f8fe4 67787 5eb466 20 API calls _Atexit 67710->67787 67713 5f9002 67715 5f900b 67713->67715 67716 5f9022 67713->67716 67714 5f8fe9 67717 5eb479 _memcpy_s 20 API calls 67714->67717 67788 5eb466 20 API calls _Atexit 67715->67788 67786 5f8c68 CreateFileW 67716->67786 67744 5f89c6 67717->67744 67720 5f9010 67721 5eb479 _memcpy_s 20 API calls 67720->67721 67721->67714 67722 5f90d8 GetFileType 67723 5f912a 67722->67723 67724 5f90e3 GetLastError 67722->67724 67792 5f2577 21 API calls 3 library calls 67723->67792 67791 5eb443 20 API calls 3 library calls 67724->67791 67725 5f90ad GetLastError 67790 5eb443 20 API calls 3 library calls 67725->67790 67728 5f905b 67728->67722 67728->67725 67789 5f8c68 CreateFileW 67728->67789 67730 5f90f1 CloseHandle 67730->67714 67733 5f911a 67730->67733 67731 5f90a0 67731->67722 67731->67725 67735 5eb479 _memcpy_s 20 API calls 67733->67735 67734 5f914b 67739 5f9197 67734->67739 67793 5f8e79 72 API calls 4 library calls 67734->67793 67736 5f911f 67735->67736 67736->67714 67741 5f91c4 67739->67741 67794 5f8a1b 72 API calls 4 library calls 67739->67794 67740 5f91bd 67740->67741 67742 5f91d5 67740->67742 67795 5fe4c7 29 API calls 2 library calls 67741->67795 67742->67744 67745 5f9253 CloseHandle 67742->67745 67754 5f89ef RtlLeaveCriticalSection __wsopen_s 67744->67754 67796 5f8c68 CreateFileW 67745->67796 67747 5f927e 67748 5f9288 GetLastError 67747->67748 67752 5f91cd 67747->67752 67797 5eb443 20 API calls 3 library calls 67748->67797 67750 5f9294 67798 5f2740 21 API calls 3 library calls 67750->67798 67752->67744 67753->67705 67754->67705 67756 5f8d1e 67755->67756 67761 5f8d38 67755->67761 67758 5eb479 _memcpy_s 20 API calls 67756->67758 67756->67761 67759 5f8d2d 67758->67759 67806 5e763a 26 API calls _memcpy_s 67759->67806 67799 5f8c8d 67761->67799 67762 5f8d9f 67771 5f8df2 67762->67771 67808 5f96f0 26 API calls _memcpy_s 67762->67808 67763 5f8d70 67763->67762 67765 5eb479 _memcpy_s 20 API calls 67763->67765 67767 5f8d94 67765->67767 67766 5f8ded 67768 5f8e6c 67766->67768 67766->67771 67807 5e763a 26 API calls _memcpy_s 67767->67807 67809 5e7667 11 API calls _Atexit 67768->67809 67771->67709 67771->67710 67772 5f8e78 67774 5f263a _Ungetc 67773->67774 67810 5f61f6 RtlEnterCriticalSection 67774->67810 67777 5f2641 67778 5f2666 67777->67778 67781 5f26d4 RtlEnterCriticalSection 67777->67781 67783 5f2688 67777->67783 67814 5f240d 21 API calls 3 library calls 67778->67814 67779 5f26b1 _Ungetc 67779->67713 67781->67783 67784 5f26e1 RtlLeaveCriticalSection 67781->67784 67782 5f266b 67782->67783 67815 5f2554 RtlEnterCriticalSection 67782->67815 67811 5f2737 67783->67811 67784->67777 67786->67728 67787->67714 67788->67720 67789->67731 67790->67714 67791->67730 67792->67734 67793->67739 67794->67740 67795->67752 67796->67747 67797->67750 67798->67752 67801 5f8ca5 67799->67801 67800 5f8cc0 67800->67763 67801->67800 67802 5eb479 _memcpy_s 20 API calls 67801->67802 67803 5f8ce4 67802->67803 67804 5e763a _memcpy_s 26 API calls 67803->67804 67805 5f8cef 67804->67805 67805->67763 67806->67761 67807->67762 67808->67766 67809->67772 67810->67777 67812 5f623e std::_Lockit::~_Lockit RtlLeaveCriticalSection 67811->67812 67813 5f273e 67812->67813 67813->67779 67814->67782 67815->67783 68506 405670 68507 405680 68506->68507 68513 4057e7 __except_handler4 68506->68513 68514 40a770 69 API calls 68507->68514 68509 405687 68512 4056ab 68509->68512 68523 40a1f0 89 API calls 68509->68523 68515 40e540 68512->68515 68514->68509 68517 40e553 68515->68517 68521 40e599 68515->68521 68516 40e562 68529 40e1b0 77 API calls 68516->68529 68517->68516 68524 40e4c0 68517->68524 68520 40e583 68520->68521 68530 40c580 68 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68520->68530 68521->68513 68523->68512 68526 40e4d0 68524->68526 68528 40e51e 68524->68528 68526->68528 68531 40e310 68526->68531 68545 40c580 68 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68526->68545 68528->68516 68529->68520 68530->68521 68537 40e32b 68531->68537 68532 40e479 68532->68526 68534 40e3e2 68534->68526 68536 40e37d 68536->68532 68540 40e3c4 68536->68540 68543 40e3ed 68536->68543 68537->68534 68537->68536 68537->68540 68546 432170 68537->68546 68538 5ec2cc 29 API calls 68538->68536 68539 40e462 68539->68532 68551 5e7e28 67 API calls 2 library calls 68539->68551 68540->68534 68549 5e7e28 67 API calls 2 library calls 68540->68549 68543->68539 68550 40d3e0 74 API calls 5 library calls 68543->68550 68545->68526 68552 5f9973 68546->68552 68548 40e376 68548->68536 68548->68538 68549->68534 68550->68543 68551->68532 68553 5f99a3 68552->68553 68554 5f9981 68552->68554 68563 5f99bb 46 API calls 3 library calls 68553->68563 68554->68553 68556 5f9986 68554->68556 68558 5eb479 _memcpy_s 20 API calls 68556->68558 68557 5f99b6 68557->68548 68559 5f998b 68558->68559 68562 5e763a 26 API calls _memcpy_s 68559->68562 68561 5f9996 68561->68548 68562->68561 68563->68557 67307 412000 67308 412026 67307->67308 67313 41204a 67307->67313 67310 51ec90 129 API calls 67308->67310 67312 412040 67310->67312 67368 411ff0 64 API calls 67312->67368 67316 4120b7 67313->67316 67318 41207d 67313->67318 67327 51ea50 67313->67327 67333 51e9d0 67313->67333 67339 51eb60 67313->67339 67371 5c950e 67316->67371 67345 51ebc0 libssh2_trace_sethandler 67318->67345 67319 4120c9 67321 41208b 67322 4120a8 67321->67322 67349 51ec90 67321->67349 67322->67316 67370 40c580 68 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 67322->67370 67325 41209e 67369 411ff0 64 API calls 67325->67369 67328 51ea59 67327->67328 67330 51ea7d 67327->67330 67378 539710 64 API calls 67328->67378 67330->67313 67331 51ea5f 67331->67330 67379 539720 64 API calls 67331->67379 67334 51e9d9 67333->67334 67337 51e9fd __wsopen_s 67333->67337 67380 539710 64 API calls 67334->67380 67336 51e9df 67336->67337 67381 539720 64 API calls 67336->67381 67337->67313 67340 51eb69 67339->67340 67342 51eb8d 67339->67342 67382 539710 64 API calls 67340->67382 67342->67313 67343 51eb6f 67343->67342 67383 539720 64 API calls 67343->67383 67346 51ec18 libssh2_trace_sethandler 67345->67346 67347 51ebd1 67345->67347 67348 51ec00 67346->67348 67347->67346 67347->67347 67347->67348 67348->67321 67350 51eca0 __wsopen_s 67349->67350 67351 51ecbe 67350->67351 67384 5f5b94 67350->67384 67352 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67351->67352 67354 51ecd1 67352->67354 67354->67325 67355 51ece0 __wsopen_s 67355->67351 67356 51e9d0 64 API calls 67355->67356 67357 51ed05 67356->67357 67357->67351 67358 51ed0f 67357->67358 67397 5ec2cc 67358->67397 67360 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67361 51edb3 67360->67361 67361->67325 67363 51ed81 67401 5e7e28 67 API calls 2 library calls 67363->67401 67365 51ed8a 67365->67360 67366 51ed1a __wsopen_s 67366->67363 67366->67365 67367 51e9d0 64 API calls 67366->67367 67400 5f6105 40 API calls __fread_nolock 67366->67400 67367->67366 67368->67313 67369->67322 67370->67316 67372 5c9519 IsProcessorFeaturePresent 67371->67372 67373 5c9517 67371->67373 67375 5c9b71 67372->67375 67373->67319 67540 5c9b35 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 67375->67540 67377 5c9c54 67377->67319 67378->67331 67379->67330 67380->67336 67381->67337 67382->67343 67383->67342 67385 5f5bb1 67384->67385 67386 5f5ba1 67384->67386 67402 6021bb 67385->67402 67387 5f4ee5 61 API calls 67386->67387 67396 5f5bab 67387->67396 67390 5f5bc7 67453 5f64be 67390->67453 67391 5f5bd5 67426 5f4ee5 67391->67426 67395 5f64be _free 20 API calls 67395->67396 67396->67355 67483 5ec11d 67397->67483 67399 5ec2de 67399->67366 67400->67366 67401->67365 67403 6021c7 67402->67403 67404 6021de 67402->67404 67459 5eb479 67403->67459 67406 6021e6 67404->67406 67407 6021fd 67404->67407 67409 5eb479 _memcpy_s 20 API calls 67406->67409 67464 5ff443 10 API calls 2 library calls 67407->67464 67412 6021eb 67409->67412 67463 5e763a 26 API calls _memcpy_s 67412->67463 67413 602204 MultiByteToWideChar 67414 602233 67413->67414 67415 602223 GetLastError 67413->67415 67466 5f6a05 67414->67466 67465 5eb443 20 API calls 3 library calls 67415->67465 67419 5f5bc1 67419->67390 67419->67391 67421 602242 MultiByteToWideChar 67422 602257 GetLastError 67421->67422 67425 602263 67421->67425 67473 5eb443 20 API calls 3 library calls 67422->67473 67423 5f64be _free 20 API calls 67423->67419 67425->67423 67427 5f4ef5 67426->67427 67428 5f4f14 67426->67428 67476 5eb466 20 API calls _Atexit 67427->67476 67430 5f4f4a std::_Locinfo::_Locinfo_dtor 67428->67430 67431 5f4f31 67428->67431 67436 5f4f5b 67430->67436 67437 5f4f71 CreateFileW 67430->67437 67478 5eb466 20 API calls _Atexit 67431->67478 67432 5f4efa 67434 5eb479 _memcpy_s 20 API calls 67432->67434 67438 5f4f01 67434->67438 67435 5f4f36 67439 5eb479 _memcpy_s 20 API calls 67435->67439 67440 5eb479 _memcpy_s 20 API calls 67436->67440 67442 5f4fa5 67437->67442 67443 5f4f95 67437->67443 67477 5e763a 26 API calls _memcpy_s 67438->67477 67444 5f4f3d 67439->67444 67445 5f4f60 67440->67445 67482 5f50e9 52 API calls __dosmaperr 67442->67482 67481 5f51f6 49 API calls 3 library calls 67443->67481 67479 5e763a 26 API calls _memcpy_s 67444->67479 67480 5eb466 20 API calls _Atexit 67445->67480 67449 5f4fa0 67451 5f4f0c 67449->67451 67452 5f4fd2 CloseHandle 67449->67452 67451->67395 67452->67451 67454 5f64c9 RtlFreeHeap 67453->67454 67455 5f64f2 _free 67453->67455 67454->67455 67456 5f64de 67454->67456 67455->67396 67457 5eb479 _memcpy_s 18 API calls 67456->67457 67458 5f64e4 GetLastError 67457->67458 67458->67455 67474 5fedca 20 API calls 3 library calls 67459->67474 67461 5eb47e 67462 5e763a 26 API calls _memcpy_s 67461->67462 67462->67419 67463->67419 67464->67413 67465->67419 67467 5f6a43 67466->67467 67472 5f6a13 __Getctype 67466->67472 67469 5eb479 _memcpy_s 20 API calls 67467->67469 67468 5f6a2e RtlAllocateHeap 67470 5f6a41 67468->67470 67468->67472 67469->67470 67470->67421 67470->67425 67472->67467 67472->67468 67475 5fb510 7 API calls 2 library calls 67472->67475 67473->67425 67474->67461 67475->67472 67476->67432 67477->67451 67478->67435 67479->67451 67480->67451 67481->67449 67482->67449 67486 5ec129 _Ungetc 67483->67486 67484 5ec137 67485 5eb479 _memcpy_s 20 API calls 67484->67485 67487 5ec13c 67485->67487 67486->67484 67488 5ec164 67486->67488 67508 5e763a 26 API calls _memcpy_s 67487->67508 67490 5ec169 67488->67490 67491 5ec176 67488->67491 67492 5eb479 _memcpy_s 20 API calls 67490->67492 67500 600bd3 67491->67500 67494 5ec147 _Ungetc 67492->67494 67494->67399 67495 5ec17f 67496 5ec186 67495->67496 67497 5ec193 67495->67497 67498 5eb479 _memcpy_s 20 API calls 67496->67498 67509 5ec1c7 RtlLeaveCriticalSection _Ungetc 67497->67509 67498->67494 67501 600bdf _Ungetc 67500->67501 67510 5f61f6 RtlEnterCriticalSection 67501->67510 67503 600bed 67511 600c6d 67503->67511 67507 600c1e _Ungetc 67507->67495 67508->67494 67509->67494 67510->67503 67520 600c90 67511->67520 67512 600ce9 67529 5f6461 67512->67529 67516 5f64be _free 20 API calls 67517 600cfb 67516->67517 67519 600bfa 67517->67519 67536 5ff857 11 API calls 2 library calls 67517->67536 67524 600c29 67519->67524 67520->67512 67520->67519 67527 5eb11e RtlEnterCriticalSection 67520->67527 67528 5eb132 RtlLeaveCriticalSection 67520->67528 67521 600d1a 67537 5eb11e RtlEnterCriticalSection 67521->67537 67539 5f623e RtlLeaveCriticalSection 67524->67539 67526 600c30 67526->67507 67527->67520 67528->67520 67534 5f646e __Getctype 67529->67534 67530 5f6499 RtlAllocateHeap 67532 5f64ac 67530->67532 67530->67534 67531 5f64ae 67533 5eb479 _memcpy_s 19 API calls 67531->67533 67532->67516 67533->67532 67534->67530 67534->67531 67538 5fb510 7 API calls 2 library calls 67534->67538 67536->67521 67537->67519 67538->67534 67539->67526 67540->67377 68710 486c10 68776 4d7a40 GetModuleHandleW GetProcAddress 68710->68776 68712 486c46 char_traits 68779 4da5f0 68712->68779 68715 486c7c 68901 47e710 68715->68901 68716 486ce0 68717 486d2e 68716->68717 68722 486d8f 68716->68722 68720 47e710 _fwprintf 50 API calls 68717->68720 68719 486cd8 68787 48bf00 68719->68787 68720->68719 68725 47e710 _fwprintf 50 API calls 68722->68725 68724 5c97b8 new 12 API calls 68726 486e0c 68724->68726 68725->68719 68793 4868f0 68726->68793 68728 486e24 68796 485e40 68728->68796 68735 49bb80 79 API calls 68736 486ef0 68735->68736 68823 485de0 68736->68823 68742 486f71 68743 485e40 138 API calls 68742->68743 68744 48703d 68743->68744 68745 49bb80 79 API calls 68744->68745 68746 487047 68745->68746 68747 49bbe0 79 API calls 68746->68747 68748 48704e 68747->68748 68749 49bb80 79 API calls 68748->68749 68750 487055 68749->68750 68882 49bc40 68750->68882 68753 49bb80 79 API calls 68754 487063 68753->68754 68886 49bc70 68754->68886 68757 485de0 138 API calls 68758 487079 char_traits 68757->68758 68890 49bca0 50 API calls 2 library calls 68758->68890 68760 4870ae 68891 4dc890 68760->68891 68764 4870f0 ISource 68765 4872b0 68764->68765 68768 48718c 68764->68768 68766 48bcd0 std::system_error::system_error 26 API calls 68765->68766 68767 4872a8 68766->68767 68769 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68767->68769 68906 48b660 68768->68906 68771 4872e7 68769->68771 68772 4871b5 std::_Cnd_initX _strncpy std::_Container_base12::~_Container_base12 char_traits 68773 48bcd0 std::system_error::system_error 26 API calls 68772->68773 68774 487296 68773->68774 68775 48bcd0 std::system_error::system_error 26 API calls 68774->68775 68775->68767 68777 4d7a6d GetCurrentProcess 68776->68777 68778 4d7a7b 68776->68778 68777->68778 68778->68712 68780 4da61f char_traits 68779->68780 68781 4da67c GetModuleFileNameW 68780->68781 68910 5f5e92 68781->68910 68784 4da6fd 68785 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68784->68785 68786 486c75 68785->68786 68786->68715 68786->68716 68788 48bf2e _Error_objects 68787->68788 68789 490960 std::system_error::system_error 26 API calls 68788->68789 68790 48bf41 68789->68790 68941 491000 68790->68941 68945 401110 68793->68945 68795 4868fc 68795->68728 68797 485e77 Concurrency::details::ExternalContextBase::~ExternalContextBase 68796->68797 68798 485f25 68797->68798 68803 485e89 _fwprintf 68797->68803 68799 48bf00 std::system_error::system_error 31 API calls 68798->68799 68800 485f31 68799->68800 68981 485f90 138 API calls 5 library calls 68800->68981 68802 485f02 68979 48b120 27 API calls std::system_error::system_error 68802->68979 68803->68802 68806 48bf00 std::system_error::system_error 31 API calls 68803->68806 68812 48bcd0 std::system_error::system_error 26 API calls 68803->68812 68978 48b1d0 31 API calls 4 library calls 68803->68978 68804 485f51 68807 48bcd0 std::system_error::system_error 26 API calls 68804->68807 68806->68803 68809 485f23 68807->68809 68808 485f1a 68980 485f90 138 API calls 5 library calls 68808->68980 68813 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68809->68813 68812->68803 68814 485f8a 68813->68814 68815 49bb80 68814->68815 68816 486ee2 68815->68816 68817 49bb92 68815->68817 68819 49bbe0 68816->68819 68982 485bc0 79 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 68817->68982 68820 486ee9 68819->68820 68821 49bbf2 68819->68821 68820->68735 68983 485bc0 79 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 68821->68983 68984 486280 68823->68984 68828 4b0e90 68829 48cf20 90 API calls 68828->68829 68830 4b0ecd 68829->68830 68831 4b0fe7 68830->68831 68832 4b0fb6 68830->68832 69369 401350 132 API calls 68831->69369 68833 4b0fca 68832->68833 69367 4af890 138 API calls 68832->69367 69368 480ab0 26 API calls std::bad_exception::~bad_exception 68833->69368 68837 4b0ff2 68839 48ce80 31 API calls 68837->68839 68838 4b0fe2 68841 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68838->68841 68840 4b1007 68839->68840 68842 48bd20 construct 31 API calls 68840->68842 68843 486f26 GetTickCount 68841->68843 68844 4b1016 68842->68844 68850 5ca3a1 68843->68850 68845 48bcd0 std::system_error::system_error 26 API calls 68844->68845 68846 4b101e 68845->68846 68847 4b1038 68846->68847 69370 4af890 138 API calls 68846->69370 69371 480ab0 26 API calls std::bad_exception::~bad_exception 68847->69371 68851 5ca3cc 68850->68851 68852 5ca34b 68851->68852 68854 5ca3f2 68851->68854 68855 5ca203 68851->68855 69375 5ca35d 21 API calls __floor_pentium4 68852->69375 68858 5ca429 68854->68858 68859 5ca413 68854->68859 68875 5ca427 68854->68875 68856 5ca220 68855->68856 69372 5ca35d 21 API calls __floor_pentium4 68855->69372 68856->68852 68869 5ca23c 68856->68869 68857 5ca355 68857->68742 69378 5ca35d 21 API calls __floor_pentium4 68858->69378 69376 5ca35d 21 API calls __floor_pentium4 68859->69376 68862 5ca44b 68876 5ca289 68862->68876 69380 5ca35d 21 API calls __floor_pentium4 68862->69380 68863 5ca472 68867 5ca4ad 68863->68867 69382 5ca35d 21 API calls __floor_pentium4 68863->69382 68865 5ca41d 69377 5ca35d 21 API calls __floor_pentium4 68865->69377 68866 5ca33d 68866->68742 68867->68852 68867->68876 68868 5ca433 69379 5ca35d 21 API calls __floor_pentium4 68868->69379 68869->68876 68879 5ca277 68869->68879 68874 5ca463 69381 5ca35d 21 API calls __floor_pentium4 68874->69381 68875->68862 68875->68863 68876->68866 69374 5ca35d 21 API calls __floor_pentium4 68876->69374 69373 5ca35d 21 API calls __floor_pentium4 68879->69373 68881 5ca281 68881->68742 68883 48705c 68882->68883 68884 49bc52 68882->68884 68883->68753 69383 485c60 80 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 68884->69383 68887 48706a 68886->68887 68888 49bc82 68886->68888 68887->68757 69384 49dd40 116 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 68888->69384 68890->68760 68892 4dc8c8 68891->68892 68893 4870e9 68891->68893 69385 5c9a28 68892->69385 68905 4dc930 58 API calls 68893->68905 68902 47e71b _fwprintf 68901->68902 69392 47e680 68902->69392 68905->68764 68907 48b67c 68906->68907 69424 491450 68907->69424 68913 5f5c5f 68910->68913 68914 5f5e36 68913->68914 68915 5f5c76 68913->68915 68916 5eb479 _memcpy_s 20 API calls 68914->68916 68915->68914 68919 5f5ce1 68915->68919 68917 5f5e46 68916->68917 68940 5e763a 26 API calls _memcpy_s 68917->68940 68920 5f5d06 68919->68920 68927 5f5d2e 68919->68927 68935 5fe7cb 26 API calls _memcpy_s 68919->68935 68924 5eb479 _memcpy_s 20 API calls 68920->68924 68922 5f5e03 68922->68920 68925 4da6bf wsprintfW GetFileAttributesW 68922->68925 68928 5f5e16 68922->68928 68923 5f5db8 68923->68920 68926 5f5dd8 68923->68926 68937 5fe7cb 26 API calls _memcpy_s 68923->68937 68924->68925 68925->68784 68926->68920 68926->68925 68931 5f5df1 68926->68931 68927->68920 68934 5f5d9a 68927->68934 68936 5fe7cb 26 API calls _memcpy_s 68927->68936 68939 5fe7cb 26 API calls _memcpy_s 68928->68939 68938 5fe7cb 26 API calls _memcpy_s 68931->68938 68934->68922 68934->68923 68935->68927 68936->68934 68937->68926 68938->68925 68939->68925 68940->68925 68942 491010 std::_System_error::_System_error 68941->68942 68943 491030 std::system_error::system_error 31 API calls 68942->68943 68944 486dfe 68943->68944 68944->68724 68946 40111a 68945->68946 68947 401121 68945->68947 68952 401070 68946->68952 68951 401128 68947->68951 68962 403800 68947->68962 68950 401135 68950->68795 68951->68795 68953 401081 68952->68953 68954 401084 68952->68954 68953->68947 68955 4010c5 68954->68955 68977 4023b0 75 API calls 68954->68977 68957 4010d7 libssh2_trace_sethandler 68955->68957 68959 4010ed 68955->68959 68968 401000 WSAStartup 68955->68968 68958 4010e0 libssh2_init 68957->68958 68957->68959 68958->68959 68959->68947 68961 4010d3 68961->68957 68961->68959 68967 5f6461 20 API calls 68962->68967 68963 40380f 68964 403820 libssh2_trace_sethandler 68963->68964 68965 40381a 68963->68965 68966 403841 __except_handler4 68964->68966 68965->68950 68966->68950 68967->68963 68969 401052 68968->68969 68970 401027 68968->68970 68972 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68969->68972 68971 40104c WSACleanup 68970->68971 68973 401035 68970->68973 68971->68969 68974 401065 68972->68974 68975 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68973->68975 68974->68961 68976 401045 68975->68976 68976->68961 68977->68955 68978->68803 68979->68808 68980->68809 68981->68804 68982->68816 68983->68820 68985 4862bb Concurrency::details::ExternalContextBase::~ExternalContextBase 68984->68985 68986 4862cd 68985->68986 68987 486441 68985->68987 69081 48bfe0 68986->69081 68989 48644c 68987->68989 68990 486456 68987->68990 69015 4864d0 68989->69015 68992 48643f 68990->68992 68993 48bf00 std::system_error::system_error 31 API calls 68990->68993 68994 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68992->68994 68995 48646c 68993->68995 68996 485e17 68994->68996 69101 48ce60 31 API calls 68995->69101 69012 48b190 68996->69012 68997 48bf00 std::system_error::system_error 31 API calls 69010 4862d9 68997->69010 68999 486489 69002 48bcd0 std::system_error::system_error 26 API calls 68999->69002 69000 4864d0 138 API calls 69000->69010 69002->68992 69006 486430 69008 48bcd0 std::system_error::system_error 26 API calls 69006->69008 69008->68992 69010->68997 69010->69000 69010->69006 69011 48bcd0 26 API calls std::system_error::system_error 69010->69011 69085 49aaa0 79 API calls 4 library calls 69010->69085 69086 48ce80 69010->69086 69089 48bd20 69010->69089 69098 48ce60 31 API calls 69010->69098 69099 48b120 27 API calls std::system_error::system_error 69010->69099 69100 485f90 138 API calls 5 library calls 69010->69100 69011->69010 69359 48f990 69012->69359 69014 485e22 GetTickCount 69014->68828 69016 486513 69015->69016 69017 486616 69015->69017 69018 48bf00 std::system_error::system_error 31 API calls 69016->69018 69021 48bf00 std::system_error::system_error 31 API calls 69017->69021 69034 48665e Concurrency::details::ExternalContextBase::~ExternalContextBase 69017->69034 69020 486525 69018->69020 69019 48686f 69022 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 69019->69022 69023 48bf00 std::system_error::system_error 31 API calls 69020->69023 69024 48662f 69021->69024 69025 48688e 69022->69025 69026 48653e 69023->69026 69128 48ce60 31 API calls 69024->69128 69025->68992 69102 4855d0 69026->69102 69031 48664f 69033 48bcd0 std::system_error::system_error 26 API calls 69031->69033 69032 4865bc 69113 485780 69032->69113 69033->69034 69034->69019 69037 485e40 138 API calls 69034->69037 69039 486738 69037->69039 69042 49bb80 79 API calls 69039->69042 69040 4865ec 69127 4859f0 26 API calls std::system_error::system_error 69040->69127 69044 486742 69042->69044 69043 4865fb 69045 48bcd0 std::system_error::system_error 26 API calls 69043->69045 69046 49bbe0 79 API calls 69044->69046 69047 486607 69045->69047 69048 486749 69046->69048 69050 48bcd0 std::system_error::system_error 26 API calls 69047->69050 69049 49bb80 79 API calls 69048->69049 69051 486750 69049->69051 69050->69017 69129 49bc10 116 API calls 69051->69129 69053 486757 69054 49bb80 79 API calls 69053->69054 69055 48675e 69054->69055 69056 485de0 138 API calls 69055->69056 69057 486770 69056->69057 69130 48cf20 69057->69130 69061 4867e4 69137 49a570 79 API calls 4 library calls 69061->69137 69063 4867ed 69138 49a570 79 API calls 4 library calls 69063->69138 69065 4867f6 69139 48dad0 116 API calls 3 library calls 69065->69139 69067 486800 69140 49a570 79 API calls 4 library calls 69067->69140 69069 486806 69141 49a570 79 API calls 4 library calls 69069->69141 69071 48680f 69142 49a570 79 API calls 4 library calls 69071->69142 69073 486818 69074 48ce80 31 API calls 69073->69074 69075 48682a 69074->69075 69143 480aa0 38 API calls _abort 69075->69143 69077 48684e 69078 48bcd0 std::system_error::system_error 26 API calls 69077->69078 69079 48685d 69078->69079 69082 48c00e _Error_objects 69081->69082 69083 490960 std::system_error::system_error 26 API calls 69082->69083 69084 48c01a 69083->69084 69084->69010 69085->69010 69332 491ba0 69086->69332 69090 48bd54 69089->69090 69097 48bde2 69089->69097 69091 490960 std::system_error::system_error 26 API calls 69090->69091 69092 48bd60 construct Concurrency::details::ContextBase::GetWorkQueueIdentity operator!= 69091->69092 69093 48bde4 construct 69092->69093 69095 48bdbc std::_Cnd_initX 69092->69095 69094 491390 construct 26 API calls 69093->69094 69094->69097 69358 49be90 31 API calls 2 library calls 69095->69358 69097->69010 69098->69010 69099->69010 69100->69010 69101->68999 69145 48c030 69102->69145 69105 48c030 std::_System_error::_System_error 31 API calls 69106 48562e 69105->69106 69107 48ce80 31 API calls 69106->69107 69108 48565a 69107->69108 69109 485730 69108->69109 69110 48573f std::_Mutex_base::_Mutex_base construct 69109->69110 69151 485970 69110->69151 69112 48575f construct 69112->69032 69116 4857b5 Concurrency::details::ExternalContextBase::~ExternalContextBase 69113->69116 69114 4857cf 69115 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 69114->69115 69117 485968 69115->69117 69116->69114 69158 48b400 69116->69158 69126 4868d0 26 API calls 69117->69126 69119 4857f7 Concurrency::details::ExternalContextBase::~ExternalContextBase std::_Cnd_initX 69125 485852 Concurrency::details::ExternalContextBase::~ExternalContextBase std::_Cnd_initX std::_Mutex_base::~_Mutex_base Concurrency::details::HardwareAffinity::operator!= 69119->69125 69164 4848b0 126 API calls 2 library calls 69119->69164 69121 485944 69166 48b3c0 34 API calls std::_Mutex_base::~_Mutex_base 69121->69166 69125->69121 69161 49bb50 69125->69161 69165 484a70 26 API calls 2 library calls 69125->69165 69126->69040 69127->69043 69128->69031 69129->69053 69131 48cf55 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 69130->69131 69204 491da0 69131->69204 69136 49a570 79 API calls 4 library calls 69136->69061 69137->69063 69138->69065 69139->69067 69140->69069 69141->69071 69142->69073 69143->69077 69146 48c069 std::_System_error::_System_error Concurrency::details::ContextBase::GetWorkQueueIdentity 69145->69146 69147 490960 std::system_error::system_error 26 API calls 69146->69147 69148 48c08c 69147->69148 69149 4910b0 std::_System_error::_System_error 31 API calls 69148->69149 69150 48560f 69149->69150 69150->69105 69152 48be10 construct 26 API calls 69151->69152 69153 485995 69152->69153 69154 48be10 construct 26 API calls 69153->69154 69155 4859b3 69154->69155 69156 48be10 construct 26 API calls 69155->69156 69157 4859dd 69156->69157 69157->69112 69167 4807c0 69158->69167 69162 48c030 std::_System_error::_System_error 31 API calls 69161->69162 69163 49bb63 shared_ptr 69162->69163 69163->69125 69164->69125 69165->69125 69166->69114 69168 4807cf std::_Mutex_base::_Mutex_base 69167->69168 69171 480730 69168->69171 69176 4ee6b1 69171->69176 69183 4ee46b 69176->69183 69179 480710 69180 480719 69179->69180 69181 480722 69179->69181 69203 4ee0dd 34 API calls std::_Check_C_return 69180->69203 69181->69119 69184 4ee493 GetCurrentThreadId 69183->69184 69185 4ee4c0 69183->69185 69190 4ee49e 69184->69190 69194 4ee4b8 69184->69194 69186 4ee4c4 GetCurrentThreadId 69185->69186 69189 4ee4e9 69185->69189 69191 4ee4d3 69186->69191 69187 4ee581 GetCurrentThreadId 69187->69191 69188 4ee5d5 GetCurrentThreadId 69188->69194 69189->69187 69192 4ee509 69189->69192 69196 4ee4af GetCurrentThreadId 69190->69196 69191->69188 69191->69194 69201 4ef376 GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 69192->69201 69193 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 69197 48073c 69193->69197 69194->69193 69196->69194 69197->69179 69198 4ee541 GetCurrentThreadId 69198->69191 69199 4ee514 __Xtime_diff_to_millis2 69198->69199 69199->69191 69199->69194 69199->69198 69202 4ef376 GetSystemTimeAsFileTime __aulldvrm __Xtime_get_ticks 69199->69202 69201->69199 69202->69199 69203->69181 69205 491dd5 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 69204->69205 69215 491e80 69205->69215 69210 491ce0 69323 494cd0 69210->69323 69212 491d0e std::_Mutex_base::_Mutex_base 69328 494700 69212->69328 69214 48677f 69214->69136 69216 491eb5 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 69215->69216 69223 494d20 69216->69223 69219 4948e0 69221 494915 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 69219->69221 69220 48cf94 69220->69210 69221->69220 69322 4edf50 4 API calls 2 library calls 69221->69322 69232 480250 69223->69232 69227 494d4c 69228 494d67 69227->69228 69243 4923b0 39 API calls 2 library calls 69227->69243 69229 491e13 69228->69229 69244 4edf50 4 API calls 2 library calls 69228->69244 69229->69219 69245 480060 69232->69245 69235 5c97b8 new 12 API calls 69236 4802c8 69235->69236 69248 47f080 69236->69248 69239 498fb0 69240 498fe4 std::ios_base::getloc 69239->69240 69286 49a0f0 69240->69286 69242 498ffd std::ios_base::_Ios_base_dtor ctype 69242->69227 69243->69228 69244->69229 69251 47ff70 69245->69251 69276 4edd29 69248->69276 69250 47f0ad 69250->69239 69252 47ff98 69251->69252 69273 47ff93 69251->69273 69253 47ffa0 69252->69253 69254 47ffae 69252->69254 69255 5e24f3 __CxxThrowException@8 RaiseException 69253->69255 69256 47ffbf 69254->69256 69257 47ffeb 69254->69257 69255->69273 69260 47fa60 std::make_error_code 34 API calls 69256->69260 69258 480028 69257->69258 69259 47fffc 69257->69259 69262 47fa60 std::make_error_code 34 API calls 69258->69262 69261 47fa60 std::make_error_code 34 API calls 69259->69261 69263 47ffca 69260->69263 69264 480007 69261->69264 69265 480033 69262->69265 69266 47ff40 std::ios_base::failure::failure 31 API calls 69263->69266 69267 47ff40 std::ios_base::failure::failure 31 API calls 69264->69267 69268 47ff40 std::ios_base::failure::failure 31 API calls 69265->69268 69269 47ffdb 69266->69269 69270 480018 69267->69270 69271 480044 69268->69271 69272 5e24f3 __CxxThrowException@8 RaiseException 69269->69272 69274 5e24f3 __CxxThrowException@8 RaiseException 69270->69274 69275 5e24f3 __CxxThrowException@8 RaiseException 69271->69275 69272->69273 69273->69235 69274->69273 69275->69273 69277 4edd35 __EH_prolog3 69276->69277 69278 4edb38 std::_Lockit::_Lockit RtlEnterCriticalSection RtlEnterCriticalSection 69277->69278 69279 4edd40 69278->69279 69280 4ede99 std::locale::_Locimp::_New_Locimp 12 API calls 69279->69280 69285 4edd5b std::locale::_Init 69279->69285 69282 4edd53 69280->69282 69281 4edb90 std::_Lockit::~_Lockit RtlLeaveCriticalSection RtlLeaveCriticalSection 69283 4eddaf std::locale::_Init 69281->69283 69284 4edebe std::locale::_Setgloballocale 40 API calls 69282->69284 69283->69250 69284->69285 69285->69281 69300 4edb38 69286->69300 69290 49a138 69299 49a150 69290->69299 69319 47f4b0 81 API calls 5 library calls 69290->69319 69293 49a1d0 69293->69242 69294 49a16d 69295 49a18d 69294->69295 69296 49a175 std::bad_alloc::bad_alloc 69294->69296 69321 4edcf5 12 API calls new 69295->69321 69320 5e24f3 RaiseException 69296->69320 69312 4edb90 69299->69312 69301 4edb4e 69300->69301 69302 4edb47 69300->69302 69304 49a11f 69301->69304 69305 4ef1c0 std::_Lockit::_Lockit RtlEnterCriticalSection 69301->69305 69303 5f6255 std::_Lockit::_Lockit RtlEnterCriticalSection 69302->69303 69303->69304 69306 47eef0 69304->69306 69305->69304 69307 47ef35 69306->69307 69308 47ef01 69306->69308 69307->69290 69309 4edb38 std::_Lockit::_Lockit RtlEnterCriticalSection RtlEnterCriticalSection 69308->69309 69310 47ef0b 69309->69310 69311 4edb90 std::_Lockit::~_Lockit RtlLeaveCriticalSection RtlLeaveCriticalSection 69310->69311 69311->69307 69313 5f625e 69312->69313 69314 4edb9a 69312->69314 69316 5f623e std::_Lockit::~_Lockit RtlLeaveCriticalSection 69313->69316 69315 4edbad 69314->69315 69317 4ef1ce std::_Lockit::~_Lockit RtlLeaveCriticalSection 69314->69317 69315->69293 69318 5f6265 69316->69318 69317->69315 69318->69293 69319->69294 69320->69299 69321->69299 69322->69220 69324 5c97b8 new 12 API calls 69323->69324 69325 494ce9 69324->69325 69326 47f080 std::locale::locale 47 API calls 69325->69326 69327 494cf7 69326->69327 69327->69212 69329 494726 69328->69329 69331 494747 Concurrency::details::ExternalContextBase::~ExternalContextBase char_traits 69328->69331 69330 491d60 allocator 12 API calls 69329->69330 69329->69331 69330->69331 69331->69214 69333 491bc6 Concurrency::details::ExternalContextBase::~ExternalContextBase 69332->69333 69334 491c41 69332->69334 69333->69334 69343 491bd2 Concurrency::details::ExternalContextBase::~ExternalContextBase 69333->69343 69335 491ca2 69334->69335 69344 491c58 Concurrency::details::ExternalContextBase::~ExternalContextBase 69334->69344 69336 48bfe0 _Error_objects 26 API calls 69335->69336 69337 491caa 69336->69337 69338 48be10 construct 26 API calls 69337->69338 69339 491cb6 69338->69339 69340 48bcd0 std::system_error::system_error 26 API calls 69339->69340 69341 491c34 69340->69341 69342 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 69341->69342 69345 48ce9f 69342->69345 69356 48bf70 31 API calls 2 library calls 69343->69356 69357 48bf70 31 API calls 2 library calls 69344->69357 69345->69010 69347 491c7e 69349 48be10 construct 26 API calls 69347->69349 69352 491c8a 69349->69352 69350 491c17 69351 48be10 construct 26 API calls 69350->69351 69353 491c23 69351->69353 69354 48bcd0 std::system_error::system_error 26 API calls 69352->69354 69355 48bcd0 std::system_error::system_error 26 API calls 69353->69355 69354->69341 69355->69341 69356->69350 69357->69347 69358->69097 69360 48f9a0 std::system_error::system_error Concurrency::details::ContextBase::GetWorkQueueIdentity std::_Container_base12::~_Container_base12 69359->69360 69364 48fa0a std::system_error::system_error std::_Container_base12::~_Container_base12 69360->69364 69365 48faa0 26 API calls 2 library calls 69360->69365 69362 48f9cf std::system_error::system_error Concurrency::details::ContextBase::GetWorkQueueIdentity std::_Container_base12::~_Container_base12 69366 492720 26 API calls std::_Container_base12::~_Container_base12 69362->69366 69364->69014 69365->69362 69366->69364 69367->68833 69368->68838 69369->68837 69370->68847 69371->68838 69372->68856 69373->68881 69374->68866 69375->68857 69376->68865 69377->68875 69378->68868 69379->68875 69380->68874 69381->68876 69382->68867 69383->68883 69384->68887 69390 5c9a6e RtlEnterCriticalSection 69385->69390 69387 5c9a48 69388 5c9a31 69388->69387 69391 5c9ac7 RtlEnterCriticalSection RtlLeaveCriticalSection WaitForSingleObjectEx __Init_thread_footer 69388->69391 69390->69388 69391->69388 69395 47e630 69392->69395 69396 47e64f __vswprintf_s_l 69395->69396 69399 5eacd6 69396->69399 69402 5e81ef 69399->69402 69403 5e822f 69402->69403 69404 5e8217 69402->69404 69403->69404 69405 5e8237 69403->69405 69406 5eb479 _memcpy_s 20 API calls 69404->69406 69420 5e6670 38 API calls 2 library calls 69405->69420 69408 5e821c 69406->69408 69419 5e763a 26 API calls _memcpy_s 69408->69419 69409 5e8247 69421 5e8944 20 API calls 2 library calls 69409->69421 69411 5e8227 69413 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 69411->69413 69415 47e65e 69413->69415 69414 5e82bf 69422 5e8ef8 50 API calls 2 library calls 69414->69422 69415->68719 69418 5e82ca 69423 5e89ae 20 API calls _free 69418->69423 69419->69411 69420->69409 69421->69414 69422->69418 69423->69411 69425 491482 std::_System_error::_System_error 69424->69425 69426 490960 std::system_error::system_error 26 API calls 69425->69426 69427 491495 69426->69427 69428 4910b0 std::_System_error::_System_error 31 API calls 69427->69428 69429 48b691 69428->69429 69429->68772 68303 5c8030 68304 5c97b8 new 12 API calls 68303->68304 68305 5c805d 68304->68305 68306 5c806b CreateThread 68305->68306 68309 5beff0 68305->68309 68505 5c3100 68306->68505 68310 5bf049 68309->68310 68337 5c8370 68310->68337 68314 5bf2a0 68315 5bf2cf 68314->68315 68316 5bf2d1 GetTickCount 68314->68316 68315->68316 68350 5f9f7d 33 API calls 68316->68350 68318 5bf2fb 68351 47d160 31 API calls 4 library calls 68318->68351 68320 5bf339 68352 48b540 31 API calls _Error_objects 68320->68352 68322 5bf349 68353 4ca350 31 API calls construct 68322->68353 68324 5bf35b 68354 47cb40 31 API calls 4 library calls 68324->68354 68326 5bf36a 68327 5bf388 68326->68327 68355 47d480 26 API calls allocator 68326->68355 68328 5bf3c7 68327->68328 68356 47d480 26 API calls allocator 68327->68356 68357 4ca250 31 API calls 6 library calls 68328->68357 68332 5bf3d9 68333 5bf3fa 68332->68333 68358 47d480 26 API calls allocator 68332->68358 68335 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68333->68335 68336 5bf414 68335->68336 68336->68306 68338 5c83bb 68337->68338 68339 491030 std::system_error::system_error 31 API calls 68338->68339 68340 5c8402 68339->68340 68359 5c84b0 68340->68359 68343 491030 68344 491043 std::_System_error::_System_error 68343->68344 68345 49106a 68344->68345 68346 49104a Concurrency::details::ContextBase::GetWorkQueueIdentity 68344->68346 68347 4944b0 std::_System_error::_System_error 31 API calls 68345->68347 68493 4910b0 68346->68493 68349 491068 std::system_error::system_error Concurrency::details::ContextBase::GetWorkQueueIdentity char_traits 68347->68349 68349->68314 68350->68318 68351->68320 68352->68322 68353->68324 68354->68326 68355->68327 68356->68328 68357->68332 68358->68333 68360 5c84e7 68359->68360 68361 5c8680 68359->68361 68364 5c8508 68360->68364 68365 5c84f4 68360->68365 68362 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68361->68362 68363 5bf1d1 68362->68363 68363->68343 68393 5c8090 32 API calls 4 library calls 68364->68393 68392 5c8160 87 API calls 6 library calls 68365->68392 68368 5c84fe 68368->68361 68369 5c8511 68394 4ca1d0 68369->68394 68373 5c8543 68374 5c85cd 68373->68374 68375 5c85b8 68373->68375 68377 5c85dd 68374->68377 68378 5c85ef 68374->68378 68402 5c8160 87 API calls 6 library calls 68375->68402 68403 5c8160 87 API calls 6 library calls 68377->68403 68381 5c8605 68378->68381 68383 5c8617 68378->68383 68380 4943f0 std::system_error::system_error 26 API calls 68380->68368 68404 5c8160 87 API calls 6 library calls 68381->68404 68384 5c8629 68383->68384 68385 5c863b 68383->68385 68405 5c8160 87 API calls 6 library calls 68384->68405 68388 5c864b 68385->68388 68389 5c8674 68385->68389 68387 5c85c3 68387->68368 68387->68380 68406 5c8160 87 API calls 6 library calls 68388->68406 68407 48bcd0 68389->68407 68392->68368 68393->68369 68410 48bc00 68394->68410 68396 4ca1e7 construct 68414 48be10 68396->68414 68399 4943f0 68473 491d80 68399->68473 68402->68387 68403->68387 68404->68387 68405->68387 68406->68387 68408 490960 std::system_error::system_error 26 API calls 68407->68408 68409 48bd02 std::system_error::system_error 68408->68409 68409->68361 68411 48bc10 std::_System_error::_System_error 68410->68411 68420 491210 68411->68420 68413 48bc20 68413->68396 68415 48be3e construct std::_System_error::_System_error Concurrency::details::ContextBase::GetWorkQueueIdentity 68414->68415 68416 490960 std::system_error::system_error 26 API calls 68415->68416 68417 48be5c construct 68416->68417 68469 491390 68417->68469 68421 491226 std::_System_error::_System_error 68420->68421 68422 49122d Concurrency::details::ContextBase::GetWorkQueueIdentity 68421->68422 68424 49124d std::ios_base::clear 68421->68424 68429 4912d0 68422->68429 68426 49126a std::ios_base::clear 68424->68426 68436 47d830 27 API calls std::ios_base::clear 68424->68436 68428 49124b std::system_error::system_error Concurrency::details::ContextBase::GetWorkQueueIdentity std::ios_base::clear char_traits 68426->68428 68437 4944b0 68426->68437 68428->68413 68446 47d520 68429->68446 68431 4912e6 std::_System_error::_System_error std::ios_base::clear 68433 491316 std::ios_base::clear 68431->68433 68450 47d830 27 API calls std::ios_base::clear 68431->68450 68434 4944b0 std::_System_error::_System_error 31 API calls 68433->68434 68435 49133a std::system_error::system_error Concurrency::details::ContextBase::GetWorkQueueIdentity std::ios_base::clear char_traits 68433->68435 68434->68435 68435->68428 68436->68426 68438 4944c1 std::_System_error::_System_error 68437->68438 68439 4944ce std::system_error::system_error 68438->68439 68452 47d830 27 API calls std::ios_base::clear 68438->68452 68441 4944dd std::ios_base::clear 68439->68441 68444 4944f6 std::ios_base::clear 68439->68444 68453 498be0 68441->68453 68443 4944f4 std::system_error::system_error 68443->68428 68444->68443 68459 490960 68444->68459 68447 47d52f std::ios_base::clear 68446->68447 68448 47d53e 68447->68448 68451 47d810 27 API calls std::_System_error::_System_error 68447->68451 68448->68431 68450->68433 68451->68448 68452->68439 68456 498c20 std::system_error::system_error std::_System_error::_System_error Concurrency::details::ContextBase::GetWorkQueueIdentity 68453->68456 68455 490960 std::system_error::system_error 26 API calls 68458 498d62 std::system_error::system_error construct Concurrency::details::ContextBase::GetWorkQueueIdentity 68455->68458 68463 499db0 68456->68463 68457 498cb4 construct Concurrency::details::ContextBase::GetWorkQueueIdentity char_traits 68457->68455 68458->68443 68460 490971 std::system_error::system_error 68459->68460 68461 490976 std::system_error::system_error construct Concurrency::details::ContextBase::GetWorkQueueIdentity type_info::name char_traits 68459->68461 68460->68443 68461->68460 68462 4943f0 std::system_error::system_error 26 API calls 68461->68462 68462->68460 68466 491d60 68463->68466 68467 47bd60 allocator 12 API calls 68466->68467 68468 491d74 68467->68468 68468->68457 68470 4913a0 std::system_error::system_error construct Concurrency::details::ContextBase::GetWorkQueueIdentity std::ios_base::clear char_traits 68469->68470 68471 490960 std::system_error::system_error 26 API calls 68470->68471 68472 48be71 68471->68472 68472->68373 68472->68399 68476 47be10 68473->68476 68475 491d96 68475->68373 68477 47be23 68476->68477 68478 47be28 68476->68478 68488 5e764a 26 API calls 2 library calls 68477->68488 68480 47be8c 68478->68480 68481 47be4e 68478->68481 68489 5e764a 26 API calls 2 library calls 68478->68489 68480->68475 68482 47be6c 68481->68482 68490 5e764a 26 API calls 2 library calls 68481->68490 68485 47be7c 68482->68485 68491 5e764a 26 API calls 2 library calls 68482->68491 68485->68480 68492 5e764a 26 API calls 2 library calls 68485->68492 68494 47d520 std::_System_error::_System_error 27 API calls 68493->68494 68495 4910c3 std::_System_error::_System_error 68494->68495 68496 4910fd 68495->68496 68497 4910de 68495->68497 68499 4944b0 std::_System_error::_System_error 31 API calls 68496->68499 68503 4945c0 27 API calls 2 library calls 68497->68503 68502 4910fb std::system_error::system_error Concurrency::details::ContextBase::GetWorkQueueIdentity char_traits 68499->68502 68500 4910ed 68504 48bb70 27 API calls 5 library calls 68500->68504 68502->68349 68503->68500 68504->68502 67816 4744c0 IntersectRect 67817 474511 67816->67817 67825 47450c 67816->67825 67818 47452d 67817->67818 67820 474615 67817->67820 67831 4f5c6b 12 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 67818->67831 67819 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67822 47468e 67819->67822 67827 474850 67820->67827 67823 47459d 67832 4f1003 SelectClipRgn DeleteObject DeleteObject 67823->67832 67825->67819 67828 474865 67827->67828 67830 47486c 67828->67830 67833 470a20 67828->67833 67830->67825 67831->67823 67832->67825 67836 4f4f62 67833->67836 67845 4f4f71 __EH_prolog3_GS _Error_objects 67836->67845 67839 4f56bd 67851 4f4e1e 67839->67851 67841 4f5088 CharNextW 67841->67845 67842 4f5733 67864 5c9f7f 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 67842->67864 67843 4f50a8 CharNextW 67843->67845 67844 4f50ef CharNextW 67844->67845 67845->67839 67845->67841 67845->67842 67845->67843 67845->67844 67846 4f5119 CharNextW 67845->67846 67847 4f5143 CharNextW 67845->67847 67848 4f4e1e 129 API calls 67845->67848 67849 5e690d 39 API calls 67845->67849 67850 5e6939 39 API calls 67845->67850 67846->67845 67847->67845 67848->67845 67849->67845 67850->67845 67855 4f4e7a 67851->67855 67852 4f4e7e 67853 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67852->67853 67854 4f4f5e 67853->67854 67854->67842 67855->67852 67865 47ae10 67855->67865 67857 4f4eb0 67857->67852 67858 4f4eda IntersectRect 67857->67858 67858->67852 67859 4f4f05 IntersectRect 67858->67859 67859->67852 67860 4f4f16 67859->67860 67861 4f4f23 67860->67861 67869 4f3cfe 46 API calls 3 library calls 67861->67869 67863 4f4f4c 67863->67852 67866 47ae2d 67865->67866 67867 47ae4a 67866->67867 67870 47ae70 67866->67870 67867->67857 67869->67863 67871 47aed6 std::_Cnd_initX 67870->67871 67872 47ae86 67870->67872 67884 4f5fb8 67871->67884 67928 5e7148 42 API calls _fread 67872->67928 67874 47ae92 67878 47aece 67874->67878 67929 5e690d 67874->67929 67877 47aeaf 67881 4f5fb8 69 API calls 67877->67881 67883 47aef9 67878->67883 67933 4f0926 12 API calls 2 library calls 67878->67933 67880 47af34 67882 47af3b DeleteObject 67880->67882 67880->67883 67881->67878 67882->67883 67883->67867 67885 4f5fc7 __EH_prolog3_GS 67884->67885 67886 4f6175 67885->67886 67894 4f5fd7 67885->67894 67887 4f617e FindResourceW 67886->67887 67888 4f618b 67887->67888 67889 4f61e8 CreateFileW 67887->67889 67893 4f6191 LoadResource 67888->67893 67890 4f620e GetFileSize 67889->67890 67891 4f6432 _Error_objects 67889->67891 67890->67891 67892 4f6220 67890->67892 67964 5c9f7f 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 67891->67964 67898 4f622d ReadFile CloseHandle 67892->67898 67895 4f61ab 67893->67895 67896 4f61a3 FreeResource 67893->67896 67906 4f5fff 67894->67906 67912 4f609b 67894->67912 67901 4f61b0 SizeofResource 67895->67901 67896->67889 67900 4f6251 67898->67900 67900->67891 67902 4f6262 67900->67902 67901->67889 67903 4f61bd 67901->67903 67946 50c281 67902->67946 67905 4f61c3 LockResource 67903->67905 67957 5e2940 67905->67957 67909 4f6028 CreateFileW 67906->67909 67908 4f61da FreeResource 67917 4f6035 67908->67917 67910 4f6048 GetFileSize 67909->67910 67909->67917 67911 4f605d 67910->67911 67910->67917 67913 4f606a ReadFile CloseHandle 67911->67913 67915 4f60b5 67912->67915 67952 4fb8b6 24 API calls 2 library calls 67912->67952 67914 4f6092 67913->67914 67913->67917 67914->67917 67915->67917 67934 4fb2f7 67915->67934 67917->67889 67917->67902 67919 4f6280 char_traits 67919->67891 67958 5c97b8 67919->67958 67921 4f60f6 67921->67917 67942 4fbc76 67921->67942 67924 4f6154 67924->67917 67926 4fb151 CloseHandle 67924->67926 67925 4f6135 67925->67917 67953 4fb151 67925->67953 67926->67917 67928->67874 67930 5e6928 _fread 67929->67930 68110 5e5ce5 67930->68110 67933->67880 67935 4fb32a 67934->67935 67936 4fb31b 67934->67936 67935->67936 67965 4fb26f 67935->67965 67939 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67936->67939 67938 4fb34b 67938->67936 67970 4fb800 MultiByteToWideChar char_traits 67938->67970 67940 4fb3d6 67939->67940 67940->67921 67943 4fbc87 67942->67943 67944 4f6127 67942->67944 67943->67944 68008 4fb91f 67943->68008 67944->67924 67944->67925 67947 50c2bc 67946->67947 68080 50c2e5 67947->68080 67949 50c2d1 67950 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67949->67950 67951 50c2e1 67950->67951 67951->67919 67952->67915 67954 4fb168 67953->67954 67955 4fb15c _MallocaArrayHolder 67953->67955 67954->67955 68102 4fb128 67954->68102 67955->67917 67957->67908 67959 5c97bd ___std_exception_copy 67958->67959 67960 5c97e9 67959->67960 68107 5fb510 7 API calls 2 library calls 67959->68107 68108 5cacae 5 API calls 2 library calls 67959->68108 68109 4eda8b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 67959->68109 67960->67891 67971 4fe275 67965->67971 67967 4fb290 char_traits 67967->67938 67968 4fb289 67968->67967 67982 4fb3da 67968->67982 67970->67936 67972 4fe29c _wcslen 67971->67972 67978 4fe294 67971->67978 67974 4fb7d3 WideCharToMultiByte 67972->67974 67972->67978 67973 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67975 4fe355 67973->67975 67976 4fe2bc _strlen 67974->67976 67975->67968 67977 4fe1d7 ReadFile SetFilePointer 67976->67977 67976->67978 67980 4fe2ff 67977->67980 67978->67973 67979 4fe1b0 ReadFile SetFilePointer 67979->67980 67980->67978 67980->67979 67981 4fe216 ReadFile SetFilePointer 67980->67981 67981->67980 67985 4fb401 67982->67985 67987 4fb425 _memcpy_s 67982->67987 67983 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 67984 4fb7cd 67983->67984 67984->67967 67986 4fb499 67985->67986 67985->67987 67988 4fe1d7 ReadFile SetFilePointer 67985->67988 67989 4fb4aa 67986->67989 67990 4fe216 ReadFile SetFilePointer 67986->67990 67987->67983 67988->67986 67991 4fe1b0 ReadFile SetFilePointer 67989->67991 67990->67986 67992 4fb4ca 67991->67992 67993 4fe751 ReadFile SetFilePointer 67992->67993 67994 4fb4e6 67993->67994 67994->67987 67995 4fdebb SetFilePointer 67994->67995 67996 4fb507 67995->67996 67996->67987 67997 4fb518 67996->67997 67998 4fde57 ReadFile 67997->67998 68000 4fb53b 67998->68000 67999 4fb546 _memcpy_s 67999->67987 68000->67999 68001 4fb604 DosDateTimeToFileTime 68000->68001 68001->67999 68002 4fb679 68001->68002 68002->67999 68003 4fdfab 28 API calls 68002->68003 68005 4fb72b 68002->68005 68003->68005 68004 4fb757 68004->67999 68007 4fdfab 28 API calls 68004->68007 68005->68004 68006 4fdfab 28 API calls 68005->68006 68006->68004 68007->67999 68009 4fb92c __wsopen_s 68008->68009 68012 4fb948 68009->68012 68015 4fbbe1 68009->68015 68010 4fbc26 68063 4fe5c7 68010->68063 68013 4fb954 68012->68013 68014 4fb985 68012->68014 68073 4fe1d7 ReadFile SetFilePointer 68012->68073 68017 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68013->68017 68020 4fb996 68014->68020 68074 4fe216 ReadFile SetFilePointer 68014->68074 68015->68010 68015->68013 68016 4fbc11 68015->68016 68078 4fe1d7 ReadFile SetFilePointer 68015->68078 68018 4fbc21 68016->68018 68079 4fe216 ReadFile SetFilePointer 68016->68079 68022 4fbc6a 68017->68022 68059 4fe35d 68018->68059 68025 4fb3da 31 API calls 68020->68025 68022->67944 68027 4fb9a5 68025->68027 68028 4fb9ae 68027->68028 68029 4fb9eb 68027->68029 68028->68013 68031 4fb9bb 68028->68031 68030 4fbb1d 68029->68030 68032 4fbb04 CreateFileW 68029->68032 68047 4fba6f 68029->68047 68048 4fbc70 68029->68048 68030->68013 68034 4fe35d 2 API calls 68030->68034 68075 4fb800 MultiByteToWideChar char_traits 68031->68075 68032->68030 68036 4fbb33 68034->68036 68035 4fb9d3 68076 4fb1a3 7 API calls 2 library calls 68035->68076 68038 4fe5c7 7 API calls 68036->68038 68040 4fbb47 68038->68040 68039 4fb9e6 68039->68013 68041 4fbb80 68040->68041 68042 4fbb4e WriteFile 68040->68042 68043 4fbb87 GetFileType 68040->68043 68041->68043 68042->68041 68044 4fbb6a 68042->68044 68045 4fbbb8 68043->68045 68046 4fbb93 68043->68046 68044->68040 68049 4fe5c7 7 API calls 68044->68049 68045->68013 68051 4fbbbe CloseHandle 68045->68051 68046->68045 68050 4fbb9c SetFileTime 68046->68050 68056 4fba97 _wcsstr 68047->68056 68070 5c9c58 68048->68070 68049->68044 68050->68045 68051->68013 68053 4fbc80 68053->67944 68055 4fb91f 34 API calls 68055->68053 68057 4fbb00 68056->68057 68077 4fb1a3 7 API calls 2 library calls 68056->68077 68057->68032 68060 4fe372 68059->68060 68062 4fe36a ___std_exception_copy 68059->68062 68061 4fe751 ReadFile SetFilePointer 68060->68061 68060->68062 68061->68062 68062->68010 68064 4fe5e0 68063->68064 68067 4fe5e8 68063->68067 68064->68013 68065 4fc338 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 68065->68067 68066 4fdebb SetFilePointer 68066->68067 68067->68064 68067->68065 68067->68066 68068 4fe651 68067->68068 68068->68064 68068->68067 68069 4fde57 ReadFile 68068->68069 68069->68068 68071 5c9c64 ___report_securityfailure 5 API calls 68070->68071 68072 4fbc75 68071->68072 68072->68053 68072->68055 68073->68014 68074->68014 68075->68035 68076->68039 68077->68057 68078->68016 68079->68016 68091 50c236 68080->68091 68083 50c311 68086 50c31c 68083->68086 68088 50c330 68083->68088 68084 50c2f7 68100 50c1e8 5 API calls 2 library calls 68084->68100 68097 50c4e8 68086->68097 68090 50c309 68088->68090 68101 50bc97 5 API calls 3 library calls 68088->68101 68090->67949 68092 50c243 __wsopen_s 68091->68092 68093 507e84 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 68092->68093 68094 50c265 68093->68094 68095 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68094->68095 68096 50c27d 68095->68096 68096->68083 68096->68084 68098 508076 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 68097->68098 68099 50c509 68098->68099 68099->68090 68100->68090 68101->68090 68103 4fb131 68102->68103 68105 4fb149 68103->68105 68106 4fe115 CloseHandle 68103->68106 68105->67955 68106->68105 68107->67959 68108->67959 68128 5e6747 68110->68128 68112 5e5d34 68136 5e6670 38 API calls 2 library calls 68112->68136 68114 5e5d0e 68116 5eb479 _memcpy_s 20 API calls 68114->68116 68115 5e5cf7 68115->68112 68115->68114 68127 5e5d1e 68115->68127 68117 5e5d13 68116->68117 68135 5e763a 26 API calls _memcpy_s 68117->68135 68120 5e5d40 68122 5e5d66 68120->68122 68137 5fe8a3 GetStringTypeW 68120->68137 68121 5e603d 68139 5e671b 26 API calls _memcpy_s 68121->68139 68122->68121 68138 5e671b 26 API calls _memcpy_s 68122->68138 68125 5e6360 _fread 68126 5eb479 _memcpy_s 20 API calls 68125->68126 68125->68127 68126->68127 68127->67877 68129 5e675f 68128->68129 68130 5e674c 68128->68130 68129->68115 68131 5eb479 _memcpy_s 20 API calls 68130->68131 68132 5e6751 68131->68132 68140 5e763a 26 API calls _memcpy_s 68132->68140 68134 5e675c 68134->68115 68135->68127 68136->68120 68137->68120 68138->68121 68139->68125 68140->68134 68141 4794e0 68142 479527 KiUserCallbackDispatcher 68141->68142 68143 479583 68142->68143 68144 47953b 68142->68144 68144->68142 68146 47954e TranslateMessage DispatchMessageW 68144->68146 68147 47b8c0 68144->68147 68146->68144 68148 47b8d4 68147->68148 68149 47b8f4 GetParent 68148->68149 68152 47b9b5 std::operator== 68148->68152 68151 47b90c std::operator== 68149->68151 68150 47b974 68150->68144 68151->68150 68155 47b99c GetParent 68151->68155 68156 47b97b 68151->68156 68152->68150 68153 47ba0d 68152->68153 68160 4762e0 25 API calls _wcsstr 68153->68160 68155->68151 68159 4762e0 25 API calls _wcsstr 68156->68159 68157 47ba2e 68157->68150 68159->68155 68160->68157 68243 478ee0 68251 4795c0 GetFocus 68243->68251 68246 478f44 68264 4f9cd3 68246->68264 68247 478f24 68275 47a020 PostMessageW 68247->68275 68249 478f7d 68252 4795f6 68251->68252 68253 4795dc 68251->68253 68255 478ef1 68252->68255 68256 479615 GetTickCount 68252->68256 68260 479693 68252->68260 68253->68252 68254 4795ea SetFocus 68253->68254 68254->68252 68255->68246 68255->68247 68257 479669 68256->68257 68276 47a070 13 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68257->68276 68259 479686 68259->68260 68260->68255 68261 4796f0 GetTickCount 68260->68261 68262 479750 68261->68262 68277 47a070 13 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68262->68277 68265 4f9ce5 std::operator== 68264->68265 68274 4f9d5b 68264->68274 68278 4f9dac 39 API calls 5 library calls 68265->68278 68267 4f9cf9 68279 4f9b16 31 API calls 68267->68279 68269 4f9d08 68270 4f9d22 CreateWindowExW 68269->68270 68271 4f9d61 68270->68271 68270->68274 68272 4f9d6f ShowWindow 68271->68272 68271->68274 68280 4faa78 140 API calls 2 library calls 68272->68280 68274->68249 68275->68246 68276->68259 68277->68255 68278->68267 68279->68269 68280->68274 68594 52a6e0 68596 5f6a05 21 API calls 68594->68596 68595 52a6ea 68596->68595 70020 492290 70023 48e2a0 70020->70023 70025 48e2b1 Concurrency::details::ExternalContextBase::~ExternalContextBase char_traits 70023->70025 70024 48e391 70025->70024 70027 48ca70 70025->70027 70030 48caa2 Concurrency::details::ExternalContextBase::~ExternalContextBase char_traits 70027->70030 70028 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 70029 48cd7e 70028->70029 70029->70025 70032 48cabc _Fputc char_traits 70030->70032 70047 48be90 31 API calls 2 library calls 70030->70047 70032->70028 70033 48cc16 char_traits 70035 48bcd0 std::system_error::system_error 26 API calls 70033->70035 70034 48cc0c 70034->70033 70036 48ccf2 _Fputc char_traits 70034->70036 70035->70032 70037 48bcd0 std::system_error::system_error 26 API calls 70036->70037 70037->70032 70038 48cc94 70039 48bcd0 std::system_error::system_error 26 API calls 70038->70039 70039->70032 70040 48cb9c Concurrency::details::ExternalContextBase::~ExternalContextBase codecvt std::_Cnd_initX 70040->70033 70040->70034 70040->70038 70041 48ccd4 char_traits 70040->70041 70044 48cc66 char_traits 70040->70044 70048 5eb3a8 65 API calls _memcpy_s 70040->70048 70049 491180 31 API calls 3 library calls 70040->70049 70045 48bcd0 std::system_error::system_error 26 API calls 70041->70045 70046 48bcd0 std::system_error::system_error 26 API calls 70044->70046 70045->70032 70046->70032 70047->70040 70048->70040 70049->70040 68281 4890a0 68282 4890d8 68281->68282 68283 4890f6 ___crtLCMapStringA 68281->68283 68299 48b540 31 API calls _Error_objects 68282->68299 68285 48910a 68283->68285 68295 480570 68283->68295 68300 48b540 31 API calls _Error_objects 68285->68300 68286 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68287 4891da 68286->68287 68289 48918f std::_Container_base12::~_Container_base12 68301 48b540 31 API calls _Error_objects 68289->68301 68292 4891a7 68302 47caf0 26 API calls 2 library calls 68292->68302 68294 4890e5 68294->68286 68296 48057a 68295->68296 68297 480580 68295->68297 68296->68297 68298 480584 MultiByteToWideChar 68296->68298 68297->68285 68298->68297 68299->68294 68300->68289 68301->68292 68302->68294 68674 47c6b0 68675 47c6d5 68674->68675 68676 47c6c8 68674->68676 68688 47c710 53 API calls 2 library calls 68675->68688 68677 47c6d1 68676->68677 68678 47c6eb ExitProcess 68676->68678 68682 4fee53 68677->68682 68683 4fee7e 68682->68683 68684 47c707 68683->68684 68689 476560 68683->68689 68688->68677 68700 4765a3 68689->68700 68704 47659c 68689->68704 68690 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68691 478c26 68690->68691 68691->68684 68709 4ffcc5 CallWindowProcW 68691->68709 68692 4767a8 68694 4767f7 68692->68694 68699 477700 68692->68699 68692->68704 68693 478a5b 68695 478a63 SendMessageW 68693->68695 68693->68704 68696 477a3b 68694->68696 68697 477a1a SendMessageW 68694->68697 68694->68704 68695->68704 68698 477a4c SendMessageW 68696->68698 68696->68704 68697->68696 68698->68704 68701 477774 GetTickCount 68699->68701 68702 477813 68699->68702 68699->68704 68700->68692 68700->68693 68700->68704 68701->68702 68703 47786d char_traits 68702->68703 68702->68704 68705 477985 SendMessageW SendMessageW SendMessageW 68703->68705 68706 47791f CreateWindowExW SendMessageW 68703->68706 68704->68690 68708 477a07 68705->68708 68706->68705 68708->68704 68709->68684 68598 46d350 68599 46d369 68598->68599 68600 46d380 68599->68600 68601 46d3bf 68599->68601 68625 46d38c 68600->68625 68660 471aa0 17 API calls 68600->68660 68602 46d3ed 68601->68602 68603 46d812 68601->68603 68601->68625 68602->68625 68651 4798a0 68602->68651 68605 46d8d3 68603->68605 68606 46d81e 68603->68606 68607 46da67 68605->68607 68608 46d8df 68605->68608 68662 479a10 IsWindow KillTimer 68606->68662 68614 46df85 68607->68614 68623 46da8d 68607->68623 68607->68625 68615 46d9cc PtInRect 68608->68615 68616 46da0a 68608->68616 68608->68625 68610 46d849 68612 46d876 68610->68612 68613 46d857 68610->68613 68621 46d884 68612->68621 68622 46d8a3 68612->68622 68663 4717e0 7 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68613->68663 68618 46e013 68614->68618 68619 46df91 68614->68619 68624 46d9eb 68615->68624 68615->68625 68616->68625 68633 46da26 PtInRect 68616->68633 68617 46d436 PtInRect 68626 46d50d PtInRect 68617->68626 68638 46d459 68617->68638 68630 46e07b 68618->68630 68631 46e01b 68618->68631 68619->68625 68637 46dfa8 PtInRect 68619->68637 68664 4717e0 7 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68621->68664 68622->68625 68665 4717e0 7 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68622->68665 68628 46dc05 68623->68628 68649 46dab4 68623->68649 68666 4717e0 7 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68624->68666 68629 46d5e4 PtInRect 68626->68629 68626->68638 68628->68625 68641 46dd9a GetCursorPos 68628->68641 68648 46dc00 68628->68648 68629->68638 68630->68625 68673 471aa0 17 API calls 68630->68673 68631->68625 68672 4717e0 7 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68631->68672 68633->68625 68635 46da45 68633->68635 68667 4717e0 7 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68635->68667 68639 46dff1 68637->68639 68638->68625 68661 47a070 13 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68638->68661 68671 4717e0 7 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68639->68671 68669 475c20 68641->68669 68646 46ddbf ScreenToClient 68646->68648 68648->68625 68670 47a070 13 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68648->68670 68668 4717e0 7 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68649->68668 68653 4798b2 68651->68653 68652 479953 SetTimer 68654 4799a7 68652->68654 68656 479947 68652->68656 68653->68652 68657 479909 68653->68657 68655 5c97b8 new 12 API calls 68654->68655 68655->68656 68656->68617 68657->68656 68658 479915 SetTimer 68657->68658 68659 479932 68658->68659 68659->68656 68660->68625 68661->68625 68662->68610 68663->68625 68664->68625 68665->68625 68666->68625 68667->68625 68668->68648 68669->68646 68670->68625 68671->68625 68672->68625 68673->68625 68161 47c560 68162 47c58e std::_Container_base12::~_Container_base12 68161->68162 68171 4ffb71 68162->68171 68166 47c5a6 68180 5000b5 IsWindow 68166->68180 68170 47c5ba 68172 4ffb7c 68171->68172 68173 4ffb87 68172->68173 68184 4ffe13 GetClassInfoExW GetClassInfoExW RegisterClassExW GetLastError char_traits 68172->68184 68175 4ffba1 68173->68175 68176 47c59b 68173->68176 68185 4ffeb1 LoadCursorW RegisterClassW GetLastError 68173->68185 68175->68176 68178 4ffbca CreateWindowExW 68175->68178 68179 4ffa19 12 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 68176->68179 68178->68176 68179->68166 68181 47c5b2 68180->68181 68182 5000c8 ShowWindow 68180->68182 68183 4fffdd 40 API calls 68181->68183 68182->68181 68183->68170 68184->68173 68185->68175 69430 484d10 69451 485060 69430->69451 69432 484d7c 69435 48b400 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::_Scoped_lock 41 API calls 69432->69435 69433 484d4a 69433->69432 69487 482f00 41 API calls 3 library calls 69433->69487 69436 484d92 69435->69436 69458 48aca0 69436->69458 69437 484d6d 69437->69432 69488 484ed0 41 API calls 5 library calls 69437->69488 69441 484dc4 69443 5c97b8 new 12 API calls 69441->69443 69444 484ddd 69443->69444 69462 4832d0 69444->69462 69448 484e2a 69491 48b3c0 34 API calls std::_Mutex_base::~_Mutex_base 69448->69491 69450 484e43 69492 48a760 69451->69492 69453 485099 _Smanip 69496 4808d0 69453->69496 69455 4850d5 std::_Cnd_initX 69456 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 69455->69456 69457 4850fc 69456->69457 69457->69433 69460 48acb7 69458->69460 69459 484dab 69459->69441 69489 482e20 41 API calls 4 library calls 69459->69489 69460->69459 69461 48f7c0 27 API calls 69460->69461 69461->69460 69511 480b40 69462->69511 69467 48aaf0 12 API calls 69468 483328 69467->69468 69517 48a3f0 69468->69517 69471 48aaf0 12 API calls 69472 483346 69471->69472 69520 48aa30 69472->69520 69477 48aaf0 12 API calls 69478 483373 69477->69478 69479 48a970 12 API calls 69478->69479 69480 483382 69479->69480 69526 48a850 69480->69526 69483 48a850 12 API calls 69484 4833a3 69483->69484 69529 483560 69484->69529 69487->69437 69488->69432 69489->69441 69490 485180 6 API calls 3 library calls 69490->69448 69491->69450 69493 48a78f std::_Cnd_initX 69492->69493 69500 48f070 69493->69500 69495 48a79a std::_Cnd_initX _DebugHeapAllocator std::ios_base::good 69495->69453 69497 4808dd 69496->69497 69499 4808ec 69497->69499 69506 48b380 69497->69506 69499->69455 69504 48f081 6 library calls 69500->69504 69501 48f0fe 69501->69495 69502 48f070 26 API calls 69502->69504 69504->69501 69504->69502 69505 492720 26 API calls std::_Container_base12::~_Container_base12 69504->69505 69505->69504 69507 48b391 std::ios_base::good 69506->69507 69509 48b39d std::ios_base::good 69507->69509 69510 4edaa8 RaiseException std::_Cnd_initX __CxxThrowException@8 69507->69510 69509->69497 69602 480800 69511->69602 69514 48aaf0 69617 48f420 69514->69617 69650 48ee90 69517->69650 69670 48f310 69520->69670 69523 48a970 69690 48f200 69523->69690 69710 48f140 69526->69710 69530 4835a4 69529->69530 69531 48b400 Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::_Scoped_lock 41 API calls 69530->69531 69532 4835b0 std::_Cnd_initX std::operator== Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot Concurrency::details::HardwareAffinity::operator!= 69531->69532 69533 483646 69532->69533 69534 4836b7 std::_Cnd_initX 69532->69534 69550 4836b2 Concurrency::details::ExternalContextBase::~ExternalContextBase std::_Cnd_initX std::operator== Concurrency::details::HardwareAffinity::operator!= 69532->69550 69537 48c030 std::_System_error::_System_error 31 API calls 69533->69537 69535 4836c8 69534->69535 69536 483739 std::_Cnd_initX 69534->69536 69541 48c030 std::_System_error::_System_error 31 API calls 69535->69541 69540 48374a 69536->69540 69549 4837bb std::_Cnd_initX 69536->69549 69538 483662 69537->69538 69751 483c30 27 API calls 2 library calls 69538->69751 69546 48c030 std::_System_error::_System_error 31 API calls 69540->69546 69543 4836e4 69541->69543 69542 483673 std::_Cnd_initX 69752 49afe0 31 API calls 5 library calls 69542->69752 69753 483c30 27 API calls 2 library calls 69543->69753 69545 483b60 Concurrency::details::ExternalContextBase::~ExternalContextBase std::_Cnd_initX Concurrency::details::HardwareAffinity::operator!= 69552 483be8 69545->69552 69769 484790 119 API calls 6 library calls 69545->69769 69551 483766 69546->69551 69547 4836f5 std::_Cnd_initX 69754 49afe0 31 API calls 5 library calls 69547->69754 69549->69550 69560 4838cc std::_Cnd_initX 69549->69560 69573 4837e6 std::_Mutex_base::_Mutex_base 69549->69573 69550->69545 69730 4842c0 69550->69730 69755 483c30 27 API calls 2 library calls 69551->69755 69770 48adf0 26 API calls std::_Container_base12::~_Container_base12 69552->69770 69557 483bf7 69771 48b3c0 34 API calls std::_Mutex_base::~_Mutex_base 69557->69771 69559 483777 std::_Cnd_initX 69756 49afe0 31 API calls 5 library calls 69559->69756 69563 4838dd 69560->69563 69564 483941 std::_Cnd_initX 69560->69564 69561 483c09 69565 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 69561->69565 69567 48c030 std::_System_error::_System_error 31 API calls 69563->69567 69569 483952 69564->69569 69570 4839b6 std::_Cnd_initX 69564->69570 69566 4833cb 69565->69566 69566->69490 69571 483905 69567->69571 69576 48c030 std::_System_error::_System_error 31 API calls 69569->69576 69575 4839cb 69570->69575 69581 483a3c std::_Cnd_initX 69570->69581 69761 483cf0 118 API calls 6 library calls 69571->69761 69757 49b0f0 31 API calls 3 library calls 69573->69757 69574 483916 _DebugHeapAllocator 69762 49b360 31 API calls 5 library calls 69574->69762 69583 48c030 std::_System_error::_System_error 31 API calls 69575->69583 69577 48396e 69576->69577 69763 483c30 27 API calls 2 library calls 69577->69763 69580 48397f 69764 49afe0 31 API calls 5 library calls 69580->69764 69581->69550 69589 48c030 std::_System_error::_System_error 31 API calls 69581->69589 69586 4839e7 69583->69586 69584 483832 std::_Cnd_initX 69758 4819b0 31 API calls 3 library calls 69584->69758 69765 483cf0 118 API calls 6 library calls 69586->69765 69592 483a6d 69589->69592 69590 4839f8 std::_Cnd_initX 69766 49b480 31 API calls 5 library calls 69590->69766 69591 483869 std::_Cnd_initX 69759 49b180 31 API calls 6 library calls 69591->69759 69767 483cf0 118 API calls 6 library calls 69592->69767 69595 483a7e std::_Cnd_initX 69768 49b480 31 API calls 5 library calls 69595->69768 69597 4838ac 69760 481c60 26 API calls 2 library calls 69597->69760 69600 4838bb 69601 48bcd0 std::system_error::system_error 26 API calls 69600->69601 69601->69550 69605 480770 69602->69605 69606 480786 std::_Mutex_base::_Mutex_base 69605->69606 69609 4ee690 69606->69609 69612 4ee3c5 69609->69612 69611 48078c 69611->69514 69614 4ee3d1 __EH_prolog3 69612->69614 69613 4ee3ea Concurrency::critical_section::critical_section std::locale::_Init __Mtx_init_in_situ 69613->69611 69614->69613 69616 4ee2f9 InitializeCriticalSectionAndSpinCount ___crtInitializeCriticalSectionEx 69614->69616 69616->69613 69620 493400 69617->69620 69621 49341e _DebugHeapAllocator 69620->69621 69624 4980d0 69621->69624 69623 483319 69623->69467 69627 499b20 69624->69627 69626 4980e0 _DebugHeapAllocator 69626->69623 69628 499b59 Concurrency::details::ContextBase::GetWorkQueueIdentity 69627->69628 69631 499fd0 69628->69631 69630 499b60 construct Concurrency::details::ContextBase::GetWorkQueueIdentity _DebugHeapAllocator std::_Mutex_base::~_Mutex_base 69630->69626 69634 49a0b0 69631->69634 69637 47bd60 69634->69637 69638 47bd7b 69637->69638 69647 47bd73 69637->69647 69639 47bd8d 69638->69639 69648 4eda8b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 69638->69648 69641 47bdf3 69639->69641 69643 47bda8 69639->69643 69642 5c97b8 new 12 API calls 69641->69642 69642->69647 69644 47bdbe 69643->69644 69649 4eda8b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 69643->69649 69646 5c97b8 new 12 API calls 69644->69646 69646->69647 69647->69630 69653 492b10 69650->69653 69654 492b2e _DebugHeapAllocator 69653->69654 69657 494fb0 69654->69657 69656 483337 69656->69471 69660 499060 69657->69660 69659 494fc0 _DebugHeapAllocator 69659->69656 69661 499099 Concurrency::details::ContextBase::GetWorkQueueIdentity 69660->69661 69664 499f40 69661->69664 69663 4990a0 construct Concurrency::details::ContextBase::GetWorkQueueIdentity _DebugHeapAllocator std::_Mutex_base::~_Mutex_base 69663->69659 69667 49a030 69664->69667 69668 47bd60 allocator 12 API calls 69667->69668 69669 499f53 69668->69669 69669->69663 69673 4931d0 69670->69673 69674 4931ee _DebugHeapAllocator 69673->69674 69677 497040 69674->69677 69676 483355 69676->69523 69680 499880 69677->69680 69679 497050 _DebugHeapAllocator 69679->69676 69681 4998b9 Concurrency::details::ContextBase::GetWorkQueueIdentity 69680->69681 69684 499fa0 69681->69684 69683 4998c0 construct Concurrency::details::ContextBase::GetWorkQueueIdentity _DebugHeapAllocator std::_Mutex_base::~_Mutex_base 69683->69679 69687 49a090 69684->69687 69688 47bd60 allocator 12 API calls 69687->69688 69689 499fb3 69688->69689 69689->69683 69693 492fa0 69690->69693 69694 492fbe _DebugHeapAllocator 69693->69694 69697 495fb0 69694->69697 69696 483364 69696->69477 69700 4995e0 69697->69700 69699 495fc0 _DebugHeapAllocator 69699->69696 69701 499619 Concurrency::details::ContextBase::GetWorkQueueIdentity 69700->69701 69704 499f80 69701->69704 69703 499620 construct Concurrency::details::ContextBase::GetWorkQueueIdentity _DebugHeapAllocator std::_Mutex_base::~_Mutex_base 69703->69699 69707 49a070 69704->69707 69708 47bd60 allocator 12 API calls 69707->69708 69709 499f93 69708->69709 69709->69703 69713 492e20 69710->69713 69714 492e3e _DebugHeapAllocator 69713->69714 69717 4957e0 69714->69717 69716 483391 69716->69483 69720 499480 69717->69720 69719 4957f0 _DebugHeapAllocator 69719->69716 69721 4994b9 Concurrency::details::ContextBase::GetWorkQueueIdentity 69720->69721 69724 494e80 69721->69724 69723 4994c0 construct Concurrency::details::ContextBase::GetWorkQueueIdentity _DebugHeapAllocator std::_Mutex_base::~_Mutex_base 69723->69719 69727 499040 69724->69727 69728 47bd60 allocator 12 API calls 69727->69728 69729 494e93 69728->69729 69729->69723 69772 483f60 69730->69772 69732 484346 69816 480e90 69732->69816 69734 4842fc std::_System_error::_System_error 69734->69732 69880 49a570 79 API calls 4 library calls 69734->69880 69736 484334 69881 49a570 79 API calls 4 library calls 69736->69881 69737 48435d std::_Cnd_initX 69742 484383 _Smanip std::ios_base::good 69737->69742 69826 480d50 69737->69826 69739 48433d 69882 49a570 79 API calls 4 library calls 69739->69882 69845 484420 69742->69845 69751->69542 69752->69550 69753->69547 69754->69550 69755->69559 69756->69550 69757->69584 69758->69591 69759->69597 69760->69600 69761->69574 69762->69550 69763->69580 69764->69550 69765->69590 69766->69550 69767->69595 69768->69550 69769->69545 69770->69557 69771->69561 69773 48c030 std::_System_error::_System_error 31 API calls 69772->69773 69774 483fa7 69773->69774 69775 48bf00 std::system_error::system_error 31 API calls 69774->69775 69782 483fc9 std::_Cnd_initX std::_Container_base12::~_Container_base12 69775->69782 69776 48426a 69777 48be10 construct 26 API calls 69776->69777 69778 484276 69777->69778 69779 48bcd0 std::system_error::system_error 26 API calls 69778->69779 69780 484291 69779->69780 69781 48bcd0 std::system_error::system_error 26 API calls 69780->69781 69783 4842a0 69781->69783 69782->69776 69784 48bfe0 _Error_objects 26 API calls 69782->69784 69785 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 69783->69785 69787 484080 std::_Cnd_initX 69784->69787 69786 4842b8 69785->69786 69786->69734 69788 4841cf 69787->69788 69790 4840b3 69787->69790 69789 48bf00 std::system_error::system_error 31 API calls 69788->69789 69791 4841e1 69789->69791 69792 48cf20 90 API calls 69790->69792 69793 48bd20 construct 31 API calls 69791->69793 69797 4840db 69792->69797 69794 4841f6 69793->69794 69795 48bcd0 std::system_error::system_error 26 API calls 69794->69795 69799 4841cd _DebugHeapAllocator std::_Container_base12::~_Container_base12 69795->69799 69796 48411a std::_Cnd_initX 69895 48bb70 27 API calls 5 library calls 69796->69895 69797->69796 69894 49a290 79 API calls 3 library calls 69797->69894 69883 4814f0 69799->69883 69801 48418c 69802 48ce80 31 API calls 69801->69802 69803 48419e 69802->69803 69805 48bd20 construct 31 API calls 69803->69805 69807 4841b3 69805->69807 69808 48bcd0 std::system_error::system_error 26 API calls 69807->69808 69809 4841be 69808->69809 69896 480ab0 26 API calls std::bad_exception::~bad_exception 69809->69896 69818 480eab 69816->69818 69817 480ecb 69819 48c030 std::_System_error::_System_error 31 API calls 69817->69819 69818->69817 69821 480ee5 69818->69821 69820 480ed7 69819->69820 69820->69737 69822 480f1b 69821->69822 69823 480f01 69821->69823 69825 48b660 31 API calls 69822->69825 69824 48bf00 std::system_error::system_error 31 API calls 69823->69824 69824->69820 69825->69820 69828 480d80 std::_System_error::_System_error std::_Container_base12::~_Container_base12 69826->69828 69827 480d87 69829 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 69827->69829 69828->69827 69918 480cf0 69828->69918 69830 480e87 69829->69830 69830->69742 69832 480d9e std::_Container_base12::~_Container_base12 69832->69827 69833 48bfe0 _Error_objects 26 API calls 69832->69833 69846 484469 std::_Cnd_initX Concurrency::details::HardwareAffinity::operator!= 69845->69846 69847 48449b 69846->69847 69848 484636 std::_Mutex_base::~_Mutex_base 69846->69848 69924 480bc0 69847->69924 69940 49b640 31 API calls construct 69848->69940 69853 48464c 69880->69736 69881->69739 69882->69732 69898 481400 69883->69898 69885 481510 69901 4815a0 69885->69901 69887 481520 69904 4815d0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 69887->69904 69889 48156f 69894->69797 69895->69801 69896->69799 69899 481410 GetSystemTimeAsFileTime 69898->69899 69900 481462 __aulldiv __aullrem _fread 69898->69900 69899->69900 69900->69885 69905 5ebafd 69901->69905 69903 4815af 69903->69887 69904->69889 69908 5eba4c 69905->69908 69907 5ebb1a 69907->69903 69909 5eba5b 69908->69909 69911 5eba6f 69908->69911 69910 5eb479 _memcpy_s 20 API calls 69909->69910 69912 5eba60 69910->69912 69915 5eba6b __alldvrm 69911->69915 69917 5ff79a 11 API calls 2 library calls 69911->69917 69916 5e763a 26 API calls _memcpy_s 69912->69916 69915->69907 69916->69915 69917->69915 69919 480d00 GetFileAttributesA 69918->69919 69920 480cfc 69918->69920 69919->69920 69920->69832 69925 5c97b8 new 12 API calls 69924->69925 69940->69853 68186 47c120 68213 47beb0 68186->68213 68190 47c19d 68218 47cc30 26 API calls _Error_objects 68190->68218 68192 47c1af 68219 47cc30 26 API calls _Error_objects 68192->68219 68194 47c1c1 68220 47ca80 31 API calls 4 library calls 68194->68220 68196 47c1e3 68221 47ca80 31 API calls 4 library calls 68196->68221 68198 47c1f5 68222 47ca60 31 API calls 68198->68222 68200 47c2d1 68226 47caf0 26 API calls 2 library calls 68200->68226 68202 47c2dd 68227 47caf0 26 API calls 2 library calls 68202->68227 68204 47c2ec 68205 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68204->68205 68207 47c304 68205->68207 68206 47c21f 68206->68200 68223 47c9a0 31 API calls 68206->68223 68209 47c2b4 68224 47cb40 31 API calls 4 library calls 68209->68224 68211 47c2c9 68225 47caf0 26 API calls 2 library calls 68211->68225 68214 47bede 68213->68214 68228 474e70 68214->68228 68217 47cc30 26 API calls _Error_objects 68217->68190 68218->68192 68219->68194 68220->68196 68221->68198 68222->68206 68223->68209 68224->68211 68225->68200 68226->68202 68227->68204 68229 474f0d char_traits 68228->68229 68230 475148 GetStockObject GetObjectW 68229->68230 68232 47516e 68230->68232 68231 47518b CreateFontIndirectW 68235 4751bc char_traits 68231->68235 68232->68231 68242 5e6e3c 26 API calls _memcpy_s 68232->68242 68234 475188 68234->68231 68236 47527d 68235->68236 68237 475258 CreatePen 6F561CD0 LoadLibraryW 68235->68237 68238 5c97b8 new 12 API calls 68236->68238 68237->68236 68239 475284 68238->68239 68240 5c950e __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 68239->68240 68241 4753d9 68240->68241 68241->68217 68242->68234 70080 5fb3c0 70083 5fb0c7 70080->70083 70086 5faffd 70083->70086 70085 5fb0eb 70087 5fb009 _Ungetc 70086->70087 70094 5f61f6 RtlEnterCriticalSection 70087->70094 70089 5fb017 70095 5fb20f 70089->70095 70091 5fb024 70105 5fb042 RtlLeaveCriticalSection std::_Lockit::~_Lockit 70091->70105 70093 5fb035 _Ungetc 70093->70085 70094->70089 70096 5fb22d 70095->70096 70104 5fb225 __onexit __crt_fast_encode_pointer 70095->70104 70097 5fb286 70096->70097 70096->70104 70106 5f70c0 70096->70106 70099 5f70c0 __onexit 29 API calls 70097->70099 70097->70104 70101 5fb29c 70099->70101 70100 5fb27c 70103 5f64be _free 20 API calls 70100->70103 70102 5f64be _free 20 API calls 70101->70102 70102->70104 70103->70097 70104->70091 70105->70093 70107 5f70cb 70106->70107 70108 5f70f3 70107->70108 70110 5f70e4 70107->70110 70109 5f7102 70108->70109 70127 6048c1 27 API calls _memcpy_s 70108->70127 70115 5f6a53 70109->70115 70111 5eb479 _memcpy_s 20 API calls 70110->70111 70114 5f70e9 char_traits 70111->70114 70114->70100 70116 5f6a6b 70115->70116 70117 5f6a60 70115->70117 70119 5f6a73 70116->70119 70125 5f6a7c __Getctype 70116->70125 70118 5f6a05 ___crtLCMapStringA 21 API calls 70117->70118 70122 5f6a68 70118->70122 70123 5f64be _free 20 API calls 70119->70123 70120 5f6aa6 RtlReAllocateHeap 70120->70122 70120->70125 70121 5f6a81 70124 5eb479 _memcpy_s 20 API calls 70121->70124 70122->70114 70123->70122 70124->70122 70125->70120 70125->70121 70128 5fb510 7 API calls 2 library calls 70125->70128 70127->70109 70128->70125 68564 4017f0 68565 401811 68564->68565 68566 40182b 68564->68566 68565->68566 68569 401844 68565->68569 68587 401490 68566->68587 68568 401838 68570 40184f 68569->68570 68574 401860 68569->68574 68592 40c150 GetTickCount 68570->68592 68572 401858 68572->68574 68573 401972 68576 401490 2 API calls 68573->68576 68574->68573 68579 40198d 68574->68579 68575 401a02 select 68577 401a36 WSAGetLastError 68575->68577 68585 401a8d 68575->68585 68578 40197f 68576->68578 68577->68579 68579->68575 68583 401a5e 68579->68583 68584 401a91 68579->68584 68581 401ace __WSAFDIsSet 68582 401ae4 __WSAFDIsSet 68581->68582 68581->68585 68582->68585 68586 401afa __WSAFDIsSet 68582->68586 68583->68579 68583->68584 68593 40c150 GetTickCount 68583->68593 68585->68581 68585->68582 68585->68584 68585->68586 68586->68585 68588 4014b0 68587->68588 68589 401498 68587->68589 68588->68568 68590 4014a9 Sleep 68589->68590 68591 40149a WSASetLastError 68589->68591 68590->68588 68591->68568 68592->68572 68593->68583 68597 4ffdfa PostMessageW 70050 4a09f0 70051 4a0a01 _Clone 70050->70051 70054 4a49a0 70051->70054 70055 4a49ac construct 70054->70055 70058 4a51a0 70055->70058 70059 4a51ac construct 70058->70059 70062 4a6430 70059->70062 70063 4a643c construct 70062->70063 70066 484f90 70063->70066 70067 484fa8 std::_Cnd_initX 70066->70067 70070 484fc0 70067->70070 70069 484fb9 70071 484fcf 70070->70071 70076 484ff6 70070->70076 70078 4834d0 41 API calls std::_Cnd_initX 70071->70078 70073 48da10 std::_Cnd_initX 79 API calls 70077 48500a std::_Cnd_initX std::_Mutex_base::~_Mutex_base 70073->70077 70074 484fdf 70074->70076 70079 483530 41 API calls 2 library calls 70074->70079 70076->70073 70076->70077 70077->70069 70078->70074 70079->70076

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 976 4d61f0-4d622f call 4d9930 979 4d6255-4d62b4 call 48bf00 LoadLibraryW GetProcAddress 976->979 980 4d6231-4d6250 call 48bf00 976->980 988 4d62fe-4d6305 979->988 989 4d62b6-4d62bd 979->989 985 4d65a5-4d65bd call 5c950e 980->985 991 4d634f-4d6375 GetSystemInfo GetVersionExW 988->991 992 4d6307-4d630e 988->992 989->988 993 4d62bf-4d62f9 call 4a8ec0 call 48be10 call 48bcd0 989->993 995 4d6578-4d65a2 call 48be10 call 48bcd0 991->995 996 4d637b-4d638e 991->996 992->991 994 4d6310-4d634a call 4a8ec0 call 48be10 call 48bcd0 992->994 993->985 994->985 995->985 998 4d63af-4d63c2 996->998 999 4d6390-4d6397 996->999 1006 4d63d8-4d63df 998->1006 1007 4d63c4-4d63cb 998->1007 1003 4d639d-4d63a4 999->1003 1004 4d6429-4d643c 999->1004 1010 4d64cd-4d64e0 1003->1010 1011 4d63aa-4d6573 call 4a8ec0 1003->1011 1015 4d643e-4d6445 1004->1015 1016 4d6452-4d645f call 4a8ec0 1004->1016 1017 4d63e1-4d63ee call 4a8ec0 1006->1017 1018 4d63f0-4d63f7 1006->1018 1013 4d63cd-4d63d4 1007->1013 1014 4d6408-4d6415 call 4a8ec0 1007->1014 1034 4d64f6-4d64fd 1010->1034 1035 4d64e2-4d64e9 1010->1035 1011->995 1024 4d6417-4d641f call 4a8ec0 1013->1024 1025 4d63d6 1013->1025 1047 4d6424 1014->1047 1026 4d6447-4d644e 1015->1026 1027 4d6461-4d646e call 4a8ec0 1015->1027 1056 4d64c8 1016->1056 1033 4d6406 1017->1033 1032 4d63f9-4d6401 call 4a8ec0 1018->1032 1018->1033 1024->1047 1025->1047 1041 4d6470-4d6477 1026->1041 1042 4d6450 1026->1042 1027->1056 1032->1033 1033->1047 1037 4d64ff-4d650c call 4a8ec0 1034->1037 1038 4d650e-4d6516 call 4a8ec0 1034->1038 1050 4d651d-4d6524 1035->1050 1051 4d64eb-4d64f2 1035->1051 1065 4d651b 1037->1065 1038->1065 1059 4d6479-4d6483 1041->1059 1060 4d6494-4d649e GetSystemMetrics 1041->1060 1042->1056 1047->995 1054 4d6535-4d653d call 4a8ec0 1050->1054 1055 4d6526-4d6533 call 4a8ec0 1050->1055 1061 4d6544-4d654b 1051->1061 1062 4d64f4 1051->1062 1074 4d6542 1054->1074 1055->1074 1056->995 1059->1060 1070 4d6485-4d6492 call 4a8ec0 1059->1070 1071 4d64af-4d64b9 GetSystemMetrics 1060->1071 1072 4d64a0-4d64ad call 4a8ec0 1060->1072 1068 4d654d-4d655a call 4a8ec0 1061->1068 1069 4d655c-4d6564 call 4a8ec0 1061->1069 1063 4d6569 1062->1063 1063->995 1065->1063 1068->1063 1069->1063 1070->1056 1071->1056 1079 4d64bb-4d64c3 call 4a8ec0 1071->1079 1072->1056 1074->1063 1079->1056
                                                                    APIs
                                                                      • Part of subcall function 004D9930: RegOpenKeyExW.KERNEL32(80000002,SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion,00000000,000F003F,?), ref: 004D995B
                                                                      • Part of subcall function 004D9930: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,000F003F,?), ref: 004D9988
                                                                    • LoadLibraryW.KERNEL32(ntdll.dll,006764EF,A1986743), ref: 004D626E
                                                                    • GetProcAddress.KERNEL32(?,RtlGetNtVersionNumbers), ref: 004D6286
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Open$AddressLibraryLoadProc
                                                                    • String ID: Error$Microsoft Windows Me$RtlGetNtVersionNumbers$Windows 10$Windows 11$Windows 2000$Windows 7$Windows 8$Windows 8.1$Windows 95$Windows 98$Windows NT 4.0$Windows Server 2003$Windows Server 2003 R2$Windows Server 2008$Windows Server 2008 R2$Windows Server 2012$Windows Vista$Windows XP$Windows XP Professional x64 Edition$Z$ntdll.dll
                                                                    • API String ID: 2503747728-1872465536
                                                                    • Opcode ID: becc9781918e92d7f115eed92cd509b8d2da87f21d69ab52c7fe74ba2f881f28
                                                                    • Instruction ID: f06371bf6099798f274b5ab154f557b8ac638fff51b5e169f619ea19dc396ace
                                                                    • Opcode Fuzzy Hash: becc9781918e92d7f115eed92cd509b8d2da87f21d69ab52c7fe74ba2f881f28
                                                                    • Instruction Fuzzy Hash: 97A17B70D00218DACF24DB90DC65AEEB7B5FB15315F15419FE00A62390DB385AC6CFA9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0-pixel image$8bit only$DNEI$ETLP$IBgC$RDHI$SNRt$TADI$XXXX chunk not known$bad IHDR len$bad comp method$bad ctype$bad filter method$bad interlace method$bad tRNS len$first not IHDR$invalid PLTE$multiple IHDR$no IDAT$no PLTE$outofdata$outofmem$tRNS after IDAT$tRNS before PLTE$tRNS with alpha$too large
                                                                    • API String ID: 0-864047180
                                                                    • Opcode ID: 8289b1a26b2d20ef618ad0cb25b28a637dcee7502c4837844ff5fec408f3d0c0
                                                                    • Instruction ID: 9767e0239f14a106e6730be9c063c2dcdb57c7274f7c8f39be483d5168c38fc8
                                                                    • Opcode Fuzzy Hash: 8289b1a26b2d20ef618ad0cb25b28a637dcee7502c4837844ff5fec408f3d0c0
                                                                    • Instruction Fuzzy Hash: 9522E1B1604716DFDB65CA24C8847EE7FE5BB85300F1888AAE18AD62CBD73499C4CF15
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1488 4f5fb8-4f5fd1 call 5c9fc4 1491 4f5fd7-4f5ff9 call 475960 call 4f0271 call 475970 call 4f0a3e 1488->1491 1492 4f6175-4f6189 call 475940 FindResourceW 1488->1492 1521 4f5fff-4f6033 call 4f04be call 4f08e4 CreateFileW 1491->1521 1522 4f609b-4f60b3 call 475970 call 4f04a1 call 475980 1491->1522 1498 4f618b-4f61a1 call 475940 LoadResource 1492->1498 1499 4f61e8-4f6208 CreateFileW 1492->1499 1510 4f61ab-4f61bb call 475940 SizeofResource 1498->1510 1511 4f61a3-4f61a9 FreeResource 1498->1511 1501 4f620e-4f621a GetFileSize 1499->1501 1502 4f6473 1499->1502 1501->1502 1505 4f6220-4f624f call 5c9b2c ReadFile CloseHandle 1501->1505 1507 4f6475-4f647a call 5c9f7f 1502->1507 1518 4f625a-4f625c 1505->1518 1519 4f6251-4f6258 call 5c98d2 1505->1519 1510->1499 1525 4f61bd-4f61de call 5c9b2c LockResource call 5e2940 FreeResource 1510->1525 1511->1499 1518->1502 1524 4f6262-4f628d call 50c281 call 5c98d2 1518->1524 1519->1518 1545 4f6048-4f6055 GetFileSize 1521->1545 1546 4f6035 1521->1546 1553 4f60bc-4f60d0 call 4f08e4 call 4fb8b6 1522->1553 1554 4f60b5-4f60ba call 475990 1522->1554 1524->1502 1544 4f6293-4f6309 call 5e2ec0 1524->1544 1543 4f61e4-4f61e6 1525->1543 1543->1499 1543->1524 1544->1502 1569 4f630f-4f6320 1544->1569 1549 4f605d-4f608c call 5c9b2c ReadFile CloseHandle 1545->1549 1550 4f6057-4f605b 1545->1550 1552 4f6038-4f6043 call 4f03ac 1546->1552 1565 4f6164-4f6173 call 4f03ac 1549->1565 1566 4f6092-4f6093 call 5c98d2 1549->1566 1550->1552 1552->1499 1567 4f60d3-4f60d7 1553->1567 1554->1567 1565->1543 1577 4f6098-4f6099 1566->1577 1567->1546 1574 4f60dd-4f60fb call 4fb2f7 1567->1574 1575 4f6326 1569->1575 1576 4f6422-4f6423 call 50c1e3 1569->1576 1574->1546 1587 4f6101-4f6109 1574->1587 1579 4f632b-4f6343 1575->1579 1581 4f6428-4f6444 call 5c97b8 1576->1581 1577->1550 1583 4f6345-4f63a1 1579->1583 1584 4f63a3-4f63c4 1579->1584 1592 4f6446-4f644e call 4f02ba 1581->1592 1593 4f6450 1581->1593 1586 4f63c8-4f63d4 1583->1586 1584->1586 1589 4f63d6-4f63fc 1586->1589 1590 4f6401-4f6416 1586->1590 1587->1550 1591 4f610f-4f6122 call 5c9b2c call 4fbc76 1587->1591 1589->1590 1590->1579 1594 4f641c 1590->1594 1601 4f6127-4f612c 1591->1601 1597 4f6452-4f6471 1592->1597 1593->1597 1594->1576 1597->1507 1602 4f612e-4f6133 1601->1602 1603 4f6154-4f615b call 475980 1601->1603 1602->1603 1604 4f6135-4f6143 call 5c98d2 call 475980 1602->1604 1603->1565 1609 4f615d-4f6163 call 4fb151 1603->1609 1604->1550 1614 4f6149-4f614f call 4fb151 1604->1614 1609->1565 1614->1577
                                                                    APIs
                                                                    • __EH_prolog3_GS.LIBCMT ref: 004F5FC2
                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000304,0047AEED,?,00000001,00000000,00000001), ref: 004F6029
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,0047AE4A,00000000,00000001), ref: 004F604B
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 004F6079
                                                                    • CloseHandle.KERNEL32(00000000), ref: 004F6080
                                                                    • FindResourceW.KERNEL32(00000000,?,00000000,00000304,0047AEED,?,00000001,00000000,00000001,?,0047AE4A,00000000,00000001), ref: 004F617F
                                                                    • LoadResource.KERNEL32(00000000,00000000,?,0047AE4A,00000000,00000001), ref: 004F6192
                                                                    • FreeResource.KERNEL32(00000000,?,0047AE4A,00000000,00000001), ref: 004F61A3
                                                                    • SizeofResource.KERNEL32(00000000,00000000,?,0047AE4A,00000000,00000001), ref: 004F61B1
                                                                    • LockResource.KERNEL32(?,00000000,?,0047AE4A,00000000,00000001), ref: 004F61CD
                                                                    • FreeResource.KERNEL32(00000000,?,?,?,?,0047AE4A,00000000,00000001), ref: 004F61DE
                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0047AE4A,00000000,00000001), ref: 004F61FD
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,0047AE4A,00000000,00000001), ref: 004F6210
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 004F623C
                                                                    • CloseHandle.KERNEL32(00000000), ref: 004F6243
                                                                    • new.LIBCMT ref: 004F642D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: FileResource$CloseCreateFreeHandleReadSize$FindH_prolog3_LoadLockSizeof
                                                                    • String ID: (
                                                                    • API String ID: 361061638-3887548279
                                                                    • Opcode ID: 610951263266de8816b5d626cb659065d0abb9b8a1d8daed8dc93987143e6573
                                                                    • Instruction ID: 382f83a696a174bf22ca73ed3d27293c027cdf52f7e95f6d02db857f2c52593c
                                                                    • Opcode Fuzzy Hash: 610951263266de8816b5d626cb659065d0abb9b8a1d8daed8dc93987143e6573
                                                                    • Instruction Fuzzy Hash: DBD12971800229AFCB259F658C49FBEBB79AF45300F0580EAF645A7252DA38CE41CF55
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • FindResourceW.KERNEL32(00000000,?,?,?,00000001,?,?,00502ECF,?,00000000,?,?,?,source,?,000001F3), ref: 00502C8E
                                                                    • LoadResource.KERNEL32(00000000,00000000,?,00502ECF,?,00000000,?,?,?,source,?,000001F3,count,?,000001F3), ref: 00502CA1
                                                                    • FreeResource.KERNEL32(00000000,?,00502ECF,?,00000000,?,?,?,source,?,000001F3,count,?,000001F3), ref: 00502CAF
                                                                    • SizeofResource.KERNEL32(00000000,00000000,00000000,?,00502ECF,?,00000000,?,?,?,source,?,000001F3,count,?,000001F3), ref: 00502CC9
                                                                    • LockResource.KERNEL32(?,00000000,?,00502ECF,?,00000000,?,?,?,source,?,000001F3,count,?,000001F3), ref: 00502CD3
                                                                    • FreeResource.KERNEL32(00000000,00000000,?,00502ECF,?,00000000,?,?,?,source,?,000001F3,count,?,000001F3), ref: 00502CE6
                                                                      • Part of subcall function 00504B45: _wcslen.LIBCMT ref: 00504B55
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Resource$Free$FindLoadLockSizeof_wcslen
                                                                    • String ID:
                                                                    • API String ID: 1988637492-0
                                                                    • Opcode ID: 0200976a957b6ef4be4a8a4633e104fa5e25a3bf906fa6d4640e6cf3fbb6ac13
                                                                    • Instruction ID: fd3b4967a2f7b2a9d1e81b70bcb6adbf8c833f912d72db2c13036d2025541203
                                                                    • Opcode Fuzzy Hash: 0200976a957b6ef4be4a8a4633e104fa5e25a3bf906fa6d4640e6cf3fbb6ac13
                                                                    • Instruction Fuzzy Hash: 16118BB1500206BBEF116F759D0EEAF3B6EBB98764F00841AFE0597290CB34DC009A71
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 'aO$invalid bit length repeat$invalid block type$invalid stored block lengths$too many length or distance symbols
                                                                    • API String ID: 0-958382215
                                                                    • Opcode ID: da16ad5820bc0ed7c219961912b1c58b861929065c36dccb3cb234af9e8f7fed
                                                                    • Instruction ID: ba773f50f74042e0f0a69f4b5b445f92f5952f6df33f8712a27599857c094b28
                                                                    • Opcode Fuzzy Hash: da16ad5820bc0ed7c219961912b1c58b861929065c36dccb3cb234af9e8f7fed
                                                                    • Instruction Fuzzy Hash: 5552E8B1A0060EAFDB04CF68C9D1AADBBB1FF48315F14812AE959DB741D734EA50CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: bad dist$bad huffman code
                                                                    • API String ID: 0-3023303583
                                                                    • Opcode ID: 086d7b62245a1104eb1975376d7ec73f45b1e1658b7f2db233af408fbb365647
                                                                    • Instruction ID: b77e2c56ce37ad33cf1c22690368a636656fbc9cb122a610e57ef5b0bb15f667
                                                                    • Opcode Fuzzy Hash: 086d7b62245a1104eb1975376d7ec73f45b1e1658b7f2db233af408fbb365647
                                                                    • Instruction Fuzzy Hash: D081D532710A024BD7298E29C8D49BE7BE2FFC5310B54CA3DE597876DADA34E485C750
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __EH_prolog3_GS.LIBCMT ref: 00502D13
                                                                    • new.LIBCMT ref: 00502F1E
                                                                      • Part of subcall function 005156F5: __EH_prolog3.LIBCMT ref: 005156FC
                                                                      • Part of subcall function 005156F5: new.LIBCMT ref: 0051576A
                                                                      • Part of subcall function 005156F5: new.LIBCMT ref: 00515795
                                                                      • Part of subcall function 005156F5: new.LIBCMT ref: 005157D7
                                                                      • Part of subcall function 005156F5: new.LIBCMT ref: 00515802
                                                                      • Part of subcall function 005156F5: new.LIBCMT ref: 00515844
                                                                    • _wcslen.LIBCMT ref: 00503071
                                                                    • new.LIBCMT ref: 005030D2
                                                                    • new.LIBCMT ref: 0050310F
                                                                    • new.LIBCMT ref: 00503150
                                                                      • Part of subcall function 005C97B8: Concurrency::cancel_current_task.LIBCPMT ref: 005C97D0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Concurrency::cancel_current_taskH_prolog3H_prolog3__wcslen
                                                                    • String ID: $ActiveX$Button$CheckBox$ChildLayout$Combo$ComboBox$Container$Control$DateTime$Default$Edit$Flash$Font$GifAnim$HorizontalLayout$IContainer$Image$Include$Label$List$ListContainerElement$ListHeader$ListHeaderItem$ListLabelElement$ListTextElement$Option$Progress$RichEdit$ScrollBar$Slider$TabLayout$Text$TileLayout$TreeNode$TreeNodeUI$TreeView$VerticalLayout$WebBrowser$count$source$;P
                                                                    • API String ID: 2476553467-2645509099
                                                                    • Opcode ID: 1f7f7fc7d84bd8317c49eae6c3ef0fdf62a6f939e238ad7df0d05a62f64995a5
                                                                    • Instruction ID: 9cf8b5252166bff5ac4213e2dc0c17ec4bbbcd29dcd0353771fc4b3b5903bddd
                                                                    • Opcode Fuzzy Hash: 1f7f7fc7d84bd8317c49eae6c3ef0fdf62a6f939e238ad7df0d05a62f64995a5
                                                                    • Instruction Fuzzy Hash: 1962E371A4520B9ADB24AB75DC5ABAE7BECBF85710F1040BDF505E62C2EF708B408B54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 467 502062-5020b2 call 504a97 call 504b3a 472 5020b4-5020b6 467->472 473 5020bb-5020bd 467->473 474 502c36-502c46 call 5c950e 472->474 475 5020c3-5020dc call 504a45 473->475 476 502c1d-502c31 call 502d09 473->476 482 5024e7-5024f4 call 504b3a 475->482 476->474 485 5020e1-5020fd call 504a7b call 5f7169 482->485 486 5024fa-502514 call 504a7b call 5f7169 482->486 495 502103-502126 call 504923 485->495 496 50220e-50221d call 5f7169 485->496 486->476 497 50251a-502523 call 475c20 486->497 507 5024c6-5024e5 call 504abc 495->507 508 50212c 495->508 505 502223-50226b call 504923 496->505 506 50240b-50241a call 5f7169 496->506 497->476 504 502529-502544 call 504923 497->504 504->476 519 50254a-502575 call 504943 call 504988 call 5f7169 504->519 505->507 520 502271-50229c call 504943 call 504988 call 5f7169 505->520 506->507 522 502420-502439 call 504923 506->522 507->482 512 50212e-502162 call 504943 call 504988 call 5f7169 508->512 540 5021a4-5021b8 call 5f7169 512->540 541 502164 512->541 553 5025b7-5025c6 call 5f7169 519->553 554 502577-5025ad call 5e690d * 2 call 475c80 519->554 549 5022ab-5022ba call 5f7169 520->549 550 50229e-5022a6 520->550 522->507 531 50243f 522->531 536 502441-502479 call 504943 call 504988 call 5f7169 531->536 587 502483-50249d call 5f7169 536->587 588 50247b-502481 536->588 562 5021c4-5021d8 call 5f7169 540->562 563 5021ba-5021c2 540->563 545 502166 541->545 551 50216c 545->551 574 5022bc-5022da call 5e690d 549->574 575 5022df-5022ee call 5f7169 549->575 557 50238f 550->557 559 502172-502179 551->559 571 5025cc-50264a call 5e690d * 4 call 475d00 553->571 572 50264f-50265e call 5f7169 553->572 601 5025b2 KiUserCallbackDispatcher 554->601 565 502395-5023a8 557->565 559->512 567 50217b-502189 559->567 562->545 581 5021da-5021e0 562->581 563->551 565->520 573 5023ae-5023b6 565->573 567->507 576 50218f-50219f call 47ae70 567->576 667 502c04-502c17 571->667 602 502664-5026e2 call 5e690d * 4 call 475d50 572->602 603 5026e7-5026f6 call 5f7169 572->603 573->507 583 5023bc-5023df call 47a820 573->583 574->565 607 5022f0-502307 call 5f7169 575->607 608 502309-502318 call 5f7169 575->608 576->507 591 5021e2-5021e9 CharNextW 581->591 592 5021eb-502209 call 5e6939 581->592 583->507 616 5023e5-502406 call 47a6b0 583->616 598 50249e-5024a5 587->598 588->598 591->592 592->559 598->536 610 5024a7-5024b5 598->610 601->553 602->667 626 502738-502747 call 5f7169 603->626 627 5026f8-502733 call 5e690d * 2 call 475db0 603->627 633 502387-502388 607->633 628 502333-502342 call 5f7169 608->628 629 50231a-502331 call 5f7169 608->629 610->507 612 5024b7-5024c1 call 47b1b0 610->612 612->507 616->507 651 502789-502798 call 5f7169 626->651 652 502749-502784 call 5e690d * 2 call 475e10 626->652 627->667 648 502344-50235b call 5f7169 628->648 649 50235d-50236c call 5f7169 628->649 629->633 635 502389 633->635 635->557 648->633 649->635 673 50236e-502381 call 5f7169 649->673 668 5027da-5027e9 call 5f7169 651->668 669 50279a-5027d5 call 5e690d * 2 call 475e40 651->669 652->667 667->476 667->519 685 5027eb-5027fa call 5e67bf call 475e70 668->685 686 5027ff-50280e call 5f7169 668->686 669->667 673->633 685->667 694 502810-50282e call 5f7169 call 475f60 686->694 695 502833-502842 call 5f7169 686->695 694->667 703 502844-50284a 695->703 704 50287b-50288a call 5f7169 695->704 707 502855-502876 call 5e6939 call 47a4d0 703->707 708 50284c-502853 CharNextW 703->708 712 5028c3-5028d2 call 5f7169 704->712 713 50288c-502892 704->713 707->667 708->707 721 5028d4-5028da 712->721 722 50290b-50291a call 5f7169 712->722 716 502894-50289b CharNextW 713->716 717 50289d-5028be call 5e6939 call 47a520 713->717 716->717 717->667 724 5028e5-502906 call 5e6939 call 47a570 721->724 725 5028dc-5028e3 CharNextW 721->725 732 502953-502962 call 5f7169 722->732 733 50291c-502922 722->733 724->667 725->724 742 502964-50296a 732->742 743 50299b-5029aa call 5f7169 732->743 736 502924-50292b CharNextW 733->736 737 50292d-50294e call 5e6939 call 47a5c0 733->737 736->737 737->667 745 502975-502996 call 5e6939 call 47a610 742->745 746 50296c-502973 CharNextW 742->746 751 5029c7-5029d6 call 5f7169 743->751 752 5029ac-5029c2 call 5e67bf call 476280 call 4faa2f 743->752 745->667 746->745 761 5029f3-502a02 call 5f7169 751->761 762 5029d8-5029ee call 5e67bf call 476280 call 4fa9f6 751->762 752->667 769 502a04-502a1a call 5e67bf call 476280 call 4fa8d7 761->769 770 502a1f-502a2e call 5f7169 761->770 762->667 769->667 781 502a30-502a72 call 5e690d * 2 call 476280 call 4fa955 770->781 782 502a77-502a86 call 5f7169 770->782 781->667 791 502ac6-502ad5 call 5f7169 782->791 792 502a88-502a8e 782->792 801 502b7b-502b8a call 5f7169 791->801 802 502adb-502b76 call 5e690d * 4 call 476280 call 4fa99f 791->802 795 502a90-502a97 CharNextW 792->795 796 502a99-502ac1 call 5e6939 call 476280 call 4fa8a7 792->796 795->796 796->667 813 502b8c-502b9b call 476280 call 4fa912 801->813 814 502b9d-502bac call 5f7169 801->814 802->667 813->667 825 502bd5-502be4 call 5f7169 814->825 826 502bae-502bd3 call 5f7169 call 476280 call 4faa6b 814->826 825->667 835 502be6-502bff call 5f7169 call 4762a0 825->835 826->667 835->667
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Default$Font$Image$Window$alpha$bktrans$bold$caption$default$defaultfontcolor$disabledfontcolor$gdiplustext$italic$linkfontcolor$linkhoverfontcolor$mask$maxinfo$mininfo$name$restype$roundcorner$selectedcolor$shadowcolor$shadowcorner$shadowdarkness$shadowimage$shadowposition$shadowsharpness$shadowsize$showshadow$size$sizebox$true$underline$value
                                                                    • API String ID: 0-2202879338
                                                                    • Opcode ID: c5d8dd58bc7dc8ce7c63a94e6550c7e11fce0255420e9c403d5706e466891098
                                                                    • Instruction ID: a5f28e3172a4e2ac50814bfd754fa4f194b416ee88e8d7d8fb3c154c2e5d24a4
                                                                    • Opcode Fuzzy Hash: c5d8dd58bc7dc8ce7c63a94e6550c7e11fce0255420e9c403d5706e466891098
                                                                    • Instruction Fuzzy Hash: 95621B71A0461A6EDB24AB20DC5AEFF77BABFD4714F0000AEF509E31C1EA354E948E55
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 846 486c10-486c7a call 4d7a40 call 5e2ec0 call 4da5f0 853 486c7c-486c8a 846->853 854 486ce0-486cea 846->854 857 486c98 853->857 858 486c8c-486c96 853->858 855 486cec-486cf6 854->855 856 486d2e-486d3c 854->856 855->856 860 486cf8-486d05 855->860 861 486d4a 856->861 862 486d3e-486d48 856->862 859 486ca2-486cdb call 47e710 857->859 858->859 869 486dee-486e58 call 48bf00 call 5c97b8 call 4868f0 859->869 860->856 864 486d07-486d11 860->864 865 486d54-486d8d call 47e710 861->865 862->865 864->856 867 486d13-486d1d 864->867 865->869 867->856 870 486d1f-486d2c 867->870 885 486e5a-486e64 869->885 886 486e66 869->886 870->856 873 486d8f-486d9d 870->873 874 486dab 873->874 875 486d9f-486da9 873->875 877 486db5-486deb call 47e710 874->877 875->877 877->869 887 486e70-486f80 call 485d60 call 485e40 call 49bb80 call 49bbe0 call 49bb80 call 485de0 GetTickCount call 4b0e90 GetTickCount call 5ca3a1 885->887 886->887 904 486f8e 887->904 905 486f82-486f8c 887->905 906 486f98-486faa 904->906 905->906 907 486fb8 906->907 908 486fac-486fb6 906->908 909 486fc2-4870b7 call 485d60 call 485e40 call 49bb80 call 49bbe0 call 49bb80 call 49bc40 call 49bb80 call 49bc70 call 485de0 call 5e2ec0 call 49bca0 907->909 908->909 932 4870b9-4870c3 909->932 933 4870c5 909->933 934 4870cf-4870e4 call 4dc890 932->934 933->934 936 4870e9-48710f call 4dc930 934->936 939 487111-487124 call 4872f0 936->939 940 487126 936->940 942 487130-487159 call 48b6e0 939->942 940->942 946 48715f-487186 call 48b6e0 942->946 947 4872b0-4872cc call 48bcd0 942->947 946->947 953 48718c-4871d7 call 48b660 call 48b7c0 946->953 952 4872d2-4872ea call 5c950e 947->952 960 4871d9-487200 call 5c98d2 953->960 961 48720a-4872ae call 5c9b2c call 5e2ec0 call 48b7e0 call 5eae90 call 48bcd0 * 2 953->961 960->961 961->952
                                                                    APIs
                                                                      • Part of subcall function 004D7A40: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 004D7A57
                                                                      • Part of subcall function 004D7A40: GetProcAddress.KERNEL32(00000000), ref: 004D7A5E
                                                                      • Part of subcall function 004D7A40: GetCurrentProcess.KERNEL32(00000000), ref: 004D7A71
                                                                      • Part of subcall function 004DA5F0: GetModuleFileNameW.KERNEL32(00000000,?,00000100), ref: 004DA68D
                                                                      • Part of subcall function 004DA5F0: wsprintfW.USER32 ref: 004DA6E2
                                                                      • Part of subcall function 004DA5F0: GetFileAttributesW.KERNEL32(?), ref: 004DA6F2
                                                                    • _fwprintf.LIBCONCRTD ref: 00486CD3
                                                                    • _fwprintf.LIBCONCRTD ref: 00486D85
                                                                    • _fwprintf.LIBCONCRTD ref: 00486DE6
                                                                    • new.LIBCMT ref: 00486E07
                                                                    • GetTickCount.KERNEL32 ref: 00486EFF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _fwprintf$FileModule$AddressAttributesCountCurrentHandleNameProcProcessTickwsprintf
                                                                    • String ID: GetDownloaderInfo($ GetDownloaderInfo($&package_type=2$&package_type=2$&package_type=2$) return $)...$..\..\..\..\src\CConfigure.cpp$..\..\..\..\src\CConfigure.cpp$6bg$</Downloader>$<Downloader>$Async$Async$AsyncGetCbsTime$Other$Sync$Sync$SyncGetCbsTime$com$http://update.tenorshare.com/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s$https://update.tenorshare.cn/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s$https://update.tenorshare.com/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s$int __thiscall CConfigure::getDownloadInfoXml(bool)$int __thiscall CConfigure::getDownloadInfoXml(bool)$ag$ag
                                                                    • API String ID: 2873216699-3520792415
                                                                    • Opcode ID: 6d463d6b7e1d47c122f178fd58190eff4c1a12e4d62d134c7a3109ad422841dd
                                                                    • Instruction ID: b02296927ded7b9667763099b363d12c1688b26b96581dbeacecf99579ac3a63
                                                                    • Opcode Fuzzy Hash: 6d463d6b7e1d47c122f178fd58190eff4c1a12e4d62d134c7a3109ad422841dd
                                                                    • Instruction Fuzzy Hash: 64024970A003289FDB6AEF64CC55BAEB7B9AB44704F1445DDE0096B281DB74AF84CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1299 4f4f62-4f4fa3 call 5c9fc4 1302 4f4fa9-4f4fab 1299->1302 1303 4f5766 1299->1303 1302->1303 1304 4f4fb1-4f5045 call 4f0296 call 4f02ba * 3 1302->1304 1305 4f5768-4f576d call 5c9f7f 1303->1305 1316 4f5046-4f5056 1304->1316 1317 4f56ad-4f56b7 1316->1317 1318 4f505c-4f5065 1316->1318 1317->1316 1319 4f56bd-4f572e call 4f4e1e 1317->1319 1318->1317 1320 4f506b-4f5081 call 4f0683 * 2 1318->1320 1323 4f5733-4f5764 call 4f03ac * 4 1319->1323 1330 4f5091-4f5097 1320->1330 1323->1305 1332 4f5099 1330->1332 1333 4f5083-4f5086 1330->1333 1336 4f50e0-4f50e6 1332->1336 1335 4f5088-4f508f CharNextW 1333->1335 1333->1336 1335->1330 1337 4f509b-4f50a1 1336->1337 1338 4f50e8 1336->1338 1340 4f50f8-4f50fe 1337->1340 1342 4f50a3-4f50a6 1337->1342 1338->1340 1343 4f50ea-4f50ed 1340->1343 1344 4f5100-4f510c 1340->1344 1342->1340 1346 4f50a8-4f50c1 CharNextW 1342->1346 1343->1344 1347 4f50ef-4f50f6 CharNextW 1343->1347 1348 4f56a2-4f56ac 1344->1348 1349 4f5112 1344->1349 1350 4f50da-4f50df 1346->1350 1351 4f50c3-4f50d8 call 4f04d9 1346->1351 1347->1340 1348->1317 1352 4f5122-4f5128 1349->1352 1350->1336 1351->1350 1354 4f512a-4f5136 1352->1354 1355 4f5114-4f5117 1352->1355 1354->1348 1358 4f513c 1354->1358 1355->1354 1357 4f5119-4f5120 CharNextW 1355->1357 1357->1352 1359 4f517b-4f5181 1358->1359 1360 4f513e-4f5141 1359->1360 1361 4f5183-4f518c 1359->1361 1360->1361 1363 4f5143-4f515c CharNextW 1360->1363 1361->1348 1362 4f5192-4f519f call 4f0a3e 1361->1362 1370 4f5689 1362->1370 1371 4f51a5-4f51b7 call 4f046e 1362->1371 1365 4f515e-4f5173 call 4f04d9 1363->1365 1366 4f5175-4f517a 1363->1366 1365->1366 1366->1359 1373 4f568b-4f5697 1370->1373 1376 4f51bd-4f51cf call 4f046e 1371->1376 1377 4f55d3-4f55db 1371->1377 1373->1348 1375 4f5699-4f569c 1373->1375 1375->1320 1375->1348 1376->1377 1386 4f51d5-4f51e7 call 4f046e 1376->1386 1378 4f55dd-4f5659 call 4f4e1e 1377->1378 1379 4f565c-4f5680 call 4f042b call 4f046e 1377->1379 1378->1379 1379->1370 1393 4f5682-4f5683 1379->1393 1391 4f528d-4f529f call 4f046e 1386->1391 1392 4f51ed-4f51f5 1386->1392 1402 4f52a5-4f533f call 4f08e4 call 5e690d * 4 1391->1402 1403 4f5350-4f5362 call 4f046e 1391->1403 1394 4f51f7-4f5273 call 4f4e1e 1392->1394 1395 4f5276-4f5288 call 4f042b 1392->1395 1393->1370 1394->1395 1395->1393 1402->1373 1441 4f5345-4f534b 1402->1441 1408 4f53e9-4f53fb call 4f046e 1403->1408 1409 4f5368-4f53e4 call 4f08e4 call 5e690d * 4 1403->1409 1418 4f5482-4f5494 call 4f046e 1408->1418 1419 4f5401-4f547d call 4f08e4 call 5e690d * 4 1408->1419 1409->1370 1431 4f54dc-4f54ee call 4f046e 1418->1431 1432 4f5496-4f54b7 call 4f0482 1418->1432 1419->1370 1445 4f5518-4f552a call 4f046e 1431->1445 1446 4f54f0-4f5513 call 4f08e4 call 5e6939 1431->1446 1447 4f54b9-4f54c1 call 4f08e4 1432->1447 1448 4f54c3 call 4f08e4 1432->1448 1441->1373 1463 4f552c-4f5550 call 4f08e4 call 5f7169 1445->1463 1464 4f5555-4f5567 call 4f046e 1445->1464 1446->1370 1460 4f54c8-4f54d7 call 5e6939 1447->1460 1448->1460 1460->1373 1463->1370 1473 4f5569-4f558d call 4f08e4 call 5f7169 1464->1473 1474 4f5592-4f55a4 call 4f046e 1464->1474 1473->1370 1474->1370 1482 4f55aa-4f55ce call 4f08e4 call 5f7169 1474->1482 1482->1370
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CharNext$H_prolog3_
                                                                    • String ID: corner$dest$fade$file$hole$mask$res$restype$source$true$xtiled$ytiled
                                                                    • API String ID: 3311536633-1809293843
                                                                    • Opcode ID: 6d91a4f344e7ab147b022bd640da083176854359296116fe51b47c737248a908
                                                                    • Instruction ID: 044583fb601c4fb6a45041f26f58954f9fc3b7d0d8006f4dd5adabb16a589487
                                                                    • Opcode Fuzzy Hash: 6d91a4f344e7ab147b022bd640da083176854359296116fe51b47c737248a908
                                                                    • Instruction Fuzzy Hash: 8022903180052DAACF20EF65CD4ABEEB7B5EF45700F4401DAEB49A7242DA345E86CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1617 4dccb0-4dccf8 1618 4dcd02-4dcd09 1617->1618 1619 4dcd0b-4dcd12 1618->1619 1620 4dcd50-4dcd57 1618->1620 1619->1620 1621 4dcd14-4dcd2f 1619->1621 1622 4dcd59-4dcd7c call 4dc960 1620->1622 1623 4dcd81-4dcd88 1620->1623 1628 4dcd34-4dcd4a 1621->1628 1622->1623 1625 4dcd8e-4dcd9d call 4dd8d0 1623->1625 1626 4dcf6b-4dcf85 call 5c950e 1623->1626 1634 4dcdbf-4dcdc6 1625->1634 1635 4dcd9f-4dcda8 1625->1635 1631 4dcd4c 1628->1631 1632 4dcd4e 1628->1632 1631->1620 1632->1618 1638 4dcdcc-4dcde0 WaitForSingleObject 1634->1638 1639 4dcf66 1634->1639 1636 4dcdaf-4dcdba Sleep 1635->1636 1637 4dcdaa 1635->1637 1636->1639 1637->1626 1638->1639 1640 4dcde6-4dce2d ResetEvent call 4dd8b0 call 4dcf90 call 4dd870 SetEvent 1638->1640 1639->1623 1647 4dcf54-4dcf61 call 4dcc60 1640->1647 1648 4dce33-4dcf31 call 48bf00 call 4dd060 call 48c030 * 3 call 4dd6a0 call 48b7e0 * 5 1640->1648 1647->1639 1672 4dcf36-4dcf4f call 48bcd0 * 2 1648->1672 1672->1647
                                                                    APIs
                                                                    • Sleep.KERNEL32(000001F4,A1986743), ref: 004DCDB4
                                                                    • WaitForSingleObject.KERNEL32(0000049C,000000C8,A1986743), ref: 004DCDD8
                                                                    • ResetEvent.KERNEL32(0000049C), ref: 004DCDEC
                                                                    • SetEvent.KERNEL32(0000049C,00000000), ref: 004DCE20
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DCEEA
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DCEF3
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DCEFF
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DCF08
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DCF13
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_$Event$ObjectResetSingleSleepWait
                                                                    • String ID: 2.7.11.0$Downloader$DownloaderInfo00$UA-114767297-1$launchDownloader001
                                                                    • API String ID: 2165190465-1652618504
                                                                    • Opcode ID: 908609d1b461168d3ea8246e6dbd2fe83809ba29de0b94accb71a3ba77ef9856
                                                                    • Instruction ID: 96d77cc679eb7087a43a10ab6931405bcc64c6e5585a74e228c1c6113c3db172
                                                                    • Opcode Fuzzy Hash: 908609d1b461168d3ea8246e6dbd2fe83809ba29de0b94accb71a3ba77ef9856
                                                                    • Instruction Fuzzy Hash: 95717F70900219DFDB14EBA4CCA5FEEBBB2AB45704F0481AFE409A7391DB345A84DF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?,A1986743), ref: 004DC60E
                                                                      • Part of subcall function 004D8B00: GetFileVersionInfoSizeW.KERNELBASE(004DC627,00000000), ref: 004D8B8E
                                                                      • Part of subcall function 004D8B00: GetFileVersionInfoW.KERNELBASE(004DC627,00000000,00000000,?), ref: 004D8BBB
                                                                      • Part of subcall function 004D8B00: 74D31560.VERSION(?,0069B5CC,00000000,?), ref: 004D8BF7
                                                                      • Part of subcall function 0048BD20: operator!=.LIBCPMTD ref: 0048BD7B
                                                                      • Part of subcall function 0048BD20: operator!=.LIBCPMTD ref: 0048BDAD
                                                                      • Part of subcall function 004D7A40: GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 004D7A57
                                                                      • Part of subcall function 004D7A40: GetProcAddress.KERNEL32(00000000), ref: 004D7A5E
                                                                      • Part of subcall function 004D7A40: GetCurrentProcess.KERNEL32(00000000), ref: 004D7A71
                                                                    • CreateExportObj.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?,?,000000FE,FFFFFFFF,?,?,00000000,000000FF,006A0D50,00000000,A1986743,?,?,?,?), ref: 004DC7CB
                                                                    • CreateEventW.KERNEL32(00000000,00000001,00000001,UserLogMutex,?,?,000000FE,FFFFFFFF,?,?,00000000,000000FF,006A0D50,00000000,A1986743), ref: 004DC7E9
                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000DCCB0,?,00000000,00000000), ref: 004DC808
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile$InfoModuleVersionoperator!=$AddressCurrentD.5531.23089D31560EventExportHandleNameObj.ProcProcessSizeThread
                                                                    • String ID: 32bit$ 64bit$2.7.11.0$English$Hj$United Kingdom$Unknown$Unknown$UserLogMutex
                                                                    • API String ID: 4096864814-3680371938
                                                                    • Opcode ID: 0ffb09cf151f8583d54759b42e79bd454d7d02ab4ed18695ca4ede658163ebaa
                                                                    • Instruction ID: 6cd0b861d86779849d5dd939d6c1fb631f10423eece722d8823fa76ce715d40a
                                                                    • Opcode Fuzzy Hash: 0ffb09cf151f8583d54759b42e79bd454d7d02ab4ed18695ca4ede658163ebaa
                                                                    • Instruction Fuzzy Hash: 8E616D71910218AFDB24EF64CC99FEEB775EF44704F0046AEE109662A1DB742E84CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1728 4fb91f-4fb942 call 5ca540 1731 4fb948-4fb94c 1728->1731 1732 4fbbe1-4fbbe7 1728->1732 1735 4fb95e-4fb962 1731->1735 1736 4fb94e-4fb952 1731->1736 1733 4fbc2a-4fbc30 call 4fe5c7 1732->1733 1734 4fbbe9-4fbbed 1732->1734 1744 4fbc35-4fbc3c 1733->1744 1738 4fbbef-4fbbf6 call 4fe146 1734->1738 1739 4fbbf7-4fbc00 1734->1739 1741 4fb96c-4fb978 1735->1741 1742 4fb964-4fb96b call 4fe146 1735->1742 1736->1735 1740 4fb954-4fb959 1736->1740 1738->1739 1739->1740 1746 4fbc06-4fbc09 1739->1746 1747 4fbc5d-4fbc6d call 5c950e 1740->1747 1741->1740 1743 4fb97a-4fb97d 1741->1743 1742->1741 1749 4fb98f-4fb994 1743->1749 1750 4fb97f-4fb985 call 4fe1d7 1743->1750 1751 4fbc3e-4fbc43 1744->1751 1752 4fbc45-4fbc5b call 4fe146 1744->1752 1754 4fbc0b-4fbc11 call 4fe1d7 1746->1754 1755 4fbc19-4fbc1f 1746->1755 1761 4fb987-4fb989 call 4fe216 1749->1761 1762 4fb996-4fb9ac call 4fb3da 1749->1762 1774 4fb98e 1750->1774 1751->1747 1752->1747 1776 4fbc18 1754->1776 1758 4fbc13 call 4fe216 1755->1758 1759 4fbc21 call 4fe35d 1755->1759 1758->1776 1773 4fbc26-4fbc27 1759->1773 1761->1774 1777 4fb9ae-4fb9b2 1762->1777 1778 4fb9eb-4fb9f7 1762->1778 1773->1733 1774->1749 1776->1755 1781 4fb9bb-4fb9e9 call 4fb800 call 4fb1a3 1777->1781 1782 4fb9b4-4fb9b6 1777->1782 1779 4fbb1d-4fbb20 1778->1779 1780 4fb9fd-4fba07 1778->1780 1785 4fbb2c-4fbb4a call 4fe35d call 4fe5c7 1779->1785 1786 4fbb22-4fbb27 1779->1786 1783 4fba0d-4fba17 1780->1783 1784 4fbb04-4fbb1b CreateFileW 1780->1784 1781->1782 1782->1747 1788 4fba21-4fba28 1783->1788 1784->1779 1800 4fbb7c-4fbb7e 1785->1800 1786->1747 1793 4fba2a-4fba31 1788->1793 1794 4fba33 1788->1794 1793->1794 1797 4fba36-4fba3f 1793->1797 1794->1797 1797->1788 1799 4fba41-4fba43 1797->1799 1799->1784 1801 4fba49-4fba69 call 5f71a9 1799->1801 1802 4fbb4c 1800->1802 1803 4fbb80 1800->1803 1811 4fba6f-4fba86 1801->1811 1812 4fbc70-4fbc7e call 5c9c58 1801->1812 1805 4fbb4e-4fbb68 WriteFile 1802->1805 1806 4fbb87-4fbb91 GetFileType 1802->1806 1803->1806 1805->1803 1808 4fbb6a-4fbb79 call 4fe5c7 1805->1808 1809 4fbbb8-4fbbbc 1806->1809 1810 4fbb93-4fbb9a 1806->1810 1808->1800 1815 4fbbbe-4fbbbf CloseHandle 1809->1815 1816 4fbbc5-4fbbdf call 4fe146 1809->1816 1810->1809 1814 4fbb9c-4fbbb2 SetFileTime 1810->1814 1817 4fbaab 1811->1817 1818 4fba88-4fba95 1811->1818 1829 4fbc87-4fbc8a 1812->1829 1830 4fbc80-4fbc85 1812->1830 1814->1809 1815->1816 1816->1747 1821 4fbab2-4fbaeb call 5e192c * 2 1817->1821 1818->1817 1823 4fba97-4fba9f 1818->1823 1838 4fbaed-4fbb01 call 4fb1a3 1821->1838 1839 4fbb02 1821->1839 1823->1817 1825 4fbaa1-4fbaa9 1823->1825 1825->1821 1832 4fbc8c-4fbc91 1829->1832 1833 4fbc93-4fbc9f 1829->1833 1834 4fbca7-4fbcad 1830->1834 1832->1834 1833->1834 1836 4fbca2 call 4fb91f 1833->1836 1836->1834 1838->1839 1839->1784
                                                                    APIs
                                                                    • _wcsstr.LIBVCRUNTIME ref: 004FBABE
                                                                    • _wcsstr.LIBVCRUNTIME ref: 004FBAD1
                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000010,00000000), ref: 004FBB15
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsstr$CreateFile
                                                                    • String ID: ../$..\$/$:$\
                                                                    • API String ID: 2250854609-3971031215
                                                                    • Opcode ID: 324e99ae9314d0e9c87cad07eca938192918acae7559f9814705e974725b463f
                                                                    • Instruction ID: 794240b0731361844fbd25a3d5e67040e7d34b57b3d68fb28017675a739f2ade
                                                                    • Opcode Fuzzy Hash: 324e99ae9314d0e9c87cad07eca938192918acae7559f9814705e974725b463f
                                                                    • Instruction Fuzzy Hash: C2A1C4B190021D9BDB24AF65DC45AFBB7B8EB05314F10429BF71593291DB38AE80CBD9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1842 504b93-504bd0 call 5c9fc4 call 504f22 call 475960 call 4f0271 call 475970 call 4f0a3e 1855 504bd6-504c0e call 4f04be call 4f08e4 CreateFileW 1842->1855 1856 504ca9-504cc1 call 475970 call 4f04a1 call 475980 1842->1856 1865 504c10-504c15 1855->1865 1866 504c1a-504c25 GetFileSize 1855->1866 1874 504cc3-504cc8 call 475990 1856->1874 1875 504cca-504cde call 4f08e4 call 4fb8b6 1856->1875 1868 504d8a-504d93 call 504f4a 1865->1868 1869 504d23-504d2a 1866->1869 1870 504c2b-504c31 1866->1870 1881 504dc0-504dd2 call 4f03ac call 5c9f7f 1868->1881 1869->1868 1872 504d34-504d3b 1870->1872 1873 504c37-504c76 call 5c9b2c ReadFile CloseHandle 1870->1873 1872->1868 1887 504c92-504ca4 call 504dd5 1873->1887 1888 504c78-504c8d call 5c98d2 call 504f22 1873->1888 1889 504ce1-504ce5 1874->1889 1875->1889 1902 504db8-504dba call 5c98d2 1887->1902 1888->1868 1892 504cf2-504d0e call 4fb2f7 1889->1892 1893 504ce7-504ced 1889->1893 1905 504d10-504d17 1892->1905 1906 504d19-504d21 1892->1906 1893->1868 1909 504dbf 1902->1909 1905->1868 1906->1869 1908 504d2c-504d32 1906->1908 1908->1872 1910 504d3d-504d54 call 5c9b2c call 4fbc76 1908->1910 1909->1881 1914 504d59-504d5e 1910->1914 1915 504d60-504d65 1914->1915 1916 504d95-504d9c call 475980 1914->1916 1915->1916 1918 504d67-504d7a call 5c98d2 call 475980 1915->1918 1921 504da5-504db7 call 504dd5 1916->1921 1922 504d9e-504da4 call 4fb151 1916->1922 1930 504d83-504d85 1918->1930 1931 504d7c-504d82 call 4fb151 1918->1931 1921->1902 1922->1921 1930->1868 1931->1930
                                                                    APIs
                                                                    • __EH_prolog3_GS.LIBCMT ref: 00504B9D
                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,000002C4,00502C81,?,00000000,?,00000001,?), ref: 00504BFE
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00502ECF,?,00000000,?,?,?,source,?,000001F3,count,?,000001F3), ref: 00504C1B
                                                                    • ReadFile.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 00504C5E
                                                                    • CloseHandle.KERNEL32(?), ref: 00504C6A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseCreateH_prolog3_HandleReadSize
                                                                    • String ID: Could not find ziped file$Could not read file$Could not unzip file$Error opening file$Error opening zip file$File is empty$File too large
                                                                    • API String ID: 3380832384-2950584456
                                                                    • Opcode ID: dd0a38c51002d4e5ffcba9dae1a2808a48d3d5c5b11939dc9cefb41744723b3f
                                                                    • Instruction ID: 47a982466a575c1d216e5423e6868a3cea2ec75c94655ba7759a30092921a80e
                                                                    • Opcode Fuzzy Hash: dd0a38c51002d4e5ffcba9dae1a2808a48d3d5c5b11939dc9cefb41744723b3f
                                                                    • Instruction Fuzzy Hash: 5C51C5F2500219BAFB217B219C4AFBE6A2DBF81704F10809FF709661D2DE794D419E25
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD734
                                                                      • Part of subcall function 0048B7E0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048B809
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD73D
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD746
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD74F
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD758
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD763
                                                                    • _fwprintf.LIBCONCRTD ref: 004DD775
                                                                      • Part of subcall function 0047E710: _fread.LIBCMTD ref: 0047E72F
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD799
                                                                    Strings
                                                                    • &tid=G-SLH4HH21YG&ep.ts_productname=Downloader&ep.ts_productversion=%s&ep.ts_category=%s&ep.ts_action=%s&ep.ts_label=%s&en=%s%s, xrefs: 004DD769
                                                                    • 2.7.11.0, xrefs: 004DD75E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_$Base::Concurrency::details::ContextIdentityQueueWork_fread_fwprintf
                                                                    • String ID: &tid=G-SLH4HH21YG&ep.ts_productname=Downloader&ep.ts_productversion=%s&ep.ts_category=%s&ep.ts_action=%s&ep.ts_label=%s&en=%s%s$2.7.11.0
                                                                    • API String ID: 4055329430-729109691
                                                                    • Opcode ID: c90734b04104d3d0c2949891edc050b92061e62b571d7ab3326d3038ffb4ee69
                                                                    • Instruction ID: 954bcfd6baa22ea4b98bee5a450572d4ecef13da98265b593b975b2e4aa05084
                                                                    • Opcode Fuzzy Hash: c90734b04104d3d0c2949891edc050b92061e62b571d7ab3326d3038ffb4ee69
                                                                    • Instruction Fuzzy Hash: 24415A7080028CDFCB14EB65CC56BEEB775AF14308F04459EF459A32A1DBB86B88DB95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 1985 4d9930-4d996e RegOpenKeyExW 1986 4d99a4-4d9a0d call 5e2ec0 RegQueryValueExW 1985->1986 1987 4d9970-4d999b RegOpenKeyExW 1985->1987 1993 4d9a0f-4d9a45 RegQueryValueExW 1986->1993 1994 4d9a58-4d9a6e RegCloseKey call 5f0ae3 1986->1994 1987->1986 1988 4d999d-4d999f 1987->1988 1990 4d9aa9-4d9ab6 call 5c950e 1988->1990 1993->1994 1996 4d9a47-4d9a56 RegCloseKey 1993->1996 1998 4d9a73-4d9a8b call 5ca750 1994->1998 1996->1990 2001 4d9a8d-4d9a97 1998->2001 2002 4d9a99 1998->2002 2003 4d9aa3 2001->2003 2002->2003 2003->1990
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion,00000000,000F003F,?), ref: 004D995B
                                                                    • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,000F003F,?), ref: 004D9988
                                                                    • RegQueryValueExW.KERNEL32(?,CurrentBuild,00000000,00000001,?,00000104), ref: 004D99FA
                                                                    • RegQueryValueExW.ADVAPI32(?,CurrentBuildNumber,00000000,00000001,?,00000104), ref: 004D9A32
                                                                    • RegCloseKey.ADVAPI32(?), ref: 004D9A4E
                                                                    • RegCloseKey.KERNEL32(?), ref: 004D9A5F
                                                                    Strings
                                                                    • SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 004D997E
                                                                    • CurrentBuildNumber, xrefs: 004D9A26
                                                                    • SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion, xrefs: 004D9951
                                                                    • CurrentBuild, xrefs: 004D99EE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: CurrentBuild$CurrentBuildNumber$SOFTWARE\Microsoft\Windows NT\CurrentVersion$SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion
                                                                    • API String ID: 3677997916-114571279
                                                                    • Opcode ID: 99b58c2d815febb326445ad23a306b0ad8db09e0b76d33e8f46c96cfb884f661
                                                                    • Instruction ID: 81f59176c7d0edfca15b62531c5d8ecaf41b76f38c0195ab17fe810790702325
                                                                    • Opcode Fuzzy Hash: 99b58c2d815febb326445ad23a306b0ad8db09e0b76d33e8f46c96cfb884f661
                                                                    • Instruction Fuzzy Hash: 4041737194022CEBDB20DBA0DC5DBE9B7B9BF58300F0045DAA509A6281D7B45FC4CF65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 0048A5C0: allocator.LIBCONCRTD ref: 0048A615
                                                                      • Part of subcall function 0048A1E0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048A209
                                                                    • shared_ptr.LIBCMTD ref: 00484505
                                                                      • Part of subcall function 0049B6B0: std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 0049B6BA
                                                                      • Part of subcall function 00484A50: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484A5D
                                                                    • ~.LIBCPMTD ref: 0048461A
                                                                      • Part of subcall function 00484A70: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484A7D
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0048462C
                                                                    • shared_ptr.LIBCPMTD ref: 004845A7
                                                                      • Part of subcall function 0048A500: std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 0048A529
                                                                      • Part of subcall function 0048A500: _Reset.LIBCMTD ref: 0048A535
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0048458A
                                                                      • Part of subcall function 0048A4C0: _Ptr_base.LIBCMTD ref: 0048A4E9
                                                                      • Part of subcall function 0048A8F0: std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 0048A95E
                                                                    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 00484639
                                                                    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 00484695
                                                                    • shared_ptr.LIBCPMTD ref: 004846A4
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484729
                                                                    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 00484731
                                                                      • Part of subcall function 00480BC0: new.LIBCMT ref: 00480BEA
                                                                      • Part of subcall function 00480BC0: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00480C05
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: std::_$Container_base12Container_base12::~_$Mutex_baseMutex_base::~_$shared_ptr$Iterator_baseIterator_base::_$Base::Concurrency::details::ContextIdentityPtr_baseQueueResetWorkallocator
                                                                    • String ID:
                                                                    • API String ID: 705095841-0
                                                                    • Opcode ID: d95871b3a1ec78b47cacc53372e4026977eae7401f3eca11a37f830f3e750c03
                                                                    • Instruction ID: 76981a2831dc3854b1460d268ba74c7170eea27d7ead5c1800d4ad5b071f5eaf
                                                                    • Opcode Fuzzy Hash: d95871b3a1ec78b47cacc53372e4026977eae7401f3eca11a37f830f3e750c03
                                                                    • Instruction Fuzzy Hash: D6B15BB5D00208DFDB14EFA4C991BDEB7B5BF48304F10869EE51AAB281EB346A44CF55
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetStockObject.GDI32(00000011), ref: 00475153
                                                                    • GetObjectW.GDI32(00000000), ref: 0047515A
                                                                      • Part of subcall function 004F08EE: _wcslen.LIBCMT ref: 004F08F0
                                                                    • CreateFontIndirectW.GDI32(00000000), ref: 0047518F
                                                                    • CreatePen.GDI32(00000000,00000001,000000DC), ref: 00475261
                                                                    • 6F561CD0.COMCTL32(?,?,?,?,?,A1986743), ref: 0047526C
                                                                    • LoadLibraryW.KERNEL32(msimg32.dll,?,?,?,?,?,A1986743), ref: 00475277
                                                                    • new.LIBCMT ref: 0047527F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CreateObject$F561FontIndirectLibraryLoadStock_wcslen
                                                                    • String ID: msimg32.dll
                                                                    • API String ID: 1202924353-3287713914
                                                                    • Opcode ID: 8a7881df05bd2ec10dbe2b610514d33db50323207b0f292ce3034ab42a285bd1
                                                                    • Instruction ID: 07215fd4175c2c514ad0ad43b3c2453f67ad57b023a2adbfc28f88f05881d64d
                                                                    • Opcode Fuzzy Hash: 8a7881df05bd2ec10dbe2b610514d33db50323207b0f292ce3034ab42a285bd1
                                                                    • Instruction Fuzzy Hash: B3F10770904258CFEB24DFA4C869BADBBB1BF44308F2482ADD5496B383C7B55946CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2139 5f8fb2-5f8fe2 call 5f8cfd 2142 5f8ffd-5f9009 call 5f262e 2139->2142 2143 5f8fe4-5f8fef call 5eb466 2139->2143 2148 5f900b-5f9020 call 5eb466 call 5eb479 2142->2148 2149 5f9022-5f906b call 5f8c68 2142->2149 2150 5f8ff1-5f8ff8 call 5eb479 2143->2150 2148->2150 2159 5f906d-5f9076 2149->2159 2160 5f90d8-5f90e1 GetFileType 2149->2160 2157 5f92d4-5f92da 2150->2157 2164 5f90ad-5f90d3 GetLastError call 5eb443 2159->2164 2165 5f9078-5f907c 2159->2165 2161 5f912a-5f912d 2160->2161 2162 5f90e3-5f9114 GetLastError call 5eb443 CloseHandle 2160->2162 2168 5f912f-5f9134 2161->2168 2169 5f9136-5f913c 2161->2169 2162->2150 2178 5f911a-5f9125 call 5eb479 2162->2178 2164->2150 2165->2164 2170 5f907e-5f90ab call 5f8c68 2165->2170 2174 5f9140-5f918e call 5f2577 2168->2174 2169->2174 2175 5f913e 2169->2175 2170->2160 2170->2164 2181 5f919e-5f91c2 call 5f8a1b 2174->2181 2182 5f9190-5f919c call 5f8e79 2174->2182 2175->2174 2178->2150 2189 5f91d5-5f9218 2181->2189 2190 5f91c4 2181->2190 2182->2181 2188 5f91c6-5f91d0 call 5fe4c7 2182->2188 2188->2157 2192 5f921a-5f921e 2189->2192 2193 5f9239-5f9247 2189->2193 2190->2188 2192->2193 2197 5f9220-5f9234 2192->2197 2194 5f924d-5f9251 2193->2194 2195 5f92d2 2193->2195 2194->2195 2198 5f9253-5f9286 CloseHandle call 5f8c68 2194->2198 2195->2157 2197->2193 2201 5f92ba-5f92ce 2198->2201 2202 5f9288-5f92b4 GetLastError call 5eb443 call 5f2740 2198->2202 2201->2195 2202->2201
                                                                    APIs
                                                                      • Part of subcall function 005F8C68: CreateFileW.KERNEL32(00000000,00000000,?,005F905B,?,?,00000000,?,005F905B,00000000,0000000C), ref: 005F8C85
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005F90C6
                                                                    • __dosmaperr.LIBCMT ref: 005F90CD
                                                                    • GetFileType.KERNEL32(00000000), ref: 005F90D9
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005F90E3
                                                                    • __dosmaperr.LIBCMT ref: 005F90EC
                                                                    • CloseHandle.KERNEL32(00000000), ref: 005F910C
                                                                    • CloseHandle.KERNEL32(?), ref: 005F9256
                                                                    • GetLastError.KERNEL32 ref: 005F9288
                                                                    • __dosmaperr.LIBCMT ref: 005F928F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                    • String ID:
                                                                    • API String ID: 4237864984-0
                                                                    • Opcode ID: b7a3adb527572c0943bc54440b35b586f182f1b9c01cca725a60ec461b878778
                                                                    • Instruction ID: dc0b4dcfd72135f488dc1646879f2947eb4c95116a970dafb2ae00be36210cca
                                                                    • Opcode Fuzzy Hash: b7a3adb527572c0943bc54440b35b586f182f1b9c01cca725a60ec461b878778
                                                                    • Instruction Fuzzy Hash: 0FA14632A0014A9FDF199F68D899BBE7FB1BF46320F14015AF9019B2D1DB399D12CB51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 2207 483560-48361c call 48b400 call 48a120 call 48ab10 2218 483622-483644 call 475c20 call 482c20 2207->2218 2219 483ac4-483ae0 2207->2219 2226 483646-4836b2 call 482c40 call 48c030 call 483c30 call 482c00 call 49afe0 2218->2226 2227 4836b7-4836c6 call 482c20 2218->2227 2224 483aed-483b12 call 48ab10 2219->2224 2238 483b60-483b72 call 48ad90 2224->2238 2239 483b14-483b36 call 475c20 call 482c20 2224->2239 2284 483abf 2226->2284 2235 4836c8-483734 call 482c40 call 48c030 call 483c30 call 482c00 call 49afe0 2227->2235 2236 483739-483748 call 482c20 2227->2236 2235->2284 2250 48374a-4837b6 call 482c40 call 48c030 call 483c30 call 482c00 call 49afe0 2236->2250 2251 4837bb-4837ca call 482c20 2236->2251 2254 483b7f-483ba2 call 48ad30 call 48ab10 2238->2254 2262 483b38-483b59 call 482c40 call 482c00 call 4842c0 2239->2262 2263 483b5e call 48ab50 2239->2263 2250->2284 2275 4837cc 2251->2275 2276 4837d1-4837e0 call 482c20 2251->2276 2286 483be8-483c21 call 48adf0 call 48b3c0 call 5c950e 2254->2286 2287 483ba4-483be6 call 48ab70 call 49b590 call 47de40 call 482c00 call 484790 call 48b360 2254->2287 2262->2263 2263->2224 2275->2284 2291 4838cc-4838db call 482c20 2276->2291 2292 4837e6-4838c7 call 47d3f0 call 482c40 call 48b900 call 482c40 call 48ba00 call 49b0f0 call 482c00 call 4819b0 call 482c00 call 49b180 call 481c60 call 48bcd0 2276->2292 2284->2219 2287->2254 2314 4838dd-48393c call 482c40 call 48c030 call 483cf0 call 4809a0 call 49b360 2291->2314 2315 483941-483950 call 482c20 2291->2315 2292->2284 2314->2284 2330 483952-4839b1 call 482c40 call 48c030 call 483c30 call 49afe0 2315->2330 2331 4839b6-4839c9 call 482c20 2315->2331 2330->2284 2343 4839cb-483a37 call 482c40 call 48c030 call 483cf0 call 482c00 call 49b480 2331->2343 2344 483a3c-483a4f call 482c20 2331->2344 2343->2284 2344->2284 2361 483a51-483aba call 482c40 call 48c030 call 483cf0 call 482c00 call 49b480 2344->2361 2361->2284
                                                                    APIs
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::_Scoped_lock.LIBCMTD ref: 004835AB
                                                                      • Part of subcall function 0048B400: std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 0048B414
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00483612
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00483B08
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00483B98
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00483BF2
                                                                    • SafeRWList.LIBCONCRTD ref: 00483C04
                                                                      • Part of subcall function 00483C30: std::_Cnd_initX.LIBCPMTD ref: 00483C63
                                                                      • Part of subcall function 0049AFE0: std::ios_base::good.LIBCPMTD ref: 0049AFEC
                                                                      • Part of subcall function 0049AFE0: make_pair.LIBCPMTD ref: 0049B015
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Affinity::operator!=Concurrency::details::Hardwarestd::_$Cnd_initConcurrency::details::_Container_base12Container_base12::~_CriticalListLock::_Mutex_baseMutex_base::~_ReentrantSafeScoped_lockScoped_lock::_make_pairstd::ios_base::good
                                                                    • String ID:
                                                                    • API String ID: 2127206107-0
                                                                    • Opcode ID: 3192a8158a8e26993e0b0684a32fd5c60a075bc46ec74da4a450b3a12729c487
                                                                    • Instruction ID: 84ab643ec5e0ba867b12873aec8d3cdf417f001d6ff2590c887f4278a9d1e2f6
                                                                    • Opcode Fuzzy Hash: 3192a8158a8e26993e0b0684a32fd5c60a075bc46ec74da4a450b3a12729c487
                                                                    • Instruction Fuzzy Hash: 08028E70A012289FCB28FB15CC51BEEB7B5AF45704F0085DEE48A67291CA746F85CF96
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00483F60: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00483FD2
                                                                      • Part of subcall function 00483F60: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484028
                                                                      • Part of subcall function 00483F60: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484053
                                                                    • _Smanip.LIBCPMTD ref: 00484391
                                                                    • std::ios_base::good.LIBCPMTD ref: 0048439C
                                                                    • std::ios_base::good.LIBCPMTD ref: 004843AE
                                                                      • Part of subcall function 0049A570: char_traits.LIBCPMTD ref: 0049A701
                                                                      • Part of subcall function 0049A570: char_traits.LIBCPMTD ref: 0049A7E6
                                                                      • Part of subcall function 0049A570: std::ios_base::width.LIBCPMTD ref: 0049A816
                                                                    Strings
                                                                    • Could not load empty file for logging, please re-check your configurations for level [, xrefs: 00484325
                                                                    • ^;H, xrefs: 00484401
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_$char_traitsstd::ios_base::good$Smanipstd::ios_base::width
                                                                    • String ID: Could not load empty file for logging, please re-check your configurations for level [$^;H
                                                                    • API String ID: 1894501260-2301501353
                                                                    • Opcode ID: 016d1e35beceab4e70810a6dfdff97dd2a83df31855ab940757d52022f44dd52
                                                                    • Instruction ID: 7dad86f657fa1365ef361476469a0f952a356828e94e9413155e409e1230d59c
                                                                    • Opcode Fuzzy Hash: 016d1e35beceab4e70810a6dfdff97dd2a83df31855ab940757d52022f44dd52
                                                                    • Instruction Fuzzy Hash: 5831C671D00118ABCB04FBD5DC51AEEB775EF54318F04492EF40267291EB389A08C7E9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000100), ref: 004DA68D
                                                                    • wsprintfW.USER32 ref: 004DA6E2
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 004DA6F2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesModuleNamewsprintf
                                                                    • String ID: %s%sts_downloader.cfg$ulH
                                                                    • API String ID: 602362170-2056451001
                                                                    • Opcode ID: 0c64d2cf708b981495b664d08ac67ce791b9e1eeb7ed8c506c26bac8835c7df5
                                                                    • Instruction ID: 74a83ce69e0d9a56a1fd7ff3576ed48ecb5f4d72673011148fa7c163ac3be726
                                                                    • Opcode Fuzzy Hash: 0c64d2cf708b981495b664d08ac67ce791b9e1eeb7ed8c506c26bac8835c7df5
                                                                    • Instruction Fuzzy Hash: 4321FBB1E4031866DB20DBA0DC4AFEA737DAF88700F0081D5F319961C1EAB55B548FA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • select.WS2_32(?,00000000,00000000,00000000,-00000001), ref: 00401A2B
                                                                    • WSAGetLastError.WS2_32(?,?,00000000,00000001), ref: 00401A36
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastselect
                                                                    • String ID:
                                                                    • API String ID: 215497628-0
                                                                    • Opcode ID: 0dc95c6ff5559ac5b91882904f9dc5f720a9e3f04980b930d937416c422641b6
                                                                    • Instruction ID: dd5d3641822d6375d7af9528d2ceb70ea70f15520d76f99a80f23671d9a5e660
                                                                    • Opcode Fuzzy Hash: 0dc95c6ff5559ac5b91882904f9dc5f720a9e3f04980b930d937416c422641b6
                                                                    • Instruction Fuzzy Hash: 08919471A043018BD735DF68D8946ABB3E5ABC4320F144A3FE499E72E0D7389A45C75A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: char_traits
                                                                    • String ID:
                                                                    • API String ID: 1158913984-0
                                                                    • Opcode ID: a3d8dbc9c524fda5157a371673c395e3e401367b92e297c6c5042c3d600ba4a5
                                                                    • Instruction ID: cc32c2ed09b35490bfe6dc60ba283daaf5c27be9fbd6b446bde943565d799f4e
                                                                    • Opcode Fuzzy Hash: a3d8dbc9c524fda5157a371673c395e3e401367b92e297c6c5042c3d600ba4a5
                                                                    • Instruction Fuzzy Hash: 14917571D0010C9FCB14FBA5D491AEEBBB4EF48314F14892FF4166B291EB389945CBA9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,?,00000000,00000000,?,?,?,00000000,0054BA70,?,?,?,?,00465A56), ref: 0054BB9B
                                                                    • GetLastError.KERNEL32 ref: 0054BBAD
                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000), ref: 0054BBCC
                                                                    • GetLastError.KERNEL32 ref: 0054BBD8
                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,?,?,00000000), ref: 0054BC29
                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,?,00000008,?,00000000), ref: 0054BC53
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1717984340-0
                                                                    • Opcode ID: 8f81bfb4f7ebf55ed4304229770857ef98a73e51de2e7a7b4c4c86912b240456
                                                                    • Instruction ID: ca5a1ed6b669805c5af1c32d9ec4abf79b97d9c07eb1dd7154ab471316c9a80a
                                                                    • Opcode Fuzzy Hash: 8f81bfb4f7ebf55ed4304229770857ef98a73e51de2e7a7b4c4c86912b240456
                                                                    • Instruction Fuzzy Hash: FE41E732E0010AABDF209FA5DC86BFEBB79FF88314F14416AE905A7241DB319D05C7A1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CountTick
                                                                    • String ID: \Logs$\Logs\SoftwareLog.log$https://check.mobie.app
                                                                    • API String ID: 536389180-3326863518
                                                                    • Opcode ID: 6ffb0baefb2fb730a55fc9b4d0c5c33a34a9f17a23a2703b40642eaa0ea830a3
                                                                    • Instruction ID: 260d55d11f0154932b7b0a6d2d279dd043532689a66444d93be5545bf48ee094
                                                                    • Opcode Fuzzy Hash: 6ffb0baefb2fb730a55fc9b4d0c5c33a34a9f17a23a2703b40642eaa0ea830a3
                                                                    • Instruction Fuzzy Hash: B7D13874104344CFEB29CF18D848B96BBF5FF06304F4108E9D4568B2A2D7B5EA84CBA6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetFileVersionInfoSizeW.KERNELBASE(004DC627,00000000), ref: 004D8B8E
                                                                    • GetFileVersionInfoW.KERNELBASE(004DC627,00000000,00000000,?), ref: 004D8BBB
                                                                    • 74D31560.VERSION(?,0069B5CC,00000000,?), ref: 004D8BF7
                                                                      • Part of subcall function 004DA790: __vsnprintf.LIBCMTD ref: 004DA7AD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: FileInfoVersion$D31560Size__vsnprintf
                                                                    • String ID: %d.%d.%d.%d
                                                                    • API String ID: 3226949298-3491811756
                                                                    • Opcode ID: 423b1b33dbb7ba9ef12cf2e4af08509d6b189356d8e5deda6c586016b7cfc7aa
                                                                    • Instruction ID: 4015f2716efecd209e94b606240e1aaf53e4ab627a051baae5292e1b1fc54f45
                                                                    • Opcode Fuzzy Hash: 423b1b33dbb7ba9ef12cf2e4af08509d6b189356d8e5deda6c586016b7cfc7aa
                                                                    • Instruction Fuzzy Hash: 14512CF19042199BDB24DF54D855BAEB7B5EF48300F1086AAE709B7280D7789A44CFA8
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00485060: _Smanip.LIBCPMTD ref: 004850AD
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::_Scoped_lock.LIBCMTD ref: 00484D8D
                                                                    • new.LIBCMT ref: 00484DD8
                                                                    • SafeRWList.LIBCONCRTD ref: 00484E3E
                                                                      • Part of subcall function 00482F00: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::_Scoped_lock.LIBCMTD ref: 00482F39
                                                                      • Part of subcall function 00482F00: SafeRWList.LIBCONCRTD ref: 00482F7A
                                                                      • Part of subcall function 00484ED0: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::_Scoped_lock.LIBCMTD ref: 00484F0C
                                                                      • Part of subcall function 00484ED0: _Smanip.LIBCPMTD ref: 00484F2C
                                                                      • Part of subcall function 00484ED0: SafeRWList.LIBCONCRTD ref: 00484F6A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Concurrency::details::_CriticalListLock::_ReentrantSafeScoped_lockScoped_lock::_$Smanip
                                                                    • String ID: TH
                                                                    • API String ID: 694646252-1122092398
                                                                    • Opcode ID: c624399a1959fe671149d99b38a5154e09b4b9c6f09c9b03348ff87df34bee02
                                                                    • Instruction ID: b7cc85aad9d31c4c1facc95356a71d10b786a6ae234509a3a6f21463f66ebbc2
                                                                    • Opcode Fuzzy Hash: c624399a1959fe671149d99b38a5154e09b4b9c6f09c9b03348ff87df34bee02
                                                                    • Instruction Fuzzy Hash: 35410BB0A0011A9FDB08EB94C851BFEB7B1FF48704F144A6DE4116B3D2CB796901CBA8
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::_Scoped_lock.LIBCMTD ref: 004857F2
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 0048589C
                                                                    • ~.LIBCPMTD ref: 0048593A
                                                                      • Part of subcall function 00484A70: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484A7D
                                                                    • SafeRWList.LIBCONCRTD ref: 0048594E
                                                                      • Part of subcall function 0048B3C0: std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 0048B3EB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: std::_$Affinity::operator!=Concurrency::details::Concurrency::details::_Container_base12Container_base12::~_CriticalHardwareListLock::_Mutex_baseMutex_base::~_ReentrantSafeScoped_lockScoped_lock::_
                                                                    • String ID:
                                                                    • API String ID: 938531343-0
                                                                    • Opcode ID: 9a035c127763f644893246f49e1bdb5f855a2b250f6c30de08251620589b6f05
                                                                    • Instruction ID: 74d0a0d36b05bcc81e7df56b7551568040f2c8ee459e7f5669a1b998710e9721
                                                                    • Opcode Fuzzy Hash: 9a035c127763f644893246f49e1bdb5f855a2b250f6c30de08251620589b6f05
                                                                    • Instruction Fuzzy Hash: C4511870D01508EFDB08EF95D8A1AAEB7B6EF84304F10856EF416AB291DB786D05CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0054BB50: MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,?,00000000,00000000,?,?,?,00000000,0054BA70,?,?,?,?,00465A56), ref: 0054BB9B
                                                                      • Part of subcall function 0054BB50: GetLastError.KERNEL32 ref: 0054BBAD
                                                                      • Part of subcall function 0054BB50: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000), ref: 0054BBCC
                                                                      • Part of subcall function 0054BB50: GetLastError.KERNEL32 ref: 0054BBD8
                                                                    • GetLastError.KERNEL32(.\crypto\bio\bss_file.c,000000AF,?,?,?,?,?,?,?,?,?,?,?,?,?,00463E46), ref: 0054BA83
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$ByteCharMultiWide
                                                                    • String ID: ','$.\crypto\bio\bss_file.c$fopen('
                                                                    • API String ID: 3361762293-2085858615
                                                                    • Opcode ID: f138b89281029876cab3be6ed4811cf031461cb85de28c0fb30e7ade6866068f
                                                                    • Instruction ID: b9a6cd6f560897e3128d28932d816c50ee567045ecc09e7ceb3ab2f68120681e
                                                                    • Opcode Fuzzy Hash: f138b89281029876cab3be6ed4811cf031461cb85de28c0fb30e7ade6866068f
                                                                    • Instruction Fuzzy Hash: BE11A336BC432236E62072A57C0BFDB2D46AFC2B25F420065F7047A1C7EAD1594551E3
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0047BD88
                                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0047BDB9
                                                                    • new.LIBCMT ref: 0047BDC2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Concurrency::cancel_current_task
                                                                    • String ID:
                                                                    • API String ID: 118556049-0
                                                                    • Opcode ID: 93242f0d6adca48808052c40f83396e57094b48c59300d6a304eae4fce9f5e04
                                                                    • Instruction ID: 8c3312a65764f705eff9d7bd7a749ac697c70927f3230743044cbe60eaae5125
                                                                    • Opcode Fuzzy Hash: 93242f0d6adca48808052c40f83396e57094b48c59300d6a304eae4fce9f5e04
                                                                    • Instruction Fuzzy Hash: 9C113AB4D05508EBCF14DFA9C4847DDBBB1EF45300F20C6AAE8195B344D374AB418B89
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • IntersectRect.USER32(?,?,?), ref: 004F4EFF
                                                                    • IntersectRect.USER32(?,?,?), ref: 004F4F10
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: IntersectRect
                                                                    • String ID: 3WO
                                                                    • API String ID: 481094312-3405059401
                                                                    • Opcode ID: 95c788ddda1782da13844c940e150fece8703dc4db3138b27ba082668788260f
                                                                    • Instruction ID: 231f12d8ac491f35f5ca2246d633eb4c52e51a98cca9576ad9293612c49894e1
                                                                    • Opcode Fuzzy Hash: 95c788ddda1782da13844c940e150fece8703dc4db3138b27ba082668788260f
                                                                    • Instruction Fuzzy Hash: 4641087290020D9BCF15DF94C9409EFB7B6FF89304B10445AFA15A7250DB35AE16CBA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Q
                                                                    • API String ID: 0-1716927825
                                                                    • Opcode ID: 1128e851a97bd1857a3c74302b67bf5017fe5b6b0a9309efcc7b571a52794cbc
                                                                    • Instruction ID: ae6e8984056d384ff48c18a40550a9848ba3170eb0d9b5677b463d66500f6b7a
                                                                    • Opcode Fuzzy Hash: 1128e851a97bd1857a3c74302b67bf5017fe5b6b0a9309efcc7b571a52794cbc
                                                                    • Instruction Fuzzy Hash: ED213933904259ABEF252A69DC06BEB3F65BF81730F210215FA686B2D2DB741941C9A1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f6f825080f86fbadf98ab4aa79073ce14ffe2847a4c67c2873003cbed881cd2d
                                                                    • Instruction ID: cabd8736a17f89cd67d8602f3e920cfa2816871ecf3a18c9d4528e3139134ce7
                                                                    • Opcode Fuzzy Hash: f6f825080f86fbadf98ab4aa79073ce14ffe2847a4c67c2873003cbed881cd2d
                                                                    • Instruction Fuzzy Hash: E551C37190014EEBDF149FA5C84AEBF7FB9BF85310F140819E601A72A2D738AA01CB61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00498D3B
                                                                    • char_traits.LIBCPMTD ref: 00498D4E
                                                                    • construct.LIBCPMTD ref: 00498D82
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWorkchar_traitsconstruct
                                                                    • String ID:
                                                                    • API String ID: 4230972912-0
                                                                    • Opcode ID: 959d162d0fc281dd0934289c8728820a4d500deb3453000e8c2a4f283ea7a911
                                                                    • Instruction ID: b0f37c46a94355b5c5142f31cce2e3244c7636129abd12f7c87eb867026635af
                                                                    • Opcode Fuzzy Hash: 959d162d0fc281dd0934289c8728820a4d500deb3453000e8c2a4f283ea7a911
                                                                    • Instruction Fuzzy Hash: 51412171E101099FCF04EF69C952AAFBBB5EF45318F10452EE509B72D1DA386D00CB99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • SetTimer.USER32(?,?,00000000,00000000), ref: 00479928
                                                                    • SetTimer.USER32(?,?,00000000,00000000), ref: 00479999
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Timer
                                                                    • String ID:
                                                                    • API String ID: 2870079774-0
                                                                    • Opcode ID: 30226b6889341f53662d1c299c391ebf57c3a42dba5be72d799a3926b958fc27
                                                                    • Instruction ID: c3f84e09a8d1ecb35188677c8bbf1fda30780b11e87fafe75aa76c37b6d31c57
                                                                    • Opcode Fuzzy Hash: 30226b6889341f53662d1c299c391ebf57c3a42dba5be72d799a3926b958fc27
                                                                    • Instruction Fuzzy Hash: 0D511BB4A00109EFDB04CF98C590AEEB7F1FF49314F24819AE919AB341D735AE42DB95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00480D93
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_
                                                                    • String ID:
                                                                    • API String ID: 1531518832-0
                                                                    • Opcode ID: d3ec0264236d641efb075e87c05db1790f4218ce2970ba28cf870503aaded9c8
                                                                    • Instruction ID: d4b386145653257c4aaece3b65de1a2a9b2d6eaa82a6f327fd2e6cc55cfc3695
                                                                    • Opcode Fuzzy Hash: d3ec0264236d641efb075e87c05db1790f4218ce2970ba28cf870503aaded9c8
                                                                    • Instruction Fuzzy Hash: 17315C71914208AFCB04EFA4DC91BEEBBB5EB44724F140A2EF411672D1DB385905CBA8
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00491348
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00491354
                                                                    • char_traits.LIBCPMTD ref: 00491366
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$char_traits
                                                                    • String ID:
                                                                    • API String ID: 1941806930-0
                                                                    • Opcode ID: f20fbdc5192f2aa7c8872c04752dce0666f8558da7dde739792e42f28a241fed
                                                                    • Instruction ID: c66c9efae4511f5111bbcf23e921032434fa44fafc4db1d3e323e0825c13dec1
                                                                    • Opcode Fuzzy Hash: f20fbdc5192f2aa7c8872c04752dce0666f8558da7dde739792e42f28a241fed
                                                                    • Instruction Fuzzy Hash: 2D21FC71A10108EFCB04FF99D992EAE77B5AF88304F10816EF9199B251DB34AE10DB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • KiUserCallbackDispatcher.NTDLL(00000000,00000000,00000000,00000000), ref: 00479531
                                                                      • Part of subcall function 0047B8C0: GetParent.USER32 ref: 0047B8FA
                                                                    • TranslateMessage.USER32(?), ref: 00479552
                                                                    • DispatchMessageW.USER32(?), ref: 00479563
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Message$CallbackDispatchDispatcherParentTranslateUser
                                                                    • String ID:
                                                                    • API String ID: 801901134-0
                                                                    • Opcode ID: cd80dfb41f257e9b2f722e4403b5586d4d9a367a57f90683443c4830802ada87
                                                                    • Instruction ID: 12914b495780b431396403bbf60a815d99ec19909bdc8964fe614d5a01dd7522
                                                                    • Opcode Fuzzy Hash: cd80dfb41f257e9b2f722e4403b5586d4d9a367a57f90683443c4830802ada87
                                                                    • Instruction Fuzzy Hash: 301166B1D00218AFDB10CFA9DD45BEEBBF8FB08710F10862BE515E2280E7349504CBA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • SetFilePointerEx.KERNEL32(00000000,004586FA,00000002,00000000,00000000,00000010,004586FA,006B99C8,006B99C8,?,005F85CB,00000000,004586FA,00000002,00000000), ref: 005F84C6
                                                                    • GetLastError.KERNEL32(?,005F85CB,00000000,004586FA,00000002,00000000,?,005FE24A,004586FA,00000000,00000000,00000002,004586FA,00000000,004586FA), ref: 005F84D0
                                                                    • __dosmaperr.LIBCMT ref: 005F84D7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastPointer__dosmaperr
                                                                    • String ID:
                                                                    • API String ID: 2336955059-0
                                                                    • Opcode ID: 70d1b03c05dc4568a25bfad2238d6b69c783bdca63990c9d4690591cfcad4326
                                                                    • Instruction ID: 755664c97ad1e6389d6081d1cfb93c51d428f69a3b9cf73990727ee56f458be8
                                                                    • Opcode Fuzzy Hash: 70d1b03c05dc4568a25bfad2238d6b69c783bdca63990c9d4690591cfcad4326
                                                                    • Instruction Fuzzy Hash: C101283361011ABBCF059F99DC098BE3F2AFB85320B280249F95197290FA759E5087A0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 0048C1EE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ProcessorVirtual$Concurrency::RootRoot::
                                                                    • String ID: tJ
                                                                    • API String ID: 3936482309-963346656
                                                                    • Opcode ID: 1b3db5a8b4121b8e5641c68144ef2ee65dc9ac516a638d14f4147cdb74c52a2f
                                                                    • Instruction ID: 71f5a1e950eed628e7e389df26101e47ab09f4fb6b95791c552ecc5327fbc705
                                                                    • Opcode Fuzzy Hash: 1b3db5a8b4121b8e5641c68144ef2ee65dc9ac516a638d14f4147cdb74c52a2f
                                                                    • Instruction Fuzzy Hash: FF31FAB4A0021ADFCB04DF98CD91BAEBBB5FF85704F108659E8256B391C775AD00CBA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000008,005EB47E,00000000), ref: 005F64A2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID: +_
                                                                    • API String ID: 1279760036-2050882381
                                                                    • Opcode ID: 5f103d4a83693a8cd25e9adfe2db3dba8ea3bccaa033b875599f0f1cfa27aaec
                                                                    • Instruction ID: 5d0d4fc51183f87adf4e2fc3316138a2523445b1c1a66d6ab8ffecdf9701058e
                                                                    • Opcode Fuzzy Hash: 5f103d4a83693a8cd25e9adfe2db3dba8ea3bccaa033b875599f0f1cfa27aaec
                                                                    • Instruction Fuzzy Hash: 29F0E93210012DBAAF217E32DD8DB7B3F5ABF817B0B198411AA14D7591DB38DC1096E1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: char_traits
                                                                    • String ID:
                                                                    • API String ID: 1158913984-0
                                                                    • Opcode ID: a5aea31a37c6a8475ed6ad8d5a0f0102a5330ba039102c21c583727de7fcd9b3
                                                                    • Instruction ID: 865ef03af57135a76c5bc81df9084848c23358cd02104cb7cdd76669aa296625
                                                                    • Opcode Fuzzy Hash: a5aea31a37c6a8475ed6ad8d5a0f0102a5330ba039102c21c583727de7fcd9b3
                                                                    • Instruction Fuzzy Hash: DF41CB75D0020ADBCF04DF9AC991AAEBBB1FF48308F10895AE919A7341D734AE51CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • WriteFile.KERNEL32(00000804,?,?,?,00000000,00000010,004586FA,8B0000D5,?,005FE2E9,?,004586FA,00000010,004586FA,004586FA,00000000), ref: 005FDE48
                                                                    • GetLastError.KERNEL32(?,005FE2E9,?,004586FA,00000010,004586FA,004586FA,00000000,004586FA,?,005E7DE8,004586FA,00000000,?,?,005E7E81), ref: 005FDE71
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFileLastWrite
                                                                    • String ID:
                                                                    • API String ID: 442123175-0
                                                                    • Opcode ID: 86546affec502e9cd7aa6721d307b2fd23a383fd72406f456cbb031e174b56a9
                                                                    • Instruction ID: c208a1d0286ddefc5278affc3cdf62a9e07e3b28d7b0736e21d1813360c6c391
                                                                    • Opcode Fuzzy Hash: 86546affec502e9cd7aa6721d307b2fd23a383fd72406f456cbb031e174b56a9
                                                                    • Instruction Fuzzy Hash: 2F21B175A002199FCB24CF69DC84BE9B7FAFF58301F1048AAEA46D7251D734AD81CB60
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: char_traitstype_info::name
                                                                    • String ID:
                                                                    • API String ID: 2341707091-0
                                                                    • Opcode ID: 4fedcb32afe5d6e552cc74d420164b3aed30b1270a0f9d3ada32ba0ac47f86b9
                                                                    • Instruction ID: 4dddc9de66ad44d1905a1fccdb6c796e7e5eda627a2a303005664e9eee388755
                                                                    • Opcode Fuzzy Hash: 4fedcb32afe5d6e552cc74d420164b3aed30b1270a0f9d3ada32ba0ac47f86b9
                                                                    • Instruction Fuzzy Hash: 881130B0E10108AFDF14FFB9D85299E77759F84308F10856EF40E6B252DA386E00DB59
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • new.LIBCMT ref: 00480BEA
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00480C05
                                                                      • Part of subcall function 0048B7E0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048B809
                                                                      • Part of subcall function 0048C1A0: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 0048C1EE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ProcessorVirtual$Base::Concurrency::Concurrency::details::Container_base12Container_base12::~_ContextIdentityQueueRootRoot::Workstd::_
                                                                    • String ID:
                                                                    • API String ID: 3848482472-0
                                                                    • Opcode ID: b286da6812fe40d11fd3cbebdab578d1abc1594e4022dce32e8d27c035783429
                                                                    • Instruction ID: 917bc504749f9c6b1716c5ebfe07a91257b3b170456fc3a8978e75a080882977
                                                                    • Opcode Fuzzy Hash: b286da6812fe40d11fd3cbebdab578d1abc1594e4022dce32e8d27c035783429
                                                                    • Instruction Fuzzy Hash: C61151B1D042099BDF14EF95DC82BBEB7B5FB44704F104A2EE516A73C1D73869008B99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _free.LIBCMT ref: 005F6A74
                                                                      • Part of subcall function 005F6A05: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 005F6A37
                                                                    • RtlReAllocateHeap.NTDLL(00000000,?,?,00000004), ref: 005F6AB0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap$_free
                                                                    • String ID:
                                                                    • API String ID: 1482568997-0
                                                                    • Opcode ID: 17b44eda08cba638c988d46613cea9210e42b263af7239424670d3820716ab66
                                                                    • Instruction ID: f9e58f7d25eac0916efaf617d17c2c929d6da1a05bca17dabf381c7587e577f9
                                                                    • Opcode Fuzzy Hash: 17b44eda08cba638c988d46613cea9210e42b263af7239424670d3820716ab66
                                                                    • Instruction Fuzzy Hash: 67F0C23210011EEA9B216A329D08A7B3F29BFC17B0B24C126FA94B7190EF3D8C00D1A1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: cb242f6b26e411fc9f35713bb39ba629a07f3f23c7c626355640dc662694bcca
                                                                    • Instruction ID: daac5aa607b9742c140dc3b8b76e073e344de6e5a5181e905a677458ff31671d
                                                                    • Opcode Fuzzy Hash: cb242f6b26e411fc9f35713bb39ba629a07f3f23c7c626355640dc662694bcca
                                                                    • Instruction Fuzzy Hash: 08F0963280950DBFDF11AA90DC0AABD7FA9BB44370F2041A5FF1566190FA7A4E106791
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • WSAStartup.WS2_32(00000202,A1986743), ref: 0040101D
                                                                    • WSACleanup.WS2_32 ref: 0040104C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CleanupStartup
                                                                    • String ID:
                                                                    • API String ID: 915672949-0
                                                                    • Opcode ID: 7368f9fa28c44d5c28fa878fe33423f8d2b805c665c09c4ba4142022222176da
                                                                    • Instruction ID: 966e4a8b022e7c41efaa15c19981bd3d2fdcbf6e9317e0a248c0d2bc50bd77d7
                                                                    • Opcode Fuzzy Hash: 7368f9fa28c44d5c28fa878fe33423f8d2b805c665c09c4ba4142022222176da
                                                                    • Instruction Fuzzy Hash: AEF082707042448FE734AB24D86BBEB73D6BF8D300F81042EE49AC6291E6389406C657
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • IsWindow.USER32(?), ref: 005000BE
                                                                    • ShowWindow.USER32(?,00000000,?,?,0047C5B2,00000001,00000001,?,00000000,96C80000,00000000,00000000,00000000), ref: 005000E1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Show
                                                                    • String ID:
                                                                    • API String ID: 990937876-0
                                                                    • Opcode ID: 03c3e4cc42765580e56a10b2b43ece8c1f81a0b86cde15007df0b1925774d521
                                                                    • Instruction ID: 8bd7fb8f45edb0d62c64d5dfdf2de8917252da6f35da02ccffd20ecb454253ad
                                                                    • Opcode Fuzzy Hash: 03c3e4cc42765580e56a10b2b43ece8c1f81a0b86cde15007df0b1925774d521
                                                                    • Instruction Fuzzy Hash: 4EE08C32700294BFE7106B309C09BAA7FDEEB85762F08C836E55AC2061DA70DC549764
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • WSASetLastError.WS2_32(00002726,00401838,?,00000000,00000001), ref: 0040149F
                                                                    • Sleep.KERNEL32(00000001,00401838,?,00000000,00000001), ref: 004014AA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastSleep
                                                                    • String ID:
                                                                    • API String ID: 1458359878-0
                                                                    • Opcode ID: a5f0ad39cb067449780979fd4e6a87ee4b9d47744dc3ed3e20de817305e03c51
                                                                    • Instruction ID: ff36521ca0a1ce66873f92c1d3ca0d47849772b5825a0b52ad1be80cabcb2504
                                                                    • Opcode Fuzzy Hash: a5f0ad39cb067449780979fd4e6a87ee4b9d47744dc3ed3e20de817305e03c51
                                                                    • Instruction Fuzzy Hash: E0C01234A00201AAEB000B348C4D84A32E96B81B7AB898A2AB024D10F0DB38C400A520
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • IntersectRect.USER32(?,?,?), ref: 00474502
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: IntersectRect
                                                                    • String ID:
                                                                    • API String ID: 481094312-0
                                                                    • Opcode ID: 224f07f4ea43d300ae7e66aa34b8b493bbada4fb48c347c26bf09035df996d13
                                                                    • Instruction ID: 36b92f43e4cda1d1e2311f52184b4f26efcc14c81e483c32111c719cf6c46a74
                                                                    • Opcode Fuzzy Hash: 224f07f4ea43d300ae7e66aa34b8b493bbada4fb48c347c26bf09035df996d13
                                                                    • Instruction Fuzzy Hash: 5C61B779A11518EFC708DF98D890EADB7B6FF8C304F148269F9199B395CB30A941CB84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: __fread_nolock
                                                                    • String ID:
                                                                    • API String ID: 2638373210-0
                                                                    • Opcode ID: 2da4068d6e3a99ced9436de1b3cf3a906a30dced7fb42ed36b5bfc81c62b1768
                                                                    • Instruction ID: 954ac5b07f1eecbef897362fc773bc8e3169805d9f0c6851a87bf95f256fe3a3
                                                                    • Opcode Fuzzy Hash: 2da4068d6e3a99ced9436de1b3cf3a906a30dced7fb42ed36b5bfc81c62b1768
                                                                    • Instruction Fuzzy Hash: B931D572A043095BD720AF689C87AABBBA8FFC4754F40492DFE5897241EB34DD4486D2
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DeleteObject.GDI32 ref: 0047AF41
                                                                      • Part of subcall function 004F5FB8: __EH_prolog3_GS.LIBCMT ref: 004F5FC2
                                                                      • Part of subcall function 004F5FB8: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000304,0047AEED,?,00000001,00000000,00000001), ref: 004F6029
                                                                      • Part of subcall function 004F5FB8: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0047AE4A,00000000,00000001), ref: 004F61FD
                                                                      • Part of subcall function 004F5FB8: GetFileSize.KERNEL32(00000000,00000000,?,0047AE4A,00000000,00000001), ref: 004F6210
                                                                      • Part of subcall function 004F5FB8: ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 004F623C
                                                                      • Part of subcall function 004F5FB8: CloseHandle.KERNEL32(00000000), ref: 004F6243
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: File$Create$CloseDeleteH_prolog3_HandleObjectReadSize
                                                                    • String ID:
                                                                    • API String ID: 4152095281-0
                                                                    • Opcode ID: cb0082a2ef9e4b905ebe2f35bb64bde43f07d52b31b22c616a5551bfd89229e5
                                                                    • Instruction ID: 9a9e2c93d7a3a0d26b2f0eaeeeec9a7dbf9a63947558cd43c9c907e304b2c0cc
                                                                    • Opcode Fuzzy Hash: cb0082a2ef9e4b905ebe2f35bb64bde43f07d52b31b22c616a5551bfd89229e5
                                                                    • Instruction Fuzzy Hash: 6E314FB0900209EBDB04DF95C845BEE77B5AF88304F14C45DF9099B381D7389A50DBA6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779 ref: 00403833
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: D.5531.23089libssh2_trace_sethandler.
                                                                    • String ID:
                                                                    • API String ID: 3710141464-0
                                                                    • Opcode ID: a076f26760b1eb5f2a5ed3b49d544d442a3211afcc69e340120b64fa7710f374
                                                                    • Instruction ID: 41a575544883c3a9d67e4f2f4c6e2e1fe2f2a03125c5399c16fbcf300eb753b8
                                                                    • Opcode Fuzzy Hash: a076f26760b1eb5f2a5ed3b49d544d442a3211afcc69e340120b64fa7710f374
                                                                    • Instruction Fuzzy Hash: AA21B6F26007005BC720AF69AC845CBBBE9FB40317F14493FF59AD7240DB36A6588B66
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: __wsopen_s
                                                                    • String ID:
                                                                    • API String ID: 3347428461-0
                                                                    • Opcode ID: d09f834ed82bbd097906a3d3e4230e4176b7bc8c9d264992946a8669c862398c
                                                                    • Instruction ID: 7a4865a62b4151007a4e501e44d4de6596aaba68afbdcfae15846ec14bc3b3ec
                                                                    • Opcode Fuzzy Hash: d09f834ed82bbd097906a3d3e4230e4176b7bc8c9d264992946a8669c862398c
                                                                    • Instruction Fuzzy Hash: E411287590420AAFCB09DF59E945AAF7BF9EF48310F144059F808AB351D631E9218BA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateWindowExW.USER32(00000000,00000000,?,?,0047C59B,?,00000000,96C80000,00000000,00000000,00000000,00000258), ref: 004FFBCE
                                                                      • Part of subcall function 004FFE13: GetClassInfoExW.USER32(00000000,00000000), ref: 004FFE42
                                                                      • Part of subcall function 004FFE13: GetClassInfoExW.USER32(00000000,00000000), ref: 004FFE5E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ClassInfo$CreateWindow
                                                                    • String ID:
                                                                    • API String ID: 2792260-0
                                                                    • Opcode ID: 4d71906679a56f81c23fbc2ff7ed6b2c855f758c38b5f36e9388a049faf325c2
                                                                    • Instruction ID: 3b7ad63522d8989e81be071ae6630ea75e6db5fc516fe571e0f843b298114de9
                                                                    • Opcode Fuzzy Hash: 4d71906679a56f81c23fbc2ff7ed6b2c855f758c38b5f36e9388a049faf325c2
                                                                    • Instruction Fuzzy Hash: 40014B31200119AFDF115F55D814CFE3BAAEF48759704802AFA4997221CB3AD825DB99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: char_traits
                                                                    • String ID:
                                                                    • API String ID: 1158913984-0
                                                                    • Opcode ID: 6ae3c11f05e9ee1be46de4858ae29972f4c739a93f0692d72ddcc1c645c3e59c
                                                                    • Instruction ID: 27b28cc173a8a4a0a916ba72d7cbb649b17b0e765e161639bdcbc18523c96088
                                                                    • Opcode Fuzzy Hash: 6ae3c11f05e9ee1be46de4858ae29972f4c739a93f0692d72ddcc1c645c3e59c
                                                                    • Instruction Fuzzy Hash: 2B014474D00209EBCB00EBE5C881AAEB7B4BF54308F10C69DD85557341E735AF06DB95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 004DC5B0: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?,A1986743), ref: 004DC60E
                                                                      • Part of subcall function 004DC5B0: CreateExportObj.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?,?,000000FE,FFFFFFFF,?,?,00000000,000000FF,006A0D50,00000000,A1986743,?,?,?,?), ref: 004DC7CB
                                                                      • Part of subcall function 004DC5B0: CreateEventW.KERNEL32(00000000,00000001,00000001,UserLogMutex,?,?,000000FE,FFFFFFFF,?,?,00000000,000000FF,006A0D50,00000000,A1986743), ref: 004DC7E9
                                                                      • Part of subcall function 005C9772: __onexit.LIBCMT ref: 005C9778
                                                                    • __Init_thread_footer.LIBCMT ref: 004DC908
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Create$D.5531.23089EventExportFileInit_thread_footerModuleNameObj.__onexit
                                                                    • String ID:
                                                                    • API String ID: 4078211277-0
                                                                    • Opcode ID: 41cc2272ee63f4bd8dfa64f1c133ab023aca949723f148f644490a7be63d511b
                                                                    • Instruction ID: 5b1d9fcde9cb605ce511a79a6111199c9964542384037bc387c61ffd7218bd53
                                                                    • Opcode Fuzzy Hash: 41cc2272ee63f4bd8dfa64f1c133ab023aca949723f148f644490a7be63d511b
                                                                    • Instruction Fuzzy Hash: 8101ADB1E00645EFD720DFA8E956F49B7A2E744720F14036BE82A877D0DB36A9048B45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 00485022
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Mutex_baseMutex_base::~_std::_
                                                                    • String ID:
                                                                    • API String ID: 3966282785-0
                                                                    • Opcode ID: 5be42c88e17e274f0bdf68be2bedb37a9555656e37e37eb365fa7bd35494c405
                                                                    • Instruction ID: fe0db6c184ea28d0b41c3a7d1cdaef3d2a73b829d36626809f4c86bbe244db3c
                                                                    • Opcode Fuzzy Hash: 5be42c88e17e274f0bdf68be2bedb37a9555656e37e37eb365fa7bd35494c405
                                                                    • Instruction Fuzzy Hash: 33014B74500118EBDB08FF9AD450BBE77B5AF84309F04C85EF9064F282DA789A44CBA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 005F6A37
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 1556ebccda762211552424c3f0676c089f6f14adb6824895a33e9521163e651c
                                                                    • Instruction ID: 13d9b52c736fc0eaf9e13f7043789819ec54c950a693b8d5cddb2452803b2208
                                                                    • Opcode Fuzzy Hash: 1556ebccda762211552424c3f0676c089f6f14adb6824895a33e9521163e651c
                                                                    • Instruction Fuzzy Hash: E4E0E53110056DE7EB202A72DC05BBA7E48BB413A0F198121AE81B20A0EB68CD4081E1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetFileAttributesA.KERNEL32(00000000), ref: 00480D04
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile
                                                                    • String ID:
                                                                    • API String ID: 3188754299-0
                                                                    • Opcode ID: 6fe3d6b4f8681c1d7f162f3ad785b22e079b992016a876272990ae3710226fdd
                                                                    • Instruction ID: bed8f2a3e1650d51e20489878f18218dce0aaacecc8e77323fdf45f0714339b9
                                                                    • Opcode Fuzzy Hash: 6fe3d6b4f8681c1d7f162f3ad785b22e079b992016a876272990ae3710226fdd
                                                                    • Instruction Fuzzy Hash: 20F0C23081838CBACF40AEE480063EE7FB05F02314F1489CAC8951B342C13D668ED766
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00485E1D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_
                                                                    • String ID:
                                                                    • API String ID: 1531518832-0
                                                                    • Opcode ID: 17b75d11542d91bc2c38ae863b03e7a125a57113fe7491a0d549572e8b457f89
                                                                    • Instruction ID: 2fcfb0a3846ba8d8897089bb11c9ac59424c416c7a0331d2722570ca84ec4c42
                                                                    • Opcode Fuzzy Hash: 17b75d11542d91bc2c38ae863b03e7a125a57113fe7491a0d549572e8b457f89
                                                                    • Instruction Fuzzy Hash: 5BF01CB19445489FC705DF88DC41B6EB7B9FB09714F000A6EE82597791DB3468008B94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,00000000,?,005F905B,?,?,00000000,?,005F905B,00000000,0000000C), ref: 005F8C85
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile
                                                                    • String ID:
                                                                    • API String ID: 823142352-0
                                                                    • Opcode ID: a8bbcc3f1230af72d4c4df45d3c69fb2937f1dcecf6137a5baa913a7782102d3
                                                                    • Instruction ID: 4f80f0b61ca151775464ac5e18e766fc6a21bff578f16acda04fae712bcd8196
                                                                    • Opcode Fuzzy Hash: a8bbcc3f1230af72d4c4df45d3c69fb2937f1dcecf6137a5baa913a7782102d3
                                                                    • Instruction Fuzzy Hash: D2D06C3201020DFBDF028F84DC06EDA3BAAFB88714F018000BA1856060C732E861AB91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: allocator
                                                                    • String ID:
                                                                    • API String ID: 3447690668-0
                                                                    • Opcode ID: ccc9ae1a8defbbecb6a565ded58261d1cd06e62517df60aff2bc8a0b2e2e2efb
                                                                    • Instruction ID: a427590887aaa820669bb3424a43fc0b15d3d09e24299976d2c1c4c2118a5cc5
                                                                    • Opcode Fuzzy Hash: ccc9ae1a8defbbecb6a565ded58261d1cd06e62517df60aff2bc8a0b2e2e2efb
                                                                    • Instruction Fuzzy Hash: 8CD0127150910CBB8B08EF89E841C9EB7ACEB48350B00829DF90C87300CA316E10D7E8
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: allocator
                                                                    • String ID:
                                                                    • API String ID: 3447690668-0
                                                                    • Opcode ID: 5578b17b86c856432d62ff89abd7646d6efb01e9fd029672b81177d499ba6eb8
                                                                    • Instruction ID: 8609708458ca8b6a867439444537c43106268e488daa4eb58a8e3a8f867af94c
                                                                    • Opcode Fuzzy Hash: 5578b17b86c856432d62ff89abd7646d6efb01e9fd029672b81177d499ba6eb8
                                                                    • Instruction Fuzzy Hash: 81C04CB190910CBB8B14DF89E942C9EBBACDB59790F1042AEB90897311DA316E1097E9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CallWindowProcW.USER32(?,00000113,00000000,?,?,?,004FF0D2,00000000,?,?,?,?,?,?,?), ref: 004FFCD7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CallProcWindow
                                                                    • String ID:
                                                                    • API String ID: 2714655100-0
                                                                    • Opcode ID: 531e12c3c6e070625c1f243ede155a4dfdffbb75f4b587e18ea0f9abdd891456
                                                                    • Instruction ID: 1c831a259cb81284b296b1a407118616609fdc789813c5cfb6f73c5952884476
                                                                    • Opcode Fuzzy Hash: 531e12c3c6e070625c1f243ede155a4dfdffbb75f4b587e18ea0f9abdd891456
                                                                    • Instruction Fuzzy Hash: 90C0EA36000248FB8F025F81DD04C99BF2BEB19754B18C059FA1808021C7339572EB90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • PostMessageW.USER32(?,?,?,?), ref: 004FFE09
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost
                                                                    • String ID:
                                                                    • API String ID: 410705778-0
                                                                    • Opcode ID: f46fbbc296d55991f335573475c0bf5f78e2523b8e72a64788cb255aa8d9773d
                                                                    • Instruction ID: 0aba1951633db036a3635fe593d83b8df1dc394372e2a70c944ed24051f236d0
                                                                    • Opcode Fuzzy Hash: f46fbbc296d55991f335573475c0bf5f78e2523b8e72a64788cb255aa8d9773d
                                                                    • Instruction Fuzzy Hash: 86C00236000108FB8F025F91DC05C997F2AFB19350B08C415FA1844021D7339531EB90
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000000,000000FF,?,?), ref: 004805A0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide
                                                                    • String ID:
                                                                    • API String ID: 626452242-0
                                                                    • Opcode ID: 213b788d8fd8f998d58ba15dc8c2f474ba16bbe16c1a3cfc71ce3abddba9fccc
                                                                    • Instruction ID: 233045a06da6f3fdbdb1e9f14ad54c8753ce3a8f9a1591a4066bfb9de121248a
                                                                    • Opcode Fuzzy Hash: 213b788d8fd8f998d58ba15dc8c2f474ba16bbe16c1a3cfc71ce3abddba9fccc
                                                                    • Instruction Fuzzy Hash: A3F01D75620208FFCB50DE64C954BAB37A4AB48360F108919FD1587390E778E944DFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 004F154C
                                                                    • CreateSolidBrush.GDI32(00000001), ref: 004F16EC
                                                                    • FillRect.USER32(?,?,?), ref: 004F177F
                                                                    • DeleteObject.GDI32(?), ref: 004F1786
                                                                    • SelectObject.GDI32(?,?), ref: 004F17EE
                                                                    • DeleteObject.GDI32(?), ref: 004F17F7
                                                                    • DeleteDC.GDI32(?), ref: 004F17FE
                                                                    • GetModuleHandleW.KERNEL32(msimg32.dll,AlphaBlend), ref: 004F1837
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004F183A
                                                                    • __Init_thread_footer.LIBCMT ref: 004F1846
                                                                    • GetModuleHandleW.KERNEL32(msimg32.dll,GradientFill), ref: 004F1873
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004F1876
                                                                    • __Init_thread_footer.LIBCMT ref: 004F1882
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Object$Delete$AddressHandleInit_thread_footerModuleProcSelect$BrushCreateFillRectSolid
                                                                    • String ID: AlphaBlend$GradientFill$msimg32.dll
                                                                    • API String ID: 1652410773-216815851
                                                                    • Opcode ID: 556cd5a0a3b4ace9bdab49b8cefad732981f158b3de86dadbe2f7910badbd36d
                                                                    • Instruction ID: 585eb489df58c4a186922d390496827e305f6a977db958ee88e86f0a84bc5f5c
                                                                    • Opcode Fuzzy Hash: 556cd5a0a3b4ace9bdab49b8cefad732981f158b3de86dadbe2f7910badbd36d
                                                                    • Instruction Fuzzy Hash: B7D15671E102199FCB04DFA8D984AEDBBB6FF89311F14911AE915EB3A0D7349901CBA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _fwprintf.LIBCONCRTD ref: 00432C17
                                                                    • _fwprintf.LIBCONCRTD ref: 00432CC2
                                                                    • _fwprintf.LIBCONCRTD ref: 00432CED
                                                                    • GetLastError.KERNEL32(?,?), ref: 00432D0C
                                                                    • SetLastError.KERNEL32(00000000,?,?), ref: 00432D12
                                                                    • GetLastError.KERNEL32(?,?,?,?,?), ref: 00432D2A
                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,?), ref: 00432D33
                                                                    Strings
                                                                    • %02d:%02d, xrefs: 00432CE7
                                                                    • %31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz], xrefs: 00432BE7
                                                                    • %02d:%02d:%02d, xrefs: 00432CBC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_fwprintf
                                                                    • String ID: %02d:%02d$%02d:%02d:%02d$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]
                                                                    • API String ID: 3725225398-241090727
                                                                    • Opcode ID: 2858ed35d7ffc1908117ec9bc0ae7433e8ebcb3ee2bf390fe336c8e30b7bd96c
                                                                    • Instruction ID: 43ba8f56265377244c83e2e47573a60216b0463cb4f3814e8a72fb5bfa4717fa
                                                                    • Opcode Fuzzy Hash: 2858ed35d7ffc1908117ec9bc0ae7433e8ebcb3ee2bf390fe336c8e30b7bd96c
                                                                    • Instruction Fuzzy Hash: 25D19DB1A083058FC714DF29C94262FBBE1BBD8314F585A2FF49587341E7B9D9448B8A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CharNextW.USER32(?,?,?,?,?,?,?,?,0050534B,}KP,00000000,?,?,?,?), ref: 00505294
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CharNext
                                                                    • String ID: Error parsing element name$Expected end-tag start$Expected start tag$Expected start-tag closing$KSP$Unmatched closing tag
                                                                    • API String ID: 3213498283-3766488285
                                                                    • Opcode ID: 74ba9bf930e2ddf3dbfb19f11acb7d470b28b3aee28e9cac1f7eadfba48c35d6
                                                                    • Instruction ID: 79537eb8bdd8b31b9e356f2c414d1c8ebeecd1f66864d7e6ba2bab0f79700862
                                                                    • Opcode Fuzzy Hash: 74ba9bf930e2ddf3dbfb19f11acb7d470b28b3aee28e9cac1f7eadfba48c35d6
                                                                    • Instruction Fuzzy Hash: C3818B34600A02AFDB24EF68C45697EBBE5FF59300B65886EE481DB2D1F6B19D81CF50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(?,?,?,?,?,00000150), ref: 005C82A2
                                                                    • _swprintf_s.LIBCONCRTD ref: 005C82E9
                                                                      • Part of subcall function 005C8090: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,00000150), ref: 005C80D5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: FileLocalModuleNameTime_swprintf_s
                                                                    • String ID: .log$[%u/%u/%u-%u:%u:%u] $\Logs\$ab+
                                                                    • API String ID: 4137088289-4209270932
                                                                    • Opcode ID: 196e568ca821612d7124a295cf7c5f6d1825dc5a7e3ed12f7575e5da45d4ca92
                                                                    • Instruction ID: f9cb7342d559a9b42b82a08b7e39383b9005a6b1bae817ed163dab0ae4585d5e
                                                                    • Opcode Fuzzy Hash: 196e568ca821612d7124a295cf7c5f6d1825dc5a7e3ed12f7575e5da45d4ca92
                                                                    • Instruction Fuzzy Hash: A041C275900218AECB25DFA48C46FFABBB9FF59700F0440D9F949A7181DB749A84CBA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    • Invalid signature for supplied public key, or bad username/public key combination, xrefs: 00463DC5
                                                                    • Unable to send userauth-hostbased request, xrefs: 00463CEB
                                                                    • Auth failed, xrefs: 00463D66
                                                                    • Failed allocating additional space for userauth-hostbased packet, xrefs: 00463BE3
                                                                    • hostbased, xrefs: 004639CE
                                                                    • ssh-connection, xrefs: 004639C1
                                                                    • Would block, xrefs: 00463CB8
                                                                    • Out of memory, xrefs: 00463987
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Auth failed$Failed allocating additional space for userauth-hostbased packet$Invalid signature for supplied public key, or bad username/public key combination$Out of memory$Unable to send userauth-hostbased request$Would block$hostbased$ssh-connection
                                                                    • API String ID: 0-1276813617
                                                                    • Opcode ID: 171cfb6c9ccced8644f6e5956c4e59dc1f148269148816262243d6da46467260
                                                                    • Instruction ID: cb2fab538479dccdaf3081de98941f54419b77b758158a804de4b1f6e12f66e2
                                                                    • Opcode Fuzzy Hash: 171cfb6c9ccced8644f6e5956c4e59dc1f148269148816262243d6da46467260
                                                                    • Instruction Fuzzy Hash: C5F160B5604700AFD324DF65CC81DABBBE9AFC9314F408A1EF55B87241EA35B905CB92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: __floor_pentium4
                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                    • API String ID: 4168288129-2761157908
                                                                    • Opcode ID: 45b2327026ba04470238aa34192fd112c96a4467cc3970883805dffdea01f835
                                                                    • Instruction ID: 813a9bbc2ed5b8939c9384e8258c5d23df8abef6b428cce51b68a60a965d6f5f
                                                                    • Opcode Fuzzy Hash: 45b2327026ba04470238aa34192fd112c96a4467cc3970883805dffdea01f835
                                                                    • Instruction Fuzzy Hash: 4EC27C71E482288FDB29CF28DD447EAB7B6EB84344F1441EAD44DE7281E774AE818F51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00608294,?,00000000), ref: 0060800E
                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00608294,?,00000000), ref: 00608037
                                                                    • GetACP.KERNEL32(?,?,00608294,?,00000000), ref: 0060804C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID: ACP$OCP
                                                                    • API String ID: 2299586839-711371036
                                                                    • Opcode ID: b007c47192e8d07d910b7b3e4c1c4c5461a29cfcfb4a2253de27f213588ec7ae
                                                                    • Instruction ID: 444f755346fd557d42cc2b2c48d4f4cefe139ac1843c58074a92ec9e3d8d4ce1
                                                                    • Opcode Fuzzy Hash: b007c47192e8d07d910b7b3e4c1c4c5461a29cfcfb4a2253de27f213588ec7ae
                                                                    • Instruction Fuzzy Hash: B4219032A84202AEDB38CF14D900AE773A7AF54B50B5A8464E94AD7380EF32ED41C360
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 004F9EB2
                                                                    • GetWindowRgn.USER32(?,00000000), ref: 004F9EBF
                                                                    • PtInRegion.GDI32(?,00000000,00000000), ref: 004F9FCD
                                                                    • PtInRegion.GDI32(?,?,004FABEC), ref: 004FA00B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Region$CreateRectWindow
                                                                    • String ID:
                                                                    • API String ID: 1620756862-0
                                                                    • Opcode ID: 6987a3ae87fc2540bc052c265ffcb7a5ffcd17e6e6e22c1068b23eb5154299ec
                                                                    • Instruction ID: 3776a44f446298831877833607c20e6d0e4f53c026b730dbeefb452909d94300
                                                                    • Opcode Fuzzy Hash: 6987a3ae87fc2540bc052c265ffcb7a5ffcd17e6e6e22c1068b23eb5154299ec
                                                                    • Instruction Fuzzy Hash: 765290B1A006599FCB08CF68C9945ADFBF1FF88314B14826EE959EB300D734A952CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 005FED46: GetLastError.KERNEL32(?,004D41D4,005E66AE,004D41D4,?,?,005F2B48,004D41D4,?,00000000), ref: 005FED4A
                                                                      • Part of subcall function 005FED46: _free.LIBCMT ref: 005FED7D
                                                                      • Part of subcall function 005FED46: SetLastError.KERNEL32(00000000,004D41D4,?,00000000), ref: 005FEDBE
                                                                      • Part of subcall function 005FED46: _abort.LIBCMT ref: 005FEDC4
                                                                      • Part of subcall function 005FED46: _free.LIBCMT ref: 005FEDA5
                                                                      • Part of subcall function 005FED46: SetLastError.KERNEL32(00000000,004D41D4,?,00000000), ref: 005FEDB2
                                                                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 00608255
                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 006082B0
                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 006082BF
                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,005FBDE8,00000040,?,005FBF08,00000055,00000000,?,?,00000055,00000000), ref: 00608307
                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,005FBE68,00000040), ref: 00608326
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                    • String ID:
                                                                    • API String ID: 745075371-0
                                                                    • Opcode ID: 14a44c7d703de585eb53582d880c1ec4c07aae287fb905f3428dae26e51ede30
                                                                    • Instruction ID: 0663e078b37a82b565c67a2ac051c7d3050938e51b185a0d72395e26e4e2e515
                                                                    • Opcode Fuzzy Hash: 14a44c7d703de585eb53582d880c1ec4c07aae287fb905f3428dae26e51ede30
                                                                    • Instruction Fuzzy Hash: E8519271A40606AFEF18DFA4DC45AFF77BABF44700F144469E954E72D0EB709A4087A1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Auth$Genu$cAMD$enti$ineI$ntel
                                                                    • API String ID: 0-1714976780
                                                                    • Opcode ID: 0267287f670431e7a6d0a9e082e982835e0205c0dfa79dfcdf529b1d0aab54d9
                                                                    • Instruction ID: ca8f27985a67c0e086f82fcf4527184e4a1fed2eb9f39bc972db8b7405460222
                                                                    • Opcode Fuzzy Hash: 0267287f670431e7a6d0a9e082e982835e0205c0dfa79dfcdf529b1d0aab54d9
                                                                    • Instruction Fuzzy Hash: F431227BA152160BFB7CA8688C8436DA1839399330F7AC73EF126C36C0EC6C8D814294
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetKeyState.USER32(00000011), ref: 00474DED
                                                                    • GetKeyState.USER32(00000002), ref: 00474E03
                                                                    • GetKeyState.USER32(00000001), ref: 00474E1B
                                                                    • GetKeyState.USER32(00000010), ref: 00474E33
                                                                    • GetKeyState.USER32(00000012), ref: 00474E49
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: State
                                                                    • String ID:
                                                                    • API String ID: 1649606143-0
                                                                    • Opcode ID: e4a3f74855548cd1dabc9721ca9f48d323d6609ac476364e5aa887da8fa0dace
                                                                    • Instruction ID: f72e7e2bdfe5cfc712674c62a591ceb4a5a0583ca76cf9781b000609727473d1
                                                                    • Opcode Fuzzy Hash: e4a3f74855548cd1dabc9721ca9f48d323d6609ac476364e5aa887da8fa0dace
                                                                    • Instruction Fuzzy Hash: 9B011E70901608EFEB04CF85DA566BDBBF2FB80705F24906ED545A7140D7749B019761
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 005FED46: GetLastError.KERNEL32(?,004D41D4,005E66AE,004D41D4,?,?,005F2B48,004D41D4,?,00000000), ref: 005FED4A
                                                                      • Part of subcall function 005FED46: _free.LIBCMT ref: 005FED7D
                                                                      • Part of subcall function 005FED46: SetLastError.KERNEL32(00000000,004D41D4,?,00000000), ref: 005FEDBE
                                                                      • Part of subcall function 005FED46: _abort.LIBCMT ref: 005FEDC4
                                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,005FBDEF,?,?,?,?,005FB846,?,00000002), ref: 006078F3
                                                                    • _wcschr.LIBVCRUNTIME ref: 00607983
                                                                    • _wcschr.LIBVCRUNTIME ref: 00607991
                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,005FBDEF,00000000,005FBF0F), ref: 00607A34
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                    • String ID:
                                                                    • API String ID: 4212172061-0
                                                                    • Opcode ID: d9eb711be8ecd8d2185fdeca6f185ab6ccadbdbc046540c52f5ba3d61f5c41d6
                                                                    • Instruction ID: ba13ce869c0469c9f389367ece27e1b2c019603cd30b84e3eed4d70105aa8ee7
                                                                    • Opcode Fuzzy Hash: d9eb711be8ecd8d2185fdeca6f185ab6ccadbdbc046540c52f5ba3d61f5c41d6
                                                                    • Instruction Fuzzy Hash: 2C610B31E84206AAEB2CAB75CC46ABB7799FF44310F144429F949DB6C1E674F941C760
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 005E7568
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 005E7572
                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 005E757F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                    • String ID:
                                                                    • API String ID: 3906539128-0
                                                                    • Opcode ID: db2df3ff9e2d468f686488b5b8b0bdb64196d93fb5ae9ab377a1eb8f8d1a5472
                                                                    • Instruction ID: 98c862767940ed8a5f0cdc11a462d0d48eea5c0120fb07e58be01e880e6921df
                                                                    • Opcode Fuzzy Hash: db2df3ff9e2d468f686488b5b8b0bdb64196d93fb5ae9ab377a1eb8f8d1a5472
                                                                    • Instruction Fuzzy Hash: 6531C2B490122D9BCB21DF65D989B9DBBB8BF48310F5041DAE41CA7291E7709B818F54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(005E77FD,?,005F93FD,005E77FD,006B9E68,0000000C,005F9554,005E77FD,00000002,00000000,?,005E77FD), ref: 005F9448
                                                                    • TerminateProcess.KERNEL32(00000000,?,005F93FD,005E77FD,006B9E68,0000000C,005F9554,005E77FD,00000002,00000000,?,005E77FD), ref: 005F944F
                                                                    • ExitProcess.KERNEL32 ref: 005F9461
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: cd0a51994e78161ab02755a6c52a8e6bcfae163888390c7c43d57a7779647c91
                                                                    • Instruction ID: 7c33882f88e50966f7871ea00988064c4f869bc812680c4debad5545a36c14c5
                                                                    • Opcode Fuzzy Hash: cd0a51994e78161ab02755a6c52a8e6bcfae163888390c7c43d57a7779647c91
                                                                    • Instruction Fuzzy Hash: 50E0463140050DABCF01AFA0CC1DAA83F2AFF90355B048014FA198A131CB3ADD82CB50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Invalid MAC received$R$socket disconnect
                                                                    • API String ID: 0-3460484782
                                                                    • Opcode ID: 1cf7f761361e1e2f84a642a9a3dd3aeca2f60b824cdfa81d16a8d6723714ecf7
                                                                    • Instruction ID: 1481e62d580885a18f8ece780d3b9249c7ead3b9b4a3f843cc8f8e41fd6d90cb
                                                                    • Opcode Fuzzy Hash: 1cf7f761361e1e2f84a642a9a3dd3aeca2f60b824cdfa81d16a8d6723714ecf7
                                                                    • Instruction Fuzzy Hash: A8C15AB19042445FD720DF69DC41EAFB7D8AF89318F41462FF8598B281E639DA08C7A7
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,005FB846,?,00000002), ref: 005FF783
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID: GetLocaleInfoEx
                                                                    • API String ID: 2299586839-2904428671
                                                                    • Opcode ID: 585b6ab857b44c449c6ba4d6208e72ff54a03a88b1387d09c017719fe55e8875
                                                                    • Instruction ID: 2ac2219870b322f38f591f6d3ec5bf274d936d998d6bfae2da8d88280cd0708c
                                                                    • Opcode Fuzzy Hash: 585b6ab857b44c449c6ba4d6208e72ff54a03a88b1387d09c017719fe55e8875
                                                                    • Instruction Fuzzy Hash: BEF0903164120CBBCB11AF60EC4AEBE7F66FF44B11F154529F90566290CA72992097D5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4c1834cb24e82e80c15675cab6480fc5bde8c7bebbfe0283985fd6e71a0b9b8a
                                                                    • Instruction ID: 3ac846a11e232f1da126030f5dbed32f0edcf6e0b9789be8db7d286f13b99014
                                                                    • Opcode Fuzzy Hash: 4c1834cb24e82e80c15675cab6480fc5bde8c7bebbfe0283985fd6e71a0b9b8a
                                                                    • Instruction Fuzzy Hash: 3A023E71E012199FDF14CFA9C9806AEBBF1FF88314F294169D919E7382D735A941CB80
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .%lu$ooo
                                                                    • API String ID: 0-166504061
                                                                    • Opcode ID: 9132e974e22d01a3ebda6821a19a65789778118c8ff55a94f3ccca8eda857a9d
                                                                    • Instruction ID: b20d8d27ecebdb47a39994b14c069a35eec333efbd3a7ea846ed1632131b4695
                                                                    • Opcode Fuzzy Hash: 9132e974e22d01a3ebda6821a19a65789778118c8ff55a94f3ccca8eda857a9d
                                                                    • Instruction Fuzzy Hash: A1910772A083064BDB21DEA8989573BBFE4BF95704F44092DFCD6A3241EB71D909C792
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 004FDEBB: SetFilePointer.KERNEL32(?,00000000,00000000,004FEBFA,?,004FEBFA,00000000,00000000,00000002,004FB8A0,?,00000000,00000000), ref: 004FDEF4
                                                                    • DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 004FB62E
                                                                      • Part of subcall function 004FDFAB: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,004FB77F,?,000000FF), ref: 004FE00B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Time$File$DatePointerSystem
                                                                    • String ID:
                                                                    • API String ID: 273651166-0
                                                                    • Opcode ID: 73988a39395be454a7387baae839a18057312fc4280a5a9cd447d38b6e8cc61d
                                                                    • Instruction ID: 4a3f8219970423b4d56f17c272fdcd60c748294fdac18ba592f835adfbf7e060
                                                                    • Opcode Fuzzy Hash: 73988a39395be454a7387baae839a18057312fc4280a5a9cd447d38b6e8cc61d
                                                                    • Instruction Fuzzy Hash: E4C1807190461C9FCB24DF29C881AEABBF4EF0A304F10859EE699D7341D734AA91CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,005FCCEB,?,?,00000008,?,?,0060A9B8,00000000), ref: 005FCF1D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionRaise
                                                                    • String ID:
                                                                    • API String ID: 3997070919-0
                                                                    • Opcode ID: 0e9a2f6483fca1d0ab75d173ee69cd4ff44e00a79b9d3c2db0880de0a4d0ce37
                                                                    • Instruction ID: 0fcd22065c341bca323221aa267941893e14767e3f161bd5e09cded75d42df17
                                                                    • Opcode Fuzzy Hash: 0e9a2f6483fca1d0ab75d173ee69cd4ff44e00a79b9d3c2db0880de0a4d0ce37
                                                                    • Instruction Fuzzy Hash: 06B14C3161060D9FD719CF28C58AB657FE1FF45364F2586A8EA99CF2A1C339E981CB40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 005FED46: GetLastError.KERNEL32(?,004D41D4,005E66AE,004D41D4,?,?,005F2B48,004D41D4,?,00000000), ref: 005FED4A
                                                                      • Part of subcall function 005FED46: _free.LIBCMT ref: 005FED7D
                                                                      • Part of subcall function 005FED46: SetLastError.KERNEL32(00000000,004D41D4,?,00000000), ref: 005FEDBE
                                                                      • Part of subcall function 005FED46: _abort.LIBCMT ref: 005FEDC4
                                                                    • EnumSystemLocalesW.KERNEL32(00607BFC,00000001,00000000,?,005FBDE8,?,00608229,00000000,?,?,?), ref: 00607B46
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                    • String ID:
                                                                    • API String ID: 1084509184-0
                                                                    • Opcode ID: 067596d94b20b9743810fd5683e67ef7bc01ee8f8f221e87a51347d370231a60
                                                                    • Instruction ID: c61110a735b9d43b6f0a132efa0d8b0a256b9778f811ae180034c034c95e62da
                                                                    • Opcode Fuzzy Hash: 067596d94b20b9743810fd5683e67ef7bc01ee8f8f221e87a51347d370231a60
                                                                    • Instruction Fuzzy Hash: 0811E53A6047055FDB1CAF39C8A15BBBB92FF80768B19842DE94687B80E375B942C750
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • libssh2_session_last_errno.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?), ref: 0045B501
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: D.5531.23089libssh2_session_last_errno.
                                                                    • String ID:
                                                                    • API String ID: 1735628876-0
                                                                    • Opcode ID: 5bc85176ab98f3c9aed6027a2f35166c1cd0a68344293de5ee7ed4785f0ff88e
                                                                    • Instruction ID: cc30dab9ae53907cafdb50beea91a66cce9ff2e317c19e5da530ff2482f5ebea
                                                                    • Opcode Fuzzy Hash: 5bc85176ab98f3c9aed6027a2f35166c1cd0a68344293de5ee7ed4785f0ff88e
                                                                    • Instruction Fuzzy Hash: F301DE719043042BD610EA29AC41A6BB3E8EFC435AF040A2EFC8482302F325DD0C82F3
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • libssh2_session_last_errno.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?), ref: 0046265C
                                                                      • Part of subcall function 0045A7E0: libssh2_keepalive_send.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?,00000000,00000000), ref: 0045A7FD
                                                                      • Part of subcall function 0045A7E0: libssh2_session_block_directions.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?,00000000), ref: 0045A81A
                                                                      • Part of subcall function 0045A7E0: select.WS2_32(?,00000000,00000000,00000000,00000000), ref: 0045A90E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: D.5531.23089$libssh2_keepalive_send.libssh2_session_block_directions.libssh2_session_last_errno.select
                                                                    • String ID:
                                                                    • API String ID: 836389444-0
                                                                    • Opcode ID: b593dc3a76d5cb88a38aecb53f2a80d9c8e3f95d56bd84f871506e5432d0fa3f
                                                                    • Instruction ID: f519f335b171b082bfdf2bc1228e6de0f04a11008ab8324e3ecd6a91e74c2aec
                                                                    • Opcode Fuzzy Hash: b593dc3a76d5cb88a38aecb53f2a80d9c8e3f95d56bd84f871506e5432d0fa3f
                                                                    • Instruction Fuzzy Hash: FFF0F4755007012BD6009A15ED01A2B7798EBC43AAF080A3AFD8492302F769ED1887B7
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 005FED46: GetLastError.KERNEL32(?,004D41D4,005E66AE,004D41D4,?,?,005F2B48,004D41D4,?,00000000), ref: 005FED4A
                                                                      • Part of subcall function 005FED46: _free.LIBCMT ref: 005FED7D
                                                                      • Part of subcall function 005FED46: SetLastError.KERNEL32(00000000,004D41D4,?,00000000), ref: 005FEDBE
                                                                      • Part of subcall function 005FED46: _abort.LIBCMT ref: 005FEDC4
                                                                    • EnumSystemLocalesW.KERNEL32(00607E4C,00000001,00000002,?,005FBDE8,?,006081ED,005FBDE8,?,?,?,?,?,005FBDE8,?,?), ref: 00607BBB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                    • String ID:
                                                                    • API String ID: 1084509184-0
                                                                    • Opcode ID: 23e592aecd9e6d9391859c1c93aae8534ba243a691771437778832d1123d7dfa
                                                                    • Instruction ID: e1dc03d99921ea200ca9a356a37d3756482a6379986aacd31d5701865eba75d7
                                                                    • Opcode Fuzzy Hash: 23e592aecd9e6d9391859c1c93aae8534ba243a691771437778832d1123d7dfa
                                                                    • Instruction Fuzzy Hash: A6F028366043051FDB185F398CD2ABB7B92EF80328F05446CF9018B690D3B1BC418610
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 005F61F6: RtlEnterCriticalSection.NTDLL(+_), ref: 005F6205
                                                                    • EnumSystemLocalesW.KERNEL32(005FF220,00000001,006BA0B0,0000000C), ref: 005FF29E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                    • String ID:
                                                                    • API String ID: 1272433827-0
                                                                    • Opcode ID: 19f664eee6b0fc2904735f7d5775d434abfe14aae920b262dea4a680d2cd66bf
                                                                    • Instruction ID: 913d2064c68c3abb226b8bd5e28023ccd4e7987f0d85a7c337ca3b3ef4d13c7e
                                                                    • Opcode Fuzzy Hash: 19f664eee6b0fc2904735f7d5775d434abfe14aae920b262dea4a680d2cd66bf
                                                                    • Instruction Fuzzy Hash: 94F04475910209EFD710EF68D94AFAD3BB1BF44710F108119F510DB2A5C77589408B45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 005FED46: GetLastError.KERNEL32(?,004D41D4,005E66AE,004D41D4,?,?,005F2B48,004D41D4,?,00000000), ref: 005FED4A
                                                                      • Part of subcall function 005FED46: _free.LIBCMT ref: 005FED7D
                                                                      • Part of subcall function 005FED46: SetLastError.KERNEL32(00000000,004D41D4,?,00000000), ref: 005FEDBE
                                                                      • Part of subcall function 005FED46: _abort.LIBCMT ref: 005FEDC4
                                                                    • EnumSystemLocalesW.KERNEL32(006079E0,00000001,00000002,?,?,0060824B,005FBDE8,?,?,?,?,?,005FBDE8,?,?,?), ref: 00607AC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                    • String ID:
                                                                    • API String ID: 1084509184-0
                                                                    • Opcode ID: 6ec4636f3fd8b7162530ec0730c3137f44b8bb4a77c09f3ded701a1fbf8ad911
                                                                    • Instruction ID: f200e6a6f619a535333fa28bd10d085f247a6e55a20307b258902cb2cb85c672
                                                                    • Opcode Fuzzy Hash: 6ec4636f3fd8b7162530ec0730c3137f44b8bb4a77c09f3ded701a1fbf8ad911
                                                                    • Instruction Fuzzy Hash: E0F05C3574020957CB089F35C8466AB7F55EFC1710F0A4058EE06CB290C271AD42C790
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: bad codelengths
                                                                    • API String ID: 0-697342978
                                                                    • Opcode ID: 0a065f0266bf2460c2ee9dfb3334f52a3ec933d99e4f8a7f42c0fc315038cef6
                                                                    • Instruction ID: dfa6a644803cf6f4d33048068163f0debadb251a838e4c0c0e5b545f0f486e57
                                                                    • Opcode Fuzzy Hash: 0a065f0266bf2460c2ee9dfb3334f52a3ec933d99e4f8a7f42c0fc315038cef6
                                                                    • Instruction Fuzzy Hash: C5913BB2E0091B5BDB14CA24DC55ABDBBE4FB84320F14827EE969D36C1E7749D918B80
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Enter PEM pass phrase:
                                                                    • API String ID: 0-3278253880
                                                                    • Opcode ID: 899ff3291911b3531298fc27b7fdcfd561e9d5b8dc50c02cbdbb183d889e8c43
                                                                    • Instruction ID: 74263bddbb78db124ae9e45b9ea1e6ffd9506ccd83c6c3fa46e556f8d201b942
                                                                    • Opcode Fuzzy Hash: 899ff3291911b3531298fc27b7fdcfd561e9d5b8dc50c02cbdbb183d889e8c43
                                                                    • Instruction Fuzzy Hash: 2C5137B16086C656DF3C897B449A7FE6F99BB53300F18091ED8C6C72A3D605EE46C392
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 676e3206ce600a5edf9d8bb3786e24a454b1396b3000e72663707fec03abaca8
                                                                    • Instruction ID: 25f7348230bb7ccdbb1ddda474741fcfe53a5ec339ba61eb87705aa08f431ba9
                                                                    • Opcode Fuzzy Hash: 676e3206ce600a5edf9d8bb3786e24a454b1396b3000e72663707fec03abaca8
                                                                    • Instruction Fuzzy Hash: AD02C271A0026E8FDB24CF68C980BEDB7B5FB59310F1086EAD559E7340D670AE858F94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2d3b65ee5710261f85becf6a62758e593bef362fae94597c2e6dce131c33b4fe
                                                                    • Instruction ID: 155f80053a4e91f070aacf4bbddeb9d000579d46889c9bc3cf7065d165a4b3b1
                                                                    • Opcode Fuzzy Hash: 2d3b65ee5710261f85becf6a62758e593bef362fae94597c2e6dce131c33b4fe
                                                                    • Instruction Fuzzy Hash: E7C1D6B16087019FD718DF78D885AAAF7E4BF84318F40471EEA1997341E774A904CBDA
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 481f6757af259fb5256cbe25341ecb27eed527ab54e0b8ee1268a0651247e6da
                                                                    • Instruction ID: 691c1568f234ce6cae7035daf979544893f550aca1bba4b7e9c605113929cc38
                                                                    • Opcode Fuzzy Hash: 481f6757af259fb5256cbe25341ecb27eed527ab54e0b8ee1268a0651247e6da
                                                                    • Instruction Fuzzy Hash: 88617B716007DA56DF3CAA2B8D957FE2FC9FF81300F64091AE9C7DB281D651ED428246
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e851859beec7308c60b916243f25112e3850971195233f0acbb380cb58252c77
                                                                    • Instruction ID: 6cbef8713544954943bcc1111737b663c826aeb7cb86858f23f7f91787ff1797
                                                                    • Opcode Fuzzy Hash: e851859beec7308c60b916243f25112e3850971195233f0acbb380cb58252c77
                                                                    • Instruction Fuzzy Hash: 7E5158717046C557DF3C992B84997BE2FCEBF92300F28096AD8C6CB282D615EE45D352
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5ed1d306d06e064824aa5d1ff865f126ad74beb04ac2ad809da37946773cf1bb
                                                                    • Instruction ID: b57765bffea3f1d01680f767cc164c57020f4cb8becc8da84f42a4bbbd49e729
                                                                    • Opcode Fuzzy Hash: 5ed1d306d06e064824aa5d1ff865f126ad74beb04ac2ad809da37946773cf1bb
                                                                    • Instruction Fuzzy Hash: E2216C315340B20AC74C8B3A9C61477BB91DB4720338F82AFEA97DA0D2C92DD525D7A0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                    • Instruction ID: c2f1914ac61bdc8505f0c0436743c4c6fe75b0829c1db9c9c9760211a36a20bf
                                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                    • Instruction Fuzzy Hash: EB110BBF2040C243DA4C8A6FD8B46B6AF9DFBC5320F2C4369D2C24B65CD123E9459500
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetUserDefaultUILanguage.KERNEL32(006764F6,A1986743), ref: 004D660C
                                                                    • _fwprintf.LIBCONCRTD ref: 004D76E7
                                                                      • Part of subcall function 0047E710: _fread.LIBCMTD ref: 0047E72F
                                                                      • Part of subcall function 0048BD20: operator!=.LIBCPMTD ref: 0048BD7B
                                                                      • Part of subcall function 0048BD20: operator!=.LIBCPMTD ref: 0048BDAD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: operator!=$DefaultLanguageUser_fread_fwprintf
                                                                    • String ID: P$0x%.4x$Arabic_Algeria$Arabic_Bahrain$Arabic_Egypt$Arabic_Iraq$Arabic_Jordan$Arabic_Kuwait$Arabic_Lebanon$Arabic_Libya$Arabic_Morocco$Arabic_Oman$Arabic_Qatar$Arabic_Syria$Arabic_Tunisia$Arabic_U.A.E.$Arabic_Yemen$Chinese_Macao SAR$Chinese_Singapore$Default_Default$English_Belize$English_Canada$English_Caribbean$English_Ireland$English_Jamaica$English_Philippines$English_South Africa$English_Trinidad$English_Zimbabwe$French_Monaco$French_Switzerland$German_Luxembourg$Neutral_Neutral$Spanish_Argentina$Spanish_Bolivia$Spanish_Chile$Spanish_Colombia$Spanish_Dominican Republic$Spanish_Ecuador$Spanish_El Salvador$Spanish_Guatemala$Spanish_Honduras$Spanish_Nicaragua$Spanish_Panama$Spanish_Paraguay$Spanish_Peru$Spanish_Puerto Rico$Spanish_Uruguay$Spanish_Venezuela
                                                                    • API String ID: 2298643120-1910278641
                                                                    • Opcode ID: 9530802b503e7a59757103d0c53f9b91e12e2054789d8f3c3a9d966c5ba0fb2d
                                                                    • Instruction ID: 1d2a7aad3838b68819dc991044d284b169721c9a3390a009a0328ed60bd6936d
                                                                    • Opcode Fuzzy Hash: 9530802b503e7a59757103d0c53f9b91e12e2054789d8f3c3a9d966c5ba0fb2d
                                                                    • Instruction Fuzzy Hash: 74227230A4631ADADF79DB04CD65BBAB271AB12309F0040EF951921691FB7C1EC9DF4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(aes256,00008002,AES-256-CBC), ref: 00555A48
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(00000000,aes256,00008002,AES-256-CBC), ref: 00555A53
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(00000000,00000000,aes256,00008002,AES-256-CBC), ref: 00555A5E
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(00000000,00000000,00000000,aes256,00008002,AES-256-CBC), ref: 00555A69
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: D.5531.23089libssh2_trace_sethandler.
                                                                    • String ID: AES-128-CBC$AES-192-CBC$AES-256-CBC$AES128$AES192$AES256$BF-CBC$CAMELLIA-128-CBC$CAMELLIA-192-CBC$CAMELLIA-256-CBC$CAMELLIA128$CAMELLIA192$CAMELLIA256$CAST$CAST-cbc$CAST5-CBC$DES$DES-CBC$DES-EDE3-CBC$DES3$DESX$DESX-CBC$IDEA$IDEA-CBC$RC2$RC2-CBC$SEED$SEED-CBC$aes128$aes192$aes256$blowfish$camellia128$camellia192$camellia256$cast$cast-cbc$des$des3$desx$idea$rc2$seed
                                                                    • API String ID: 3710141464-1028625545
                                                                    • Opcode ID: 5c79cc3fb8415c545592fbcfd4686b73f17bc0bf0741502e87df64dce99c9496
                                                                    • Instruction ID: 4f05ae288d963eb64723ccab32a6eb91a71de2dc1cb90277a760d4bcea3ec0f1
                                                                    • Opcode Fuzzy Hash: 5c79cc3fb8415c545592fbcfd4686b73f17bc0bf0741502e87df64dce99c9496
                                                                    • Instruction Fuzzy Hash: 7DB14CA598072771ED6173F02C7FF1E1E1D3DD1B0AF828842B945B62C39C68B54E85BA
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 4ddig$4ddignet$4ddignet-bing$4uKey$Adoreshare$Bing$Card$HitPaw$HitPawNet$HitPawOnline$NXZCN$NXZSoftware$PDNob$PFNET$ReiBoot$ReiBootNet$TSNET$Tool$UltFone$UltFoneNet$Yahoo$Z$ZHCN$_4ddigbing.$_bing.$_bing_$_online$_online.$_yahoo.$_yahoo_$download4.cc
                                                                    • API String ID: 0-3957181515
                                                                    • Opcode ID: f39990026d4d20321a17c53e1c7cb22be3e940c028c8e394e091f22c91bf390f
                                                                    • Instruction ID: 77cf7d3dc0beaa972466f381803b9def5ba0cc013a6211b0bdd13347e8effb68
                                                                    • Opcode Fuzzy Hash: f39990026d4d20321a17c53e1c7cb22be3e940c028c8e394e091f22c91bf390f
                                                                    • Instruction Fuzzy Hash: 69120730A0020CDFDF24EF15CC61AAE77B1AF41364F11865EF5695A2E1DB38AA41DF89
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetFileAttributesW.KERNEL32(00000000,?,00000001,-00000002,A1986743), ref: 004D8E59
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004D8F6D
                                                                    • ShellExecuteW.SHELL32(00000000,open,explorer.exe,00000000,00000000,00000001), ref: 004D8F7F
                                                                    • GetLastError.KERNEL32 ref: 004D8F8B
                                                                    • _fwprintf.LIBCONCRTD ref: 004D9056
                                                                      • Part of subcall function 00485DE0: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00485E1D
                                                                      • Part of subcall function 004DC890: __Init_thread_footer.LIBCMT ref: 004DC908
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004D8E53
                                                                      • Part of subcall function 0047CA20: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047CA49
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004D91AD
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004D91C3
                                                                    • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?,0000005C,FFFFFFFF,0069B82C,?,?,A1986743), ref: 004D91CB
                                                                    • GetLastError.KERNEL32(?,?,A1986743), ref: 004D91D9
                                                                    • wsprintfW.USER32 ref: 004D9218
                                                                    Strings
                                                                    • ..\..\..\..\src\FuntionImpl.cpp, xrefs: 004D922F
                                                                    • open, xrefs: 004D8F78
                                                                    • StartWindowError, xrefs: 004D9067
                                                                    • ..\..\..\..\src\FuntionImpl.cpp, xrefs: 004D8FB2
                                                                    • Other, xrefs: 004D92D2
                                                                    • StartWindowError, xrefs: 004D8EFE
                                                                    • int __cdecl FuntionImpl::StartTargetMainExe(class std::basic_string<wchar_t,struct std::char_traits<wchar_t>,class std::allocator<wchar_t> >,int), xrefs: 004D9225
                                                                    • StartWindowError, xrefs: 004D92CD
                                                                    • int __cdecl FuntionImpl::StartTargetMainExe(class std::basic_string<wchar_t,struct std::char_traits<wchar_t>,class std::allocator<wchar_t> >,int), xrefs: 004D8E76
                                                                    • int __cdecl FuntionImpl::StartTargetMainExe(class std::basic_string<wchar_t,struct std::char_traits<wchar_t>,class std::allocator<wchar_t> >,int), xrefs: 004D8FA8
                                                                    • CreateProcess failed2 (, xrefs: 004D8FE9
                                                                    • Other, xrefs: 004D906C
                                                                    • CreateProcess failed3 (%d), xrefs: 004D920C
                                                                    • CreateProcess failed1 (, xrefs: 004D8EB7
                                                                    • D, xrefs: 004D9114
                                                                    • Other, xrefs: 004D8F03
                                                                    • ..\..\..\..\src\FuntionImpl.cpp, xrefs: 004D8E80
                                                                    • /e, , xrefs: 004D8F4B
                                                                    • explorer.exe, xrefs: 004D8F73
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_$ErrorLast$AttributesBase::Concurrency::details::ContextCreateExecuteFileIdentityInit_thread_footerProcessQueueShellWork_fwprintfwsprintf
                                                                    • String ID: CreateProcess failed1 ($ CreateProcess failed2 ($..\..\..\..\src\FuntionImpl.cpp$..\..\..\..\src\FuntionImpl.cpp$..\..\..\..\src\FuntionImpl.cpp$/e, $CreateProcess failed3 (%d)$D$Other$Other$Other$StartWindowError$StartWindowError$StartWindowError$explorer.exe$int __cdecl FuntionImpl::StartTargetMainExe(class std::basic_string<wchar_t,struct std::char_traits<wchar_t>,class std::allocator<wchar_t> >,int)$int __cdecl FuntionImpl::StartTargetMainExe(class std::basic_string<wchar_t,struct std::char_traits<wchar_t>,class std::allocator<wchar_t> >,int)$int __cdecl FuntionImpl::StartTargetMainExe(class std::basic_string<wchar_t,struct std::char_traits<wchar_t>,class std::allocator<wchar_t> >,int)$open
                                                                    • API String ID: 1479719766-2662774569
                                                                    • Opcode ID: eaca124a7bc8d108b2a0b5220c38a2ce3d2c1420f08a63fa9499efeb7ecef713
                                                                    • Instruction ID: 8ecbc7e37e8c4f886ca2f0aeed067f983f2c234e35a707709c6c4546130dfc4e
                                                                    • Opcode Fuzzy Hash: eaca124a7bc8d108b2a0b5220c38a2ce3d2c1420f08a63fa9499efeb7ecef713
                                                                    • Instruction Fuzzy Hash: 50D19070A00618AADB20EB60DD96BEE7775AB44705F0081DDF509AB2C2DBB45F84CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E099
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E0A8
                                                                    • char_traits.LIBCPMTD ref: 0047E0B4
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E0D0
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E0E5
                                                                    • char_traits.LIBCPMTD ref: 0047E0F7
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E106
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E115
                                                                    • char_traits.LIBCPMTD ref: 0047E121
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E13D
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E14C
                                                                    • char_traits.LIBCPMTD ref: 0047E158
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E167
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E17C
                                                                    • char_traits.LIBCPMTD ref: 0047E18E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$char_traits
                                                                    • String ID:
                                                                    • API String ID: 1941806930-0
                                                                    • Opcode ID: 5b29f47169018024c5e12ef1c1d5820077d0104443f99be338b63d03dad04b15
                                                                    • Instruction ID: 282dfc716d0406dfdac478d98a5e24f2986a01d76df2c4f647446b765b76e618
                                                                    • Opcode Fuzzy Hash: 5b29f47169018024c5e12ef1c1d5820077d0104443f99be338b63d03dad04b15
                                                                    • Instruction Fuzzy Hash: 32C1E270A0000EEFCB14EF59C992CDE7776AF88348B11855DF9095B266DB34AE25CBD4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490D6C
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490D78
                                                                    • char_traits.LIBCPMTD ref: 00490D81
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490D9D
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490DAC
                                                                    • char_traits.LIBCPMTD ref: 00490DB8
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490DC7
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490DD3
                                                                    • char_traits.LIBCPMTD ref: 00490DDC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490DF8
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490E04
                                                                    • char_traits.LIBCPMTD ref: 00490E0D
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490E1C
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490E2B
                                                                    • char_traits.LIBCPMTD ref: 00490E37
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$char_traits
                                                                    • String ID:
                                                                    • API String ID: 1941806930-0
                                                                    • Opcode ID: 79a62be72cdeef87cf15268bd0371060c79c4a4488ac3b5ee5e98fc4a685bcf5
                                                                    • Instruction ID: c9cc5097ed4b9b61c983e4f60bccca27dfff8cc458ac955081606859f07e1c1c
                                                                    • Opcode Fuzzy Hash: 79a62be72cdeef87cf15268bd0371060c79c4a4488ac3b5ee5e98fc4a685bcf5
                                                                    • Instruction Fuzzy Hash: 90A14AB6A00008EFCF04FF95D996DDE7BB5AF58348F108469F90997212DB34AE50DB98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _sprintf_s.LIBCMTD ref: 00462733
                                                                    • libssh2_session_last_errno.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?,?,?,00000000,?,?,?), ref: 004627BA
                                                                    • libssh2_channel_free.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?,?,?,?,?,?,?), ref: 00462C27
                                                                    Strings
                                                                    • session, xrefs: 004627A1
                                                                    • Would block send core file data for SCP file, xrefs: 00462AF8
                                                                    • Unable to send core file data for SCP file, xrefs: 00462B15
                                                                    • failed to send file, xrefs: 00462BFF
                                                                    • Would block waiting for response from remote, xrefs: 004628BD
                                                                    • scp -%st , xrefs: 0046272C
                                                                    • Would block starting up channel, xrefs: 004627E9
                                                                    • Unexpected channel close, xrefs: 00462B80
                                                                    • Unable to allocate a command buffer for scp session, xrefs: 004626F7
                                                                    • T%ld 0 %ld 0, xrefs: 00462924
                                                                    • Would block waiting for response, xrefs: 00462A38
                                                                    • Invalid SCP ACK response, xrefs: 00462A75
                                                                    • C0%o %I64d %s, xrefs: 00462A9C
                                                                    • Unknown error while getting error string, xrefs: 00462868
                                                                    • SCP failure, xrefs: 004628D6, 00462A52
                                                                    • failed to get memory, xrefs: 00462BBE
                                                                    • Would block requesting SCP startup, xrefs: 0046283A
                                                                    • Invalid ACK response from remote, xrefs: 004628F5
                                                                    • Would block sending time data for SCP file, xrefs: 004629D5
                                                                    • exec, xrefs: 00462827
                                                                    • Unable to send time data for SCP file, xrefs: 004629F2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: D.5531.23089$_sprintf_slibssh2_channel_free.libssh2_session_last_errno.
                                                                    • String ID: C0%o %I64d %s$Invalid ACK response from remote$Invalid SCP ACK response$SCP failure$T%ld 0 %ld 0$Unable to allocate a command buffer for scp session$Unable to send core file data for SCP file$Unable to send time data for SCP file$Unexpected channel close$Unknown error while getting error string$Would block requesting SCP startup$Would block send core file data for SCP file$Would block sending time data for SCP file$Would block starting up channel$Would block waiting for response$Would block waiting for response from remote$exec$failed to get memory$failed to send file$scp -%st $session
                                                                    • API String ID: 1696162823-3638574340
                                                                    • Opcode ID: 524f1c7a8819cab39b10a45962973038f7faf0b5b017a2b8fe022e4baa07c6bc
                                                                    • Instruction ID: 497a20ce0beac5adfff6c95d1226a7b135943be0f1d5e91364abd1302591556e
                                                                    • Opcode Fuzzy Hash: 524f1c7a8819cab39b10a45962973038f7faf0b5b017a2b8fe022e4baa07c6bc
                                                                    • Instruction Fuzzy Hash: 64F10571600B007FD2209AB58C81FAB73D5AF95314F10491FF99E93281FAB9A906C77B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD4FA
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD505
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD510
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD51B
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD527
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD533
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DD53E
                                                                    • _fwprintf.LIBCONCRTD ref: 004DD550
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_$_fwprintf
                                                                    • String ID: &cd1=$&cd2=$&cd3=$&cd4=$&cd5=$&cd6=$&cd7=$&cd8=$&ep.cd1=%s&ep.cd2=%s&ep.cd3=%s&ep.cd4=%s&ep.cd5=%s&ep.cd6=%s&ep.cd7=%s&ep.cd8=%d$2.7.11.0$4DDiG DLL Fixer$English$United Kingdom
                                                                    • API String ID: 3329881603-3232758530
                                                                    • Opcode ID: e89e9d920ef7a6aad7e3c16bf9a2ce58f3086ed1f42effe3e978ead1c29666a3
                                                                    • Instruction ID: 8715d62db26b67972237e36ae9f3b8382b56236956948220c0f0fbaa6c03d433
                                                                    • Opcode Fuzzy Hash: e89e9d920ef7a6aad7e3c16bf9a2ce58f3086ed1f42effe3e978ead1c29666a3
                                                                    • Instruction Fuzzy Hash: 96E18D75C0025CAECB29EB95CC51BDEBBB5AF18308F0481EEE509A3241DB745F849F95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041534E
                                                                    • __allrem.LIBCMT ref: 00415381
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041538F
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041539F
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004153D3
                                                                    • __allrem.LIBCMT ref: 00415403
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00415411
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00415421
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00415454
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00415487
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004154AC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$__allrem
                                                                    • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d$tPHK
                                                                    • API String ID: 632788072-3077278694
                                                                    • Opcode ID: f77901f49b08fad33ad3d600d09f2ba534cbfadb71bba4a8c2c15b2fee184490
                                                                    • Instruction ID: 25e6b799e4a67979d480f789995ca227d5baf79aecf33f23c3e19179a984b21f
                                                                    • Opcode Fuzzy Hash: f77901f49b08fad33ad3d600d09f2ba534cbfadb71bba4a8c2c15b2fee184490
                                                                    • Instruction Fuzzy Hash: 1941DDF1B81B04BAF431285A6C8BFEB481D9BD1F99F14442FBA05B60C3A5DD59E0407E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ssh-dss$ ssh-rsa$%s%s %s$%s%s %s %s$0sf<sf$<sf$Known-host write buffer too small$Unable to allocate memory for base64-encoded host name$Unable to allocate memory for base64-encoded salt$Unsupported type of known-host information store$|1|%s|%s%s %s$|1|%s|%s%s %s %s
                                                                    • API String ID: 0-3777664431
                                                                    • Opcode ID: 73683f43a7cf33adb19b3aecd9aa0e51af9db5aae1f84a66abd6a6d622adb680
                                                                    • Instruction ID: 84061c4c74cfd3d2fafd138472cdaa27acb4e56380a28c40e7cf29526ebca65c
                                                                    • Opcode Fuzzy Hash: 73683f43a7cf33adb19b3aecd9aa0e51af9db5aae1f84a66abd6a6d622adb680
                                                                    • Instruction Fuzzy Hash: 1691BE71608202AFC304DF69DC95C6BB7E9EFC9304F544A1EF894D7312EA35E9098B96
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ___free_lconv_mon.LIBCMT ref: 00606E43
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 006061F4
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 00606206
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 00606218
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 0060622A
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 0060623C
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 0060624E
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 00606260
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 00606272
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 00606284
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 00606296
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 006062A8
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 006062BA
                                                                      • Part of subcall function 006061D7: _free.LIBCMT ref: 006062CC
                                                                    • _free.LIBCMT ref: 00606E38
                                                                      • Part of subcall function 005F64BE: RtlFreeHeap.NTDLL(00000000,00000000,?,00606944,005EB47E,00000000,005EB47E,00000000,?,00606BE8,005EB47E,00000007,005EB47E,?,00606F97,005EB47E), ref: 005F64D4
                                                                      • Part of subcall function 005F64BE: GetLastError.KERNEL32(005EB47E,?,00606944,005EB47E,00000000,005EB47E,00000000,?,00606BE8,005EB47E,00000007,005EB47E,?,00606F97,005EB47E,005EB47E), ref: 005F64E6
                                                                    • _free.LIBCMT ref: 00606E5A
                                                                    • _free.LIBCMT ref: 00606E6F
                                                                    • _free.LIBCMT ref: 00606E7A
                                                                    • _free.LIBCMT ref: 00606E9C
                                                                    • _free.LIBCMT ref: 00606EAF
                                                                    • _free.LIBCMT ref: 00606EBD
                                                                    • _free.LIBCMT ref: 00606EC8
                                                                    • _free.LIBCMT ref: 00606F00
                                                                    • _free.LIBCMT ref: 00606F07
                                                                    • _free.LIBCMT ref: 00606F24
                                                                    • _free.LIBCMT ref: 00606F3C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                    • String ID: ql$xsl
                                                                    • API String ID: 161543041-4224295949
                                                                    • Opcode ID: f2f6c7cc5662bf07c13d8889088cf8d3eb0ab3fe91f98b0577aba5714d8bd221
                                                                    • Instruction ID: 66978af8c4583bc045eb864ee0d2a412bcc9f331ddeb756bbfaf98127c8a68dc
                                                                    • Opcode Fuzzy Hash: f2f6c7cc5662bf07c13d8889088cf8d3eb0ab3fe91f98b0577aba5714d8bd221
                                                                    • Instruction Fuzzy Hash: 5131A03154470A9FEB24AA38D849BA777EBFF80350F104419F958C7691DF7AEC608B10
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0041253A,004010C5,?,00401121,00000003), ref: 005289E9
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0041253A,004010C5,?,00401121), ref: 005289F4
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0041253A,004010C5), ref: 005289FF
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0041253A,004010C5), ref: 00528A0A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: D.5531.23089libssh2_trace_sethandler.
                                                                    • String ID: DSA-SHA1$DSA-SHA1-old$DSS1$MD5$RSA-SHA1$RSA-SHA1-2$SHA1$dss1$ssl2-md5$ssl3-md5$ssl3-sha1
                                                                    • API String ID: 3710141464-581511803
                                                                    • Opcode ID: 36e82ce71e4f09a62cc13263660b540bf50d73fe78bf687f72e9c9ffc9c8e459
                                                                    • Instruction ID: 399caa72e58be4efcc267bb83fc88011eca985fb6822a7d98cd1073be9249651
                                                                    • Opcode Fuzzy Hash: 36e82ce71e4f09a62cc13263660b540bf50d73fe78bf687f72e9c9ffc9c8e459
                                                                    • Instruction Fuzzy Hash: 6821AAB494072370ED2073F12CAFE4E1E1D3DD170EF424841B895B62C3DCA9B48985BA
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • libssh2_session_last_errno.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(00000000,?,?,?,00000000,?,0045E2AA,?), ref: 0045DF98
                                                                    Strings
                                                                    • session, xrefs: 0045DF7F
                                                                    • Unable to request SFTP subsystem, xrefs: 0045E029
                                                                    • Would block to request SFTP subsystem, xrefs: 0045E00E
                                                                    • Would block requesting handle extended data, xrefs: 0045E062
                                                                    • Would block starting up channel, xrefs: 0045DFA5
                                                                    • Unable to startup channel, xrefs: 0045DFBB
                                                                    • Invalid SSH_FXP_VERSION response, xrefs: 0045E189
                                                                    • subsystem, xrefs: 0045DFFB
                                                                    • Would block sending SSH_FXP_INIT, xrefs: 0045E120
                                                                    • Timeout waiting for response from SFTP subsystem, xrefs: 0045E17A
                                                                    • Unable to send SSH_FXP_INIT, xrefs: 0045E13B
                                                                    • sftp, xrefs: 0045DFF4
                                                                    • Unable to allocate a new SFTP structure, xrefs: 0045E093
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: D.5531.23089libssh2_session_last_errno.
                                                                    • String ID: Invalid SSH_FXP_VERSION response$Timeout waiting for response from SFTP subsystem$Unable to allocate a new SFTP structure$Unable to request SFTP subsystem$Unable to send SSH_FXP_INIT$Unable to startup channel$Would block requesting handle extended data$Would block sending SSH_FXP_INIT$Would block starting up channel$Would block to request SFTP subsystem$session$sftp$subsystem
                                                                    • API String ID: 1735628876-913057909
                                                                    • Opcode ID: efeae246fe29e2e497bc07aa4183c969af3ac7ff90db88ae96f7826fd7aca056
                                                                    • Instruction ID: c4a7106b3b0537b8d12d3e8729cf0eaacf4b5ebaebe76e197ea8315d80db1084
                                                                    • Opcode Fuzzy Hash: efeae246fe29e2e497bc07aa4183c969af3ac7ff90db88ae96f7826fd7aca056
                                                                    • Instruction Fuzzy Hash: 4A8105B29042456EEF309F25AC81EAF7399EB41319F100B3BFD0E9A2C2E77556488757
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetWindow.USER32(?,00000004), ref: 004FFFF1
                                                                    • ShowWindow.USER32(?,00000001,?,?,?,00000000,96C80000,00000000,00000000,00000000,00000258,00000190), ref: 004FFFFE
                                                                    • EnableWindow.USER32(00000000,00000000), ref: 00500007
                                                                    • IsWindow.USER32(?), ref: 0050001A
                                                                    • GetMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00500031
                                                                    • EnableWindow.USER32(00000000,00000001), ref: 00500052
                                                                    • SetFocus.USER32(00000000,?,?,?,00000000), ref: 00500059
                                                                    • TranslateMessage.USER32(00000000), ref: 0050006D
                                                                    • DispatchMessageW.USER32(00000000), ref: 00500077
                                                                    • IsWindow.USER32(?), ref: 00500086
                                                                    • EnableWindow.USER32(00000000,00000001), ref: 00500093
                                                                    • SetFocus.USER32(00000000,?,?,?,00000000,96C80000,00000000,00000000,00000000,00000258,00000190), ref: 0050009A
                                                                    • PostQuitMessage.USER32(00000000), ref: 005000A8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Message$Enable$Focus$DispatchPostQuitShowTranslate
                                                                    • String ID:
                                                                    • API String ID: 200552106-0
                                                                    • Opcode ID: f19d14e60d0717646f41a0208118f7bad46bf3efcf2d7fe063e83853d9427f5f
                                                                    • Instruction ID: 4db7fe169b3acfdf31f3de318890eea2863cc26908a7881b2e7e3cd8a1c41598
                                                                    • Opcode Fuzzy Hash: f19d14e60d0717646f41a0208118f7bad46bf3efcf2d7fe063e83853d9427f5f
                                                                    • Instruction Fuzzy Hash: A3215C31900208EBEF219BA4DD59BEEBBBAFF08301F089016F605E6191D77599418B71
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _fwprintf.LIBCONCRTD ref: 0045BE69
                                                                      • Part of subcall function 0047E710: _fread.LIBCMTD ref: 0047E72F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _fread_fwprintf
                                                                    • String ID: $%02X$<random>$MIT-MAGIC-COOKIE-1$Unable to allocate memory for pty-request$Unable to complete request for channel x11-req$Unable to send x11-req packet$Would block sending X11-req packet$waiting for x11-req response packet$x11-req
                                                                    • API String ID: 2879884958-2076190794
                                                                    • Opcode ID: d60f2b1c446e48ada82f08c565b6888f2a7db4fd066bbc78a817ab80929d6c45
                                                                    • Instruction ID: 50e5ca99aafa9ae0285bbfe36b55bf81160d6c3582fa585b43dccffebed74fea
                                                                    • Opcode Fuzzy Hash: d60f2b1c446e48ada82f08c565b6888f2a7db4fd066bbc78a817ab80929d6c45
                                                                    • Instruction Fuzzy Hash: DF91E5716087419FC314DF65C885AABB3E5FFC8304F44491EF99A87242E739E9088B96
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID: TreeNodeUI$align$left$;P$ZQ
                                                                    • API String ID: 431132790-655633490
                                                                    • Opcode ID: 654b2f0fa490bb9d8852b33d8e8410a48b3b0f23c060c7d8245fb4dd52d672c5
                                                                    • Instruction ID: 844edd35a3bf39e8fe7050e2c606f4e56c0fddfa973b4c69046222ce7ef323ff
                                                                    • Opcode Fuzzy Hash: 654b2f0fa490bb9d8852b33d8e8410a48b3b0f23c060c7d8245fb4dd52d672c5
                                                                    • Instruction Fuzzy Hash: 7781AD70701A02EFD708DF74C889BAAFBA5BF49345F14016DE4199B392DB706A54CF91
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::_Scoped_lock.LIBCMTD ref: 0048534F
                                                                      • Part of subcall function 0048B400: std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 0048B414
                                                                    • SafeRWList.LIBCONCRTD ref: 00485542
                                                                      • Part of subcall function 00484E60: Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00484E8C
                                                                    • SafeRWList.LIBCONCRTD ref: 004854AE
                                                                      • Part of subcall function 0048CF20: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 0048CF6E
                                                                    • new.LIBCMT ref: 004854C0
                                                                    • shared_ptr.LIBCMTD ref: 00485518
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ListProcessorSafeVirtual$Affinity::operator!=Concurrency::Concurrency::details::Concurrency::details::_CriticalHardwareLock::_Mutex_baseMutex_base::~_ReentrantRootRoot::Scoped_lockScoped_lock::_shared_ptrstd::_
                                                                    • String ID: ) [validId$ASSERTION FAILURE FROM EASYLOGGING++ (LINE: $Invalid logger ID [$] WITH MESSAGE "$]. Not registering this logger.$`Wi
                                                                    • API String ID: 3292200182-2204589995
                                                                    • Opcode ID: a19931a72df6ae67d7e0cdf8b25a1a3e9738ae7590cd6fcf92a3c2c828c46471
                                                                    • Instruction ID: 638f03df9ec7a954789332cdb27b8a0a68a56a2d28cb7d74c763ea708197105b
                                                                    • Opcode Fuzzy Hash: a19931a72df6ae67d7e0cdf8b25a1a3e9738ae7590cd6fcf92a3c2c828c46471
                                                                    • Instruction Fuzzy Hash: 0F6150B0E01248ABCF04EBA5DC51FDEBBB5AF55304F10456DF406A7382DB785A44CB99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DCAD9
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DCAE2
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DCAEB
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DCAF4
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004DCAFF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_
                                                                    • String ID: 2.7.11.0$Downloader$UA-114767297-1
                                                                    • API String ID: 1531518832-4050625499
                                                                    • Opcode ID: 3c55b18b4cb09f81401cc9bb7ff1cbb9bcba53dce4b5d01a31979e73524e95e4
                                                                    • Instruction ID: c3115b799efd68fef06c0fb91d4ab157699afc28a72d64fabcead2d0e2c47963
                                                                    • Opcode Fuzzy Hash: 3c55b18b4cb09f81401cc9bb7ff1cbb9bcba53dce4b5d01a31979e73524e95e4
                                                                    • Instruction Fuzzy Hash: 46713971900219DFDB14EF64CCA6BEEB7B5AB45714F00829FE409A7291DB386A84CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F4,00000065,0053A466,%s(%d): OpenSSL internal error, assertion failed: %s,?,?,?,0053A06E,.\crypto\cryptlib.c,0000024D,pointer != NULL,00000169), ref: 0053A32B
                                                                    • GetFileType.KERNEL32(00000000), ref: 0053A338
                                                                    • vswprintf.LIBCMT ref: 0053A35B
                                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0053A37B
                                                                    • vswprintf.LIBCMT ref: 0053A3B0
                                                                    • RegisterEventSourceA.ADVAPI32(00000000,OpenSSL), ref: 0053A3D0
                                                                    • ReportEventA.ADVAPI32(00000000,00000001,00000000,00000000,00000000,00000001,00000000,?,00000000), ref: 0053A3F8
                                                                    • DeregisterEventSource.ADVAPI32(00000000), ref: 0053A3FF
                                                                    • MessageBoxA.USER32(00000000,?,OpenSSL: FATAL,00000010), ref: 0053A429
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Event$FileSourcevswprintf$DeregisterHandleMessageRegisterReportTypeWrite
                                                                    • String ID: OpenSSL$OpenSSL: FATAL
                                                                    • API String ID: 422145335-4224901669
                                                                    • Opcode ID: a6496ea7783a24fa701676a57d809d54c129b223b11c27a21968625d3bc6638b
                                                                    • Instruction ID: a69eea3e8911c38402938e843db242cd896c2f55f80e1016a03fe5436c3c0cd8
                                                                    • Opcode Fuzzy Hash: a6496ea7783a24fa701676a57d809d54c129b223b11c27a21968625d3bc6638b
                                                                    • Instruction Fuzzy Hash: B531B471608301ABE721EB60DC4AFEB77D9FF88B00F44481EBA89D61C0EBB4D5448663
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: tooltips_class32
                                                                    • API String ID: 0-1918224756
                                                                    • Opcode ID: 63def8b3380ed5587c51c8f400f69ceeb26d42d9ea445bb22b600de0b98ade53
                                                                    • Instruction ID: d938cc9b20cfe9b09a54c5d3a9cf229743ec62e7f05940b9c86799c2e8392834
                                                                    • Opcode Fuzzy Hash: 63def8b3380ed5587c51c8f400f69ceeb26d42d9ea445bb22b600de0b98ade53
                                                                    • Instruction Fuzzy Hash: 5632D674A002298FDB64DF15CCA4BE9B7B1AF49308F1481EAD60DAB391CB746E81CF55
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    • Unable to allocate memory for public key data, xrefs: 004635B1
                                                                    • Unable to open public key file, xrefs: 00463506
                                                                    • Unable to read public key from file, xrefs: 004635E6
                                                                    • Missing public key data, xrefs: 00463634
                                                                    • Invalid data in public key file, xrefs: 00463583
                                                                    • Invalid key data, not base64 encoded, xrefs: 004636BB
                                                                    • Invalid public key data, xrefs: 00463665
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: __fread_nolock
                                                                    • String ID: Invalid data in public key file$Invalid key data, not base64 encoded$Invalid public key data$Missing public key data$Unable to allocate memory for public key data$Unable to open public key file$Unable to read public key from file
                                                                    • API String ID: 2638373210-3150497671
                                                                    • Opcode ID: 6af847295f17f0c69c811a99d4e25c8e9eb554a2ab821faf6673dfeea2c999c0
                                                                    • Instruction ID: 47fc91056ea7aed7e4c6e960fa0891ba510ab13c7084e20f1aa5e92e74b6ce1a
                                                                    • Opcode Fuzzy Hash: 6af847295f17f0c69c811a99d4e25c8e9eb554a2ab821faf6673dfeea2c999c0
                                                                    • Instruction Fuzzy Hash: 0A516D77A4425537C610A929AC46EBB374CEEC6725F450126FD0996383F52EEB0882BB
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • new.LIBCMT ref: 004CD29F
                                                                    • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 004CD2CA
                                                                      • Part of subcall function 004CD6E0: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 004CD6EA
                                                                    • new.LIBCMT ref: 004CD305
                                                                      • Part of subcall function 005C97B8: Concurrency::cancel_current_task.LIBCPMT ref: 005C97D0
                                                                      • Part of subcall function 004CCF30: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 004CCF59
                                                                      • Part of subcall function 004CCF30: shared_ptr.LIBCPMTD ref: 004CCF78
                                                                    • new.LIBCMT ref: 004CD365
                                                                      • Part of subcall function 005C97B8: Concurrency::cancel_current_task.LIBCPMT ref: 005C97D7
                                                                      • Part of subcall function 004CF6B0: _DebugHeapAllocator.LIBCPMTD ref: 004CF6C0
                                                                      • Part of subcall function 00485310: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::_Scoped_lock.LIBCMTD ref: 0048534F
                                                                      • Part of subcall function 00485310: SafeRWList.LIBCONCRTD ref: 004854AE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ProcessorVirtual$Concurrency::RootRoot::$Concurrency::cancel_current_task$AllocatorConcurrency::details::_CriticalDebugHeapListLock::_ReentrantSafeScoped_lockScoped_lock::_shared_ptr
                                                                    • String ID: %datetime %level %msg$DefaultLogDispatchCallback$DefaultPerformanceTrackingCallback$`Wi$hWi$H
                                                                    • API String ID: 2653056977-3458785396
                                                                    • Opcode ID: 6dfb38415c3b3204ccbd68ca550a32a51c76371566a6d8292681115e7f86cd50
                                                                    • Instruction ID: a053babf7796eb382f0ccb3e6b718333ab4e6f7e91ebb7667ac24f3971f66cc3
                                                                    • Opcode Fuzzy Hash: 6dfb38415c3b3204ccbd68ca550a32a51c76371566a6d8292681115e7f86cd50
                                                                    • Instruction Fuzzy Hash: 76A12670A00258DFEB54EB64CC51B9DBBB1BF45308F1080EEE549AB292DB741E85CF65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 005FED46: GetLastError.KERNEL32(?,004D41D4,005E66AE,004D41D4,?,?,005F2B48,004D41D4,?,00000000), ref: 005FED4A
                                                                      • Part of subcall function 005FED46: _free.LIBCMT ref: 005FED7D
                                                                      • Part of subcall function 005FED46: SetLastError.KERNEL32(00000000,004D41D4,?,00000000), ref: 005FEDBE
                                                                      • Part of subcall function 005FED46: _abort.LIBCMT ref: 005FEDC4
                                                                    • _memcmp.LIBVCRUNTIME ref: 005FC79F
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?,?,?,?,?,?,?,?,00000000), ref: 005FC7F3
                                                                    • _free.LIBCMT ref: 005FC810
                                                                    • _free.LIBCMT ref: 005FC829
                                                                    • _free.LIBCMT ref: 005FC85B
                                                                    • _free.LIBCMT ref: 005FC864
                                                                    • _free.LIBCMT ref: 005FC870
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorLast$D.5531.23089_abort_memcmplibssh2_trace_sethandler.
                                                                    • String ID: C$xsl
                                                                    • API String ID: 1461188172-3973436227
                                                                    • Opcode ID: 18a47e47242f4edf2d9e21c8ef0bece9a85d94eec94cca60fae9c214f7d71a9f
                                                                    • Instruction ID: 7045384dc75fb725b5e4b892d5bf260554d69a5dba831d4420317754b2a969f8
                                                                    • Opcode Fuzzy Hash: 18a47e47242f4edf2d9e21c8ef0bece9a85d94eec94cca60fae9c214f7d71a9f
                                                                    • Instruction Fuzzy Hash: F7B13B7590121E9FDB24DF28C988AADBBB5FF48304F1045AEE949A7350D735AE90CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    • Unable to allocate memory for known host entry, xrefs: 00457A63
                                                                    • Unknown host name type, xrefs: 00457AAD
                                                                    • Unable to allocate memory for comment, xrefs: 00457C09
                                                                    • Unable to allocate memory for key, xrefs: 00457B9A
                                                                    • Unable to allocate memory for host name, xrefs: 00457B42
                                                                    • Unable to allocate memory for base64-encoded key, xrefs: 00457BDA
                                                                    • No key type set, xrefs: 00457A38
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: No key type set$Unable to allocate memory for base64-encoded key$Unable to allocate memory for comment$Unable to allocate memory for host name$Unable to allocate memory for key$Unable to allocate memory for known host entry$Unknown host name type
                                                                    • API String ID: 0-843222791
                                                                    • Opcode ID: 16f70d8c6fb3614a5e196aaf329797643349f209e388d57078d16fd2d76ae284
                                                                    • Instruction ID: 65a2dbd55a48c67af68fcf6fb8e32288032d67445c70997aa8443a3427fc8847
                                                                    • Opcode Fuzzy Hash: 16f70d8c6fb3614a5e196aaf329797643349f209e388d57078d16fd2d76ae284
                                                                    • Instruction Fuzzy Hash: E371C7B1608302AFC710DF58EC81D6777E9AF88319F14463AFD8497342E739E9098BA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00415200
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00415230
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041528F
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004152C1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                    • String ID: %2I64d:%02I64d:%02I64d$%3I64dd %02I64dh$%7I64dd$--:--:--$tPHK
                                                                    • API String ID: 885266447-4223435289
                                                                    • Opcode ID: d1970390181e076deaed5989c60d45484da1068c75f31610fafe8b43e978767f
                                                                    • Instruction ID: 43e2f40044d5b1313d1b818a12c48fbcbe85d71882774c6e5a18e1b24e2be1ab
                                                                    • Opcode Fuzzy Hash: d1970390181e076deaed5989c60d45484da1068c75f31610fafe8b43e978767f
                                                                    • Instruction Fuzzy Hash: 12317F737447047FF220AA69AC4AFBB7B9CEBC0B54F05451DF504AB282D5A9AC408275
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(FFFFFFFF,?,00000000,?,0053A3C5), ref: 0053A1F7
                                                                    • GetProcAddress.KERNEL32(00000000,_OPENSSL_isservice), ref: 0053A207
                                                                    • GetProcessWindowStation.USER32(?,00000000,?,0053A3C5), ref: 0053A22B
                                                                    • GetUserObjectInformationW.USER32(00000000,00000002,00000000,00000000,?,?,00000000,?,0053A3C5), ref: 0053A246
                                                                    • GetLastError.KERNEL32(?,00000000,?,0053A3C5), ref: 0053A254
                                                                    • GetUserObjectInformationW.USER32(00000000,00000002,?,?,?,?,00000000,?,0053A3C5), ref: 0053A28F
                                                                    • _wcsstr.LIBVCRUNTIME ref: 0053A2B4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: InformationObjectUser$AddressErrorHandleLastModuleProcProcessStationWindow_wcsstr
                                                                    • String ID: Service-0x$_OPENSSL_isservice
                                                                    • API String ID: 304827962-1672312481
                                                                    • Opcode ID: e8a8d3a9f2a44473585ff81ea622a1d84355f7c564e5385802041c50fcb2d20f
                                                                    • Instruction ID: 5bb30edec4e77db0b3dfa535c973197544f78c4b2ac94e9786a77da00758558a
                                                                    • Opcode Fuzzy Hash: e8a8d3a9f2a44473585ff81ea622a1d84355f7c564e5385802041c50fcb2d20f
                                                                    • Instruction Fuzzy Hash: B931B671E00109ABCB10DBB8EC49FEE7BA9FF84720F105269F866D71D1EB31990087A1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • select.WS2_32(?,?,?,00000000,?), ref: 0045A67E
                                                                    Strings
                                                                    • Invalid descriptor passed to libssh2_poll(), xrefs: 0045A4D9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: select
                                                                    • String ID: Invalid descriptor passed to libssh2_poll()
                                                                    • API String ID: 1274211008-496785266
                                                                    • Opcode ID: 4f9b851ad508543a6c6b03730d27e74fd6423a5c26dde893e570259ab0ede7c8
                                                                    • Instruction ID: ab9dca69dee64ebe3600af454a3d35ebdbf9b83743659adb0d5d1a0d623b916f
                                                                    • Opcode Fuzzy Hash: 4f9b851ad508543a6c6b03730d27e74fd6423a5c26dde893e570259ab0ede7c8
                                                                    • Instruction Fuzzy Hash: 36E104715043028BC724DE68D484B6BB7E1AF85315F144A2EED86C7342E779DC59CB4B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 004FAA9B
                                                                    • SelectObject.GDI32(00000000,?), ref: 004FAB47
                                                                      • Part of subcall function 004F9E9E: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 004F9EB2
                                                                      • Part of subcall function 004F9E9E: GetWindowRgn.USER32(?,00000000), ref: 004F9EBF
                                                                    • MoveWindow.USER32(?,?,00000007,?,?,00000000,?,?,?), ref: 004FAC4B
                                                                    • UpdateLayeredWindow.USER32(?,00000000,?,?,?,?,00000000,01FF0000,00000002), ref: 004FAC74
                                                                    • SelectObject.GDI32(?,?), ref: 004FAC81
                                                                    • DeleteObject.GDI32(?), ref: 004FAC8A
                                                                    • DeleteDC.GDI32(?), ref: 004FAC91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Object$DeleteRectSelect$CreateLayeredMoveUpdate
                                                                    • String ID: (
                                                                    • API String ID: 3056610034-3887548279
                                                                    • Opcode ID: 7835c47adb68eafa8a610f722049ded022e7a240abc6b4078617c20cbcbe90f1
                                                                    • Instruction ID: 4252a8ca44d455ffe3594bddb80d99d634bc22ce7f9361bec838e9e9022f346d
                                                                    • Opcode Fuzzy Hash: 7835c47adb68eafa8a610f722049ded022e7a240abc6b4078617c20cbcbe90f1
                                                                    • Instruction Fuzzy Hash: A4715BB1D00258AFDF15CFA4CC45BEEBBB9EF48300F14406AEA09AB252D7309A04CB65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RtlDecodePointer.NTDLL(?), ref: 00604D7F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: DecodePointer
                                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                    • API String ID: 3527080286-3064271455
                                                                    • Opcode ID: 7c5b40184d29e617f347c60636318af018b24df9773e7b89dc890cbae927a4c9
                                                                    • Instruction ID: 1d388a7cb271ee3232adff5b039f4dfb3e3c0086e9fddf54d3cab57ed3325524
                                                                    • Opcode Fuzzy Hash: 7c5b40184d29e617f347c60636318af018b24df9773e7b89dc890cbae927a4c9
                                                                    • Instruction Fuzzy Hash: 19513EB494050ACBCF28DF68EA485EEBBB6FF89304F144185E681A62D4DF718D25CB15
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 004FFA41
                                                                    • GetParent.USER32(?), ref: 004FFA5C
                                                                    • GetWindow.USER32(?,00000004), ref: 004FFA67
                                                                    • MonitorFromWindow.USER32(00000000,00000002), ref: 004FFA8C
                                                                    • GetMonitorInfoW.USER32(00000000), ref: 004FFA93
                                                                    • GetWindowRect.USER32(00000000,00000000), ref: 004FFAB8
                                                                    • SetWindowPos.USER32(?,00000000,?,?,000000FF,000000FF,00000015), ref: 004FFB34
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MonitorRect$FromInfoParent
                                                                    • String ID: (
                                                                    • API String ID: 568100639-3887548279
                                                                    • Opcode ID: f2889155812e1980bab027956419e53c00d0827f985b1a8f88a28050e491ec98
                                                                    • Instruction ID: ebb595a2176fc15886aeac771ff074b25f8aeed756a2803f0cf4079dc6b60e8a
                                                                    • Opcode Fuzzy Hash: f2889155812e1980bab027956419e53c00d0827f985b1a8f88a28050e491ec98
                                                                    • Instruction Fuzzy Hash: 34417E32A0051DAFDB01CFE8CD899EEBBB6EF48314F154129EA05FB294D670BD098B51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dc2bf1d07565cdc951f70b7111e21402946f785581395e5aac81403f498d0a7f
                                                                    • Instruction ID: 526c12ecd169828b5b92c05bd7b4343f933496c5492461dc67524d029254ad4e
                                                                    • Opcode Fuzzy Hash: dc2bf1d07565cdc951f70b7111e21402946f785581395e5aac81403f498d0a7f
                                                                    • Instruction Fuzzy Hash: DFC1E371A0424EAFDF11DFA9C845BBDBFB2BF49310F184089E684A7292C7789941CB74
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0047D550: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047D561
                                                                      • Part of subcall function 0047D550: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047D56E
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047DE84
                                                                      • Part of subcall function 0047DFE0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E099
                                                                      • Part of subcall function 0047DFE0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047E0A8
                                                                      • Part of subcall function 0047DFE0: char_traits.LIBCPMTD ref: 0047E0B4
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047DF0A
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047DF1F
                                                                    • char_traits.LIBCPMTD ref: 0047DF31
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047DF7C
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047DF91
                                                                    • char_traits.LIBCPMTD ref: 0047DFA3
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047DFB6
                                                                    • char_traits.LIBCPMTD ref: 0047DFC2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$char_traits
                                                                    • String ID:
                                                                    • API String ID: 1941806930-0
                                                                    • Opcode ID: 76e34bd26d014b3f8890466920e92c86aa5559c4d754f9fc7d3041270c73c425
                                                                    • Instruction ID: 08961eb3f9116a8aef480e14eed21e0ab75881cb2698bd386b2c4ac5555a5a7f
                                                                    • Opcode Fuzzy Hash: 76e34bd26d014b3f8890466920e92c86aa5559c4d754f9fc7d3041270c73c425
                                                                    • Instruction Fuzzy Hash: 5651E471A10009EFCB04EFA9D991DEE73B6AF88304F10C15DF91AAB255DB34AE14CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00494460: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00494471
                                                                      • Part of subcall function 00494460: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049447E
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049D204
                                                                      • Part of subcall function 00490CB0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490D6C
                                                                      • Part of subcall function 00490CB0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00490D78
                                                                      • Part of subcall function 00490CB0: char_traits.LIBCPMTD ref: 00490D81
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049D288
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049D297
                                                                    • char_traits.LIBCPMTD ref: 0049D2A3
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049D2EE
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049D2FD
                                                                    • char_traits.LIBCPMTD ref: 0049D309
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049D31C
                                                                    • char_traits.LIBCPMTD ref: 0049D325
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$char_traits
                                                                    • String ID:
                                                                    • API String ID: 1941806930-0
                                                                    • Opcode ID: ebb750e3335c9eed69a95a7a8117a06579095a18e146414cbd9fed16aae71f04
                                                                    • Instruction ID: 47c2456df66339e74c34430795c40efbdc4a283698df7331b12a373e7dd1fb47
                                                                    • Opcode Fuzzy Hash: ebb750e3335c9eed69a95a7a8117a06579095a18e146414cbd9fed16aae71f04
                                                                    • Instruction Fuzzy Hash: C6410075A00008EFCF04EFA9D992DDE77B5AF88304F108569F919AB251DB34EE40DB98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004CB042
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004CB051
                                                                    • char_traits.LIBCPMTD ref: 004CB063
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004CB093
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004CB0A2
                                                                    • char_traits.LIBCPMTD ref: 004CB0AE
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004CB0BF
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004CB0CE
                                                                    • char_traits.LIBCPMTD ref: 004CB0DA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$char_traits
                                                                    • String ID:
                                                                    • API String ID: 1941806930-0
                                                                    • Opcode ID: 1e3deb1750fb71fb3b94b6d3fe07782f2a1ad79ec82cb5bac427ad2b4251e66d
                                                                    • Instruction ID: 88d9029bd5f0a8d4f5eef4a076a437dfa5552ebc6ab741cadee5d4d171942d4f
                                                                    • Opcode Fuzzy Hash: 1e3deb1750fb71fb3b94b6d3fe07782f2a1ad79ec82cb5bac427ad2b4251e66d
                                                                    • Instruction Fuzzy Hash: B541D374A0010DEFCB14EF99D992DAE7376EF84308F10815DF8196B265DB34AE24DB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::ios_base::getloc.LIBCPMTD ref: 00493ED7
                                                                    • ctype.LIBCPMTD ref: 00493F43
                                                                    • std::ios_base::getloc.LIBCPMTD ref: 00493F52
                                                                    • _Mpunct.LIBCPMTD ref: 00493F95
                                                                    • std::ios_base::width.LIBCPMTD ref: 00494231
                                                                      • Part of subcall function 0048B820: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048B82A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: std::ios_base::getloc$Base::Concurrency::details::ContextIdentityMpunctQueueWorkctypestd::ios_base::width
                                                                    • String ID: @$PUj
                                                                    • API String ID: 3033173276-3080100058
                                                                    • Opcode ID: 2f647ba199ae9b660c0b69901949b76fa188d4838545b1c14682369e4f2c9e1e
                                                                    • Instruction ID: 3839d1f21284e0884d9275d48e6eb6e56520cd953c4539d2be662b86e39f02de
                                                                    • Opcode Fuzzy Hash: 2f647ba199ae9b660c0b69901949b76fa188d4838545b1c14682369e4f2c9e1e
                                                                    • Instruction Fuzzy Hash: 11025AB19001489FCF14DF98C991BEEBBB5FF89304F14816EE519AB291D738AE41CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    • Operation timed out after %ld milliseconds with %I64d out of %I64d bytes received, xrefs: 0040B38F
                                                                    • Operation timed out after %ld milliseconds with %I64d bytes received, xrefs: 0040B3C2
                                                                    • Connection timed out after %ld milliseconds, xrefs: 0040B341
                                                                    • Resolving timed out after %ld milliseconds, xrefs: 0040B30B
                                                                    • In state %d with no easy_conn, bail out!, xrefs: 0040BF9E
                                                                    • Pipe broke: handle %p, url = %s, xrefs: 0040B24A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Connection timed out after %ld milliseconds$In state %d with no easy_conn, bail out!$Operation timed out after %ld milliseconds with %I64d bytes received$Operation timed out after %ld milliseconds with %I64d out of %I64d bytes received$Pipe broke: handle %p, url = %s$Resolving timed out after %ld milliseconds
                                                                    • API String ID: 0-3520306357
                                                                    • Opcode ID: aa08a9836d66306377a727d55b18a00f691b153fd579a0a182b4f6cea88988ef
                                                                    • Instruction ID: 98fd6dea56f141785c89279cb8ef8d78036364f7c6da4fea1b8591e8d03d5648
                                                                    • Opcode Fuzzy Hash: aa08a9836d66306377a727d55b18a00f691b153fd579a0a182b4f6cea88988ef
                                                                    • Instruction Fuzzy Hash: AD91C271600B009FD720DF29D885A6B73E5EB85318F50892EF85AD7382D739E845CB9E
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Cnd_initX.LIBCPMTD ref: 00483D2D
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00483ED9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: std::_$Cnd_initContainer_base12Container_base12::~_
                                                                    • String ID: ) [valid$ASSERTION FAILURE FROM EASYLOGGING++ (LINE: $Configuration value not a valid integer [$] WITH MESSAGE "$~:H
                                                                    • API String ID: 3354761557-1881868659
                                                                    • Opcode ID: 0bf337b1f740cd0255489d0cddf410b460a12a5b649d4ba70e5ef5a34190654e
                                                                    • Instruction ID: d4f1d28d05ea559420ae1d021239d583bd25196902dffa707871bdbb4b32b560
                                                                    • Opcode Fuzzy Hash: 0bf337b1f740cd0255489d0cddf410b460a12a5b649d4ba70e5ef5a34190654e
                                                                    • Instruction Fuzzy Hash: 8551B571D00248ABCF04FFA5D852BEE7BB5AF14304F00056EF405A7281EB785A48CBD9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 004D8DF0: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004D8E53
                                                                      • Part of subcall function 004D8DF0: GetFileAttributesW.KERNEL32(00000000,?,00000001,-00000002,A1986743), ref: 004D8E59
                                                                    • Sleep.KERNEL32(?), ref: 0047C61C
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047C651
                                                                    • MessageBoxW.USER32(00000000,00000000,0067D04C,00000000), ref: 0047C659
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_$AttributesFileMessageSleep
                                                                    • String ID: ClickShortcutToLaunchText$Close$CrashRate$message_page
                                                                    • API String ID: 1623736491-3559896638
                                                                    • Opcode ID: 62b84f3a85c7dda6f9cfa33dd8cf315a70422fce13b11d6d58b0d71c698e9f37
                                                                    • Instruction ID: b6dc0b3f796104a8cb91371fc3ed7d85cf4534b7827ce1a2f2d112b521bd0384
                                                                    • Opcode Fuzzy Hash: 62b84f3a85c7dda6f9cfa33dd8cf315a70422fce13b11d6d58b0d71c698e9f37
                                                                    • Instruction Fuzzy Hash: 3521FA70E40208AFDB04EFA4DD96FED77B6AF48704F10946EF5097B282DA786905CB58
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • new.LIBCMT ref: 0047F4F4
                                                                    • std::locale::c_str.LIBCPMTD ref: 0047F509
                                                                    • std::_Locinfo::_Locinfo.LIBCPMTD ref: 0047F512
                                                                      • Part of subcall function 0047EC30: std::_Lockit::_Lockit.LIBCPMT ref: 0047EC5D
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC6F
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC7E
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC8D
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC9C
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047ECAB
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047ECBA
                                                                      • Part of subcall function 0047EC30: std::bad_exception::bad_exception.LIBCMTD ref: 0047ECD1
                                                                      • Part of subcall function 0047EC30: __CxxThrowException@8.LIBVCRUNTIME ref: 0047ECDF
                                                                      • Part of subcall function 0047EC30: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0047ECEC
                                                                    • ctype.LIBCPMTD ref: 0047F536
                                                                      • Part of subcall function 0047F440: std::bad_exception::bad_exception.LIBCMTD ref: 0047F46D
                                                                      • Part of subcall function 0047F440: ctype.LIBCPMTD ref: 0047F489
                                                                    • std::_Locinfo::~_Locinfo.LIBCPMTD ref: 0047F572
                                                                      • Part of subcall function 0047ED10: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0047ED3A
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED48
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED53
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED5E
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED69
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED74
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED7F
                                                                      • Part of subcall function 0047ED10: std::_Lockit::~_Lockit.LIBCPMT ref: 0047ED87
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: std::_$Container_base12Container_base12::~_Yarn$Locinfo::_$LocinfoLockitctypestd::bad_exception::bad_exception$Exception@8Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_Throwstd::locale::c_str
                                                                    • String ID: `$`
                                                                    • API String ID: 3679679744-388881292
                                                                    • Opcode ID: e07290412553affff2854cf3ba035e47cc4c421d4cdb3bfe7cd49bdffcf39e7c
                                                                    • Instruction ID: ddbe8b9edb6302aa7d0982549d5804e4b2e475bfa8dc312ef2984450ed3594f0
                                                                    • Opcode Fuzzy Hash: e07290412553affff2854cf3ba035e47cc4c421d4cdb3bfe7cd49bdffcf39e7c
                                                                    • Instruction Fuzzy Hash: 1B2138B1D00209EFDB04DF98D845BEEBBB4FB48314F10866AE419AB381D7796A04CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetStockObject.GDI32(00000011), ref: 0047A86D
                                                                    • GetObjectW.GDI32(00000000), ref: 0047A874
                                                                    • CreateFontIndirectW.GDI32(00000000), ref: 0047A8CB
                                                                    • new.LIBCMT ref: 0047A8E6
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0047A9A6
                                                                    • GetTextMetricsW.GDI32(00000000,-00000090), ref: 0047A9C3
                                                                    • SelectObject.GDI32(00000000,A1986743), ref: 0047A9D7
                                                                    • DeleteObject.GDI32(00000000), ref: 0047A9FA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Object$Select$CreateDeleteFontIndirectMetricsStockText
                                                                    • String ID:
                                                                    • API String ID: 1721824061-0
                                                                    • Opcode ID: 95000391be8048ae0e1ddd52b4c73c5f0070da05551f008d588fe7cf6ff2b8db
                                                                    • Instruction ID: 9fb0c9524307b776696a80a44a84ed58f98b117e3e86207b1092eba6894cb08c
                                                                    • Opcode Fuzzy Hash: 95000391be8048ae0e1ddd52b4c73c5f0070da05551f008d588fe7cf6ff2b8db
                                                                    • Instruction Fuzzy Hash: A5714AB4E04258DFDB14CFA4C855BEEBBB5BB88304F24826DE549AB382CB349945CF51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    • SFTP READ error, xrefs: 00460C00
                                                                    • FXP_READ response too big, xrefs: 00460B9A
                                                                    • malloc fail for FXP_WRITE, xrefs: 00460AB6
                                                                    • SFTP Protocol badness: unrecognised read request response, xrefs: 00460B64
                                                                    • SFTP Protocol badness, xrefs: 00460B7F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: FXP_READ response too big$SFTP Protocol badness$SFTP Protocol badness: unrecognised read request response$SFTP READ error$malloc fail for FXP_WRITE
                                                                    • API String ID: 0-390131679
                                                                    • Opcode ID: aeb880dbd00da3275adff19fd47e24c4e15a9b437bc3132fce9d4b24eec95367
                                                                    • Instruction ID: 45fdbadbb4651c37942c542b3637c0b2ddf4153472c73c5f2c8c6f6279129642
                                                                    • Opcode Fuzzy Hash: aeb880dbd00da3275adff19fd47e24c4e15a9b437bc3132fce9d4b24eec95367
                                                                    • Instruction Fuzzy Hash: 0ED1B2B1A003055BC704EF68D881BABB3E8FF84314F44465EE95987242F779F9188BE6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::ios_base::getloc.LIBCPMTD ref: 0049390B
                                                                    • ctype.LIBCPMTD ref: 00493977
                                                                    • std::ios_base::getloc.LIBCPMTD ref: 00493986
                                                                    • _Mpunct.LIBCPMTD ref: 004939BD
                                                                    • std::ios_base::width.LIBCPMTD ref: 00493C23
                                                                      • Part of subcall function 0048B820: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048B82A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: std::ios_base::getloc$Base::Concurrency::details::ContextIdentityMpunctQueueWorkctypestd::ios_base::width
                                                                    • String ID: @
                                                                    • API String ID: 3033173276-2766056989
                                                                    • Opcode ID: 6051e2d99aeca0088fa58454392574ad9755f9313f799f31c26160973c10b75d
                                                                    • Instruction ID: 66aa201c43f35613644999c961e1a288990b2fe86d2517e8766c2f6cdf56cb9a
                                                                    • Opcode Fuzzy Hash: 6051e2d99aeca0088fa58454392574ad9755f9313f799f31c26160973c10b75d
                                                                    • Instruction Fuzzy Hash: 00E13AB19002489FCF04EF98C991AEEBBB5FF49305F14816EF519AB251D738AE41CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: char_traits
                                                                    • String ID:
                                                                    • API String ID: 1158913984-3916222277
                                                                    • Opcode ID: 7abb857a0262d76eb38d39dcd910b32c335a6e2e54fae93f916fd7f8e2de78e4
                                                                    • Instruction ID: d846084332df16539deb4998405c384860ff8c6eb41126d42a2b6fef94a9459e
                                                                    • Opcode Fuzzy Hash: 7abb857a0262d76eb38d39dcd910b32c335a6e2e54fae93f916fd7f8e2de78e4
                                                                    • Instruction Fuzzy Hash: 5AA10A75D01109EFCF04EB95C992DEEBBB5AF88304F2045AAE506A7391D734AF40DB58
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _free$AllocateHeap
                                                                    • String ID: lf
                                                                    • API String ID: 3033488037-793022858
                                                                    • Opcode ID: 6d5316aaf718f3fa8159d1b56531d98bbc404f72dce699a1925e28bb3ff291b6
                                                                    • Instruction ID: ee5291d8c4dce337f34dbb28a3f76f46e00e3e02be61973a5fe1273a753aae12
                                                                    • Opcode Fuzzy Hash: 6d5316aaf718f3fa8159d1b56531d98bbc404f72dce699a1925e28bb3ff291b6
                                                                    • Instruction Fuzzy Hash: A751D331A0060DAFDB20DF69CE41A7A7FF5FF98720B144569EA09DB291E739D911CB80
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CharNextW.USER32(?,A1986743), ref: 0047420F
                                                                    • CharNextW.USER32(?,A1986743), ref: 00474318
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CharNext
                                                                    • String ID: $"$"$=
                                                                    • API String ID: 3213498283-3371490038
                                                                    • Opcode ID: 071af7e76d6381bf77ccd328e8481a3636514bfe9359327c50640f49a718d6c6
                                                                    • Instruction ID: ede065ea491afedfc1cd3805e8fad18fa99c6f6be5d182ad6188e98bd00017de
                                                                    • Opcode Fuzzy Hash: 071af7e76d6381bf77ccd328e8481a3636514bfe9359327c50640f49a718d6c6
                                                                    • Instruction Fuzzy Hash: CF91057090012CDBCB28DF55C891BEDB7B1AF85304F1081DAE95DAB291DB345E81DF99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetConsoleCP.KERNEL32(00000010,004586FA,8B0000D5,?,?,?,?,?,?,005FE28C,?,004586FA,00000010,004586FA,004586FA,00000000), ref: 005FDB59
                                                                    • __fassign.LIBCMT ref: 005FDBD4
                                                                    • __fassign.LIBCMT ref: 005FDBEF
                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,004586FA,00000001,00000010,00000005,00000000,00000000), ref: 005FDC15
                                                                    • WriteFile.KERNEL32(?,00000010,00000000,005FE28C,00000000,?,?,?,?,?,?,?,?,?,005FE28C,?), ref: 005FDC34
                                                                    • WriteFile.KERNEL32(?,?,00000001,005FE28C,00000000,?,?,?,?,?,?,?,?,?,005FE28C,?), ref: 005FDC6D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                    • String ID:
                                                                    • API String ID: 1324828854-0
                                                                    • Opcode ID: 9df48ac919b4bb5111d5ca8603b419b910d0144e7f2c13a218f3249bea396b4b
                                                                    • Instruction ID: 289013faa646a8cde145e8f752b97cea0facde71be1e83a878c55360fd07628d
                                                                    • Opcode Fuzzy Hash: 9df48ac919b4bb5111d5ca8603b419b910d0144e7f2c13a218f3249bea396b4b
                                                                    • Instruction Fuzzy Hash: 6F51A171A002499FDB10CFA8D885AFEBBFAFF19300F14452AEA51E7291D774E940CB60
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _sprintf_s
                                                                    • String ID: %c%c%c%c$%c%c%c=$%c%c==
                                                                    • API String ID: 3771559115-3943651191
                                                                    • Opcode ID: e1e5344f1b600fca0e2ba35f700d21c43faec559920ff65624bd812c06a59e45
                                                                    • Instruction ID: 9fecbe006768f72baf71c9131a40238265ff663f865255309cf0ee47ffe9ba24
                                                                    • Opcode Fuzzy Hash: e1e5344f1b600fca0e2ba35f700d21c43faec559920ff65624bd812c06a59e45
                                                                    • Instruction Fuzzy Hash: FE41576110C7914FD306DA289CA4BFBBBE9CBD6315F18058EF8C58B343E16DC50A8B62
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CountFocusTick
                                                                    • String ID: killfocus$setfocus
                                                                    • API String ID: 3897604831-1991930995
                                                                    • Opcode ID: f8cd456ce094566b2a9e145f54b0f5715d6490485c8f341537f296ec59ee6ce8
                                                                    • Instruction ID: 421a6d2978ed21807ade9f31ad1fc4f2f9c624fe23317a2b79e3a6d60f86bae0
                                                                    • Opcode Fuzzy Hash: f8cd456ce094566b2a9e145f54b0f5715d6490485c8f341537f296ec59ee6ce8
                                                                    • Instruction Fuzzy Hash: 4E516474A00208EFDB54DF94C994BEDBBB1BF48710F2481AAE809AB351D774AE41DF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetStockObject.GDI32(00000011), ref: 0047A6E2
                                                                    • GetObjectW.GDI32(00000000), ref: 0047A6E9
                                                                    • CreateFontIndirectW.GDI32(00000000), ref: 0047A73C
                                                                    • DeleteObject.GDI32(?), ref: 0047A75A
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0047A7D8
                                                                    • GetTextMetricsW.GDI32(00000000,?), ref: 0047A7F2
                                                                    • SelectObject.GDI32(00000000,?), ref: 0047A803
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Object$Select$CreateDeleteFontIndirectMetricsStockText
                                                                    • String ID:
                                                                    • API String ID: 1721824061-0
                                                                    • Opcode ID: c5128e300de713a671127749e556d0cdcdd65ff71e0ea25e4b42dd623989df63
                                                                    • Instruction ID: 8ce19efea8ad20a708a8b163caec1e1b93bfdf52084db9c3e573d21cfc9076f1
                                                                    • Opcode Fuzzy Hash: c5128e300de713a671127749e556d0cdcdd65ff71e0ea25e4b42dd623989df63
                                                                    • Instruction Fuzzy Hash: 5F415F74A043489FDB04CFA4D898BEEBBF6BF49301F18815DE9499B381C7349944CB65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00000000,?,004FB88E,00000000,00000001,00000001,00000001), ref: 004FDD9B
                                                                    • GetCurrentProcess.KERNEL32(00000001,00000000,00000000,00000002,?,00000000,00000000,?,004FB88E,00000000,00000001,00000001,00000001,004FB8F3,00000000,00000001), ref: 004FDDBF
                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,?,00000000,00000000,?,004FB88E,00000000,00000001,00000001,00000001,004FB8F3,00000000,00000001,?,?), ref: 004FDDC5
                                                                    • DuplicateHandle.KERNEL32(00000000,?,00000000,00000000,?,004FB88E,00000000,00000001,00000001,00000001,004FB8F3,00000000,00000001,?,?,?), ref: 004FDDC8
                                                                    • GetFileType.KERNEL32(00000001,?,00000000,00000000,?,004FB88E,00000000,00000001,00000001,00000001,004FB8F3,00000000,00000001,?,?,?), ref: 004FDDE3
                                                                    • new.LIBCMT ref: 004FDDF4
                                                                    • SetFilePointer.KERNEL32(00000001,00000000,00000000,00000001,?,00000000,00000000,?,004FB88E,00000000,00000001,00000001,00000001,004FB8F3,00000000,00000001), ref: 004FDE40
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: File$CurrentProcess$CreateDuplicateHandlePointerType
                                                                    • String ID:
                                                                    • API String ID: 3364526186-0
                                                                    • Opcode ID: fa6b4f1f8096f17f6585efa940e752093c64ae146609bf5ccb0d5eb12ade9ae1
                                                                    • Instruction ID: 01e8fa8882ffc64d6b4e6a29d7a0c8424ee21eb056bc7d016030f2a9a8c43754
                                                                    • Opcode Fuzzy Hash: fa6b4f1f8096f17f6585efa940e752093c64ae146609bf5ccb0d5eb12ade9ae1
                                                                    • Instruction Fuzzy Hash: 07319071A007099FDB25CF28DC45BAB7BEAEB15710F04491AF95AD7390D3749840CB65
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::ios_base::good.LIBCPMTD ref: 0049AFEC
                                                                    • make_pair.LIBCPMTD ref: 0049B015
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 0049B058
                                                                    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 0049B067
                                                                    • make_pair.LIBCPMTD ref: 0049B0B9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: make_pair$Affinity::operator!=Concurrency::details::HardwareMutex_baseMutex_base::~_std::_std::ios_base::good
                                                                    • String ID: kGH
                                                                    • API String ID: 3397314618-2096950707
                                                                    • Opcode ID: 95ef45913c9482e496a99763ada6e83237b61bf2cd592661e2e320553dddd464
                                                                    • Instruction ID: e4b0c63b3eb543ef9fdf27ea29f24d612d8516c26386ff134ed78a667fe0e388
                                                                    • Opcode Fuzzy Hash: 95ef45913c9482e496a99763ada6e83237b61bf2cd592661e2e320553dddd464
                                                                    • Instruction Fuzzy Hash: D5317E75900109ABCF09EF91D891DFF7B79AF48300F04846FF81697292DB38AA14CBA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00499094
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004990CD
                                                                    • construct.LIBCPMTD ref: 004990D4
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004990FC
                                                                    • construct.LIBCPMTD ref: 00499103
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049912B
                                                                    • construct.LIBCPMTD ref: 00499132
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWorkconstruct
                                                                    • String ID:
                                                                    • API String ID: 3904939386-0
                                                                    • Opcode ID: 37251c7ef1f3b13c579ee37af745b82ea495886312a47f23cfbb3a42028c6958
                                                                    • Instruction ID: 019d126a2c5826fc6be332ef9025e21d4c4b55fec980c9439fd43de2da341707
                                                                    • Opcode Fuzzy Hash: 37251c7ef1f3b13c579ee37af745b82ea495886312a47f23cfbb3a42028c6958
                                                                    • Instruction Fuzzy Hash: 073167F1D001059BDF04EFA5D9529EFB7B8AF44318F10492EF505B7281DA39AE00C7A6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004994B4
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004994ED
                                                                    • construct.LIBCPMTD ref: 004994F4
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049951C
                                                                    • construct.LIBCPMTD ref: 00499523
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049954B
                                                                    • construct.LIBCPMTD ref: 00499552
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWorkconstruct
                                                                    • String ID:
                                                                    • API String ID: 3904939386-0
                                                                    • Opcode ID: 14fe26a4ec2e101bf65b08eea14b7bddb8a0723c79d9c758b6a58929ee59b90e
                                                                    • Instruction ID: 12cd92341bd178c3a1f16fe92039937f44450ff09c5c34e03e2946a4f19553da
                                                                    • Opcode Fuzzy Hash: 14fe26a4ec2e101bf65b08eea14b7bddb8a0723c79d9c758b6a58929ee59b90e
                                                                    • Instruction Fuzzy Hash: 0D3147F1D001099BDF05EFA5D9529EFB7B8AF44318F10492EF505B7281DA39AE00C7A6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00499614
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049964D
                                                                    • construct.LIBCPMTD ref: 00499654
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049967C
                                                                    • construct.LIBCPMTD ref: 00499683
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004996AB
                                                                    • construct.LIBCPMTD ref: 004996B2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWorkconstruct
                                                                    • String ID:
                                                                    • API String ID: 3904939386-0
                                                                    • Opcode ID: d93e8ccbcc47389b392bd112dade75e57a659464492201be39547ffc862e82dd
                                                                    • Instruction ID: 2f2035ff7e100b2a238059b7d1eaa376c2e52437ffdab20ccb7c18f8bdde122e
                                                                    • Opcode Fuzzy Hash: d93e8ccbcc47389b392bd112dade75e57a659464492201be39547ffc862e82dd
                                                                    • Instruction Fuzzy Hash: 823166F1D001099BDF04EFA5D952AEFB7B8AF44318F10492EF505B7281DA39AE00C7A6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004998B4
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004998ED
                                                                    • construct.LIBCPMTD ref: 004998F4
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049991C
                                                                    • construct.LIBCPMTD ref: 00499923
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049994B
                                                                    • construct.LIBCPMTD ref: 00499952
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWorkconstruct
                                                                    • String ID:
                                                                    • API String ID: 3904939386-0
                                                                    • Opcode ID: f06f04747a17c3e8f36b50c26e3668b102579c1bd926dacab889fef09aa8b728
                                                                    • Instruction ID: 4ffdfbfb72d90045c48eff3852e313b9c758813f16dcdb2dcbc5249952001064
                                                                    • Opcode Fuzzy Hash: f06f04747a17c3e8f36b50c26e3668b102579c1bd926dacab889fef09aa8b728
                                                                    • Instruction Fuzzy Hash: 423146F1D001059BDF05EFA5D9529EFB7B8AF44318F10492EF505B7281EA39AE00C7A6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D1994
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D19CD
                                                                    • construct.LIBCPMTD ref: 004D19D4
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D19FC
                                                                    • construct.LIBCPMTD ref: 004D1A03
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D1A2B
                                                                    • construct.LIBCPMTD ref: 004D1A32
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWorkconstruct
                                                                    • String ID:
                                                                    • API String ID: 3904939386-0
                                                                    • Opcode ID: 6c1f8f74d575b9a904dbc66e177eb604cac2c832aa25c56711de5f715ab8905b
                                                                    • Instruction ID: 2a3d326d4fbab2cb20d0eec65441fa1003698f80b524df0d81634d74fb055e5c
                                                                    • Opcode Fuzzy Hash: 6c1f8f74d575b9a904dbc66e177eb604cac2c832aa25c56711de5f715ab8905b
                                                                    • Instruction Fuzzy Hash: 283144F1D001099BDF05EFA5D952AEFB7B8AF44318F10452EF505B7381EA39AA00C7A6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D1B74
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D1BAD
                                                                    • construct.LIBCPMTD ref: 004D1BB4
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D1BDC
                                                                    • construct.LIBCPMTD ref: 004D1BE3
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D1C0B
                                                                    • construct.LIBCPMTD ref: 004D1C12
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWorkconstruct
                                                                    • String ID:
                                                                    • API String ID: 3904939386-0
                                                                    • Opcode ID: 1e1b609651dfcbd2fa47fc762ad38d842d9f0087254e774e9240dd006f73647c
                                                                    • Instruction ID: b7eb218b55335a1357ca783c5a4ea1f2aa7c7ad4dd6d1e202c798328aecc11ef
                                                                    • Opcode Fuzzy Hash: 1e1b609651dfcbd2fa47fc762ad38d842d9f0087254e774e9240dd006f73647c
                                                                    • Instruction Fuzzy Hash: F83146F1D001099BDF05EFA5D952AEFB7B8AF44718F10452EF505B7341EA39AA00C7A6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00499B54
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00499B8D
                                                                    • construct.LIBCPMTD ref: 00499B94
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00499BBC
                                                                    • construct.LIBCPMTD ref: 00499BC3
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00499BEB
                                                                    • construct.LIBCPMTD ref: 00499BF2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWorkconstruct
                                                                    • String ID:
                                                                    • API String ID: 3904939386-0
                                                                    • Opcode ID: c7a6048cbb7768564faf6bd29dad847d7936837e859415caa0f46adddf354510
                                                                    • Instruction ID: 0268b6432b2e95dca39e87c46919a99582566b4f255d582afaa344407b5270d2
                                                                    • Opcode Fuzzy Hash: c7a6048cbb7768564faf6bd29dad847d7936837e859415caa0f46adddf354510
                                                                    • Instruction Fuzzy Hash: 503147F1D001099BDF05EFA5D9529EFB7B8AF44318F10492EF505B7281DA79AE00C7A6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047C928
                                                                      • Part of subcall function 0047CA20: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0047CA49
                                                                      • Part of subcall function 004F054A: _wcslen.LIBCMT ref: 004F0556
                                                                    • SetTimer.USER32(00000000,000003E8,00000032,00000000), ref: 0047C94C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::Container_base12Container_base12::~_ContextIdentityQueueTimerWork_wcslenstd::_
                                                                    • String ID: closebtn$foreImage$minbtn$version
                                                                    • API String ID: 325313034-2933508849
                                                                    • Opcode ID: 1e528a3156a3eb38cc51b705f71b5cc919a96dcc4e483a7b357232070818cebc
                                                                    • Instruction ID: 303075f1fdb1c01507cac73f9a07adac8a3349ecf6c294dcf4f3f0e884bf7fe8
                                                                    • Opcode Fuzzy Hash: 1e528a3156a3eb38cc51b705f71b5cc919a96dcc4e483a7b357232070818cebc
                                                                    • Instruction Fuzzy Hash: 09411C70A4021C9BDB18DB54CC96BE9B375EF49704F5482EEE6096B382DB346E42CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0048A1E0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048A209
                                                                      • Part of subcall function 0048A5C0: allocator.LIBCONCRTD ref: 0048A615
                                                                    • new.LIBCMT ref: 004D258C
                                                                    • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 004D25B1
                                                                      • Part of subcall function 004D2C50: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 004D2C5A
                                                                    • shared_ptr.LIBCMTD ref: 004D25D6
                                                                      • Part of subcall function 004D3350: std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 004D335A
                                                                    • ~.LIBCPMTD ref: 004D2623
                                                                      • Part of subcall function 00484A70: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484A7D
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004D2632
                                                                      • Part of subcall function 0048A4C0: _Ptr_base.LIBCMTD ref: 0048A4E9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ProcessorVirtual$std::_$Concurrency::Container_base12Container_base12::~_RootRoot::$Base::Concurrency::details::ContextIdentityIterator_baseIterator_base::_Ptr_baseQueueWorkallocatorshared_ptr
                                                                    • String ID: `Wi
                                                                    • API String ID: 1988064043-1979842653
                                                                    • Opcode ID: 992ef3e38a055217a12e2527451a1df37117f6f1a8496ca03ba785ef1a35441a
                                                                    • Instruction ID: 24dbe42062e2407f9030b75ea384f2ab05149780813d785dab75d45da569a3fa
                                                                    • Opcode Fuzzy Hash: 992ef3e38a055217a12e2527451a1df37117f6f1a8496ca03ba785ef1a35441a
                                                                    • Instruction Fuzzy Hash: EF315AB1D00208EFCB04EFD4D955ADEBBB5BF48310F10862EF416AB281EB74AA05CB54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0048A1E0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048A209
                                                                      • Part of subcall function 0048A5C0: allocator.LIBCONCRTD ref: 0048A615
                                                                    • new.LIBCMT ref: 004D26BC
                                                                    • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 004D26E1
                                                                      • Part of subcall function 004D2C70: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 004D2C7A
                                                                    • shared_ptr.LIBCMTD ref: 004D2706
                                                                      • Part of subcall function 004D3380: std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 004D338A
                                                                    • ~.LIBCPMTD ref: 004D2753
                                                                      • Part of subcall function 00484A70: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484A7D
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004D2762
                                                                      • Part of subcall function 0048A4C0: _Ptr_base.LIBCMTD ref: 0048A4E9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ProcessorVirtual$std::_$Concurrency::Container_base12Container_base12::~_RootRoot::$Base::Concurrency::details::ContextIdentityIterator_baseIterator_base::_Ptr_baseQueueWorkallocatorshared_ptr
                                                                    • String ID: `Wi
                                                                    • API String ID: 1988064043-1979842653
                                                                    • Opcode ID: 8a6ec80960b0788feb7820aa3e689780c4d6955f710c12b3923df8e80a3dfe93
                                                                    • Instruction ID: fe390d785f0d054efbe9a3f9e5308502f725722adbb11ee10589a3e68021064a
                                                                    • Opcode Fuzzy Hash: 8a6ec80960b0788feb7820aa3e689780c4d6955f710c12b3923df8e80a3dfe93
                                                                    • Instruction Fuzzy Hash: 79313AB1D00208EFCB14EFD5D951ADEBBB5BF48714F10862EF416AB281EB74AA04CB55
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4D74
                                                                      • Part of subcall function 0048EC70: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048EC7A
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4DB2
                                                                    • construct.LIBCPMTD ref: 004A4DB9
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4DE6
                                                                    • construct.LIBCPMTD ref: 004A4DED
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4E1A
                                                                    • construct.LIBCPMTD ref: 004A4E21
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$construct
                                                                    • String ID:
                                                                    • API String ID: 1998173831-0
                                                                    • Opcode ID: d0dcf23a0ab7e5002774bd26e95992974f1b105c255c98a0db0efbbd414732ba
                                                                    • Instruction ID: e9be6469f4bc51c1e3cd084db7316258f417fa8feaefc6e235f86e28c7e10427
                                                                    • Opcode Fuzzy Hash: d0dcf23a0ab7e5002774bd26e95992974f1b105c255c98a0db0efbbd414732ba
                                                                    • Instruction Fuzzy Hash: 763175B1D001099FDB04FFA6D953AAFB7B9AF45318F10492EF509B3281DA396D0087A5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A0D64
                                                                      • Part of subcall function 0048EC70: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048EC7A
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A0DA2
                                                                    • construct.LIBCPMTD ref: 004A0DA9
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A0DD6
                                                                    • construct.LIBCPMTD ref: 004A0DDD
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A0E0A
                                                                    • construct.LIBCPMTD ref: 004A0E11
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$construct
                                                                    • String ID:
                                                                    • API String ID: 1998173831-0
                                                                    • Opcode ID: 8090542b036d7b7a3cb0fa2afa2cf1d534721e03fcb72b5d525cfcae6988a81f
                                                                    • Instruction ID: fe5071c5f2d81c80a0d2dabf334b8621bc84467f5442f495334fb202374d9c3d
                                                                    • Opcode Fuzzy Hash: 8090542b036d7b7a3cb0fa2afa2cf1d534721e03fcb72b5d525cfcae6988a81f
                                                                    • Instruction Fuzzy Hash: 143144B1D001099FDB04FFA6D953AAFB7B9AF45318F10492EE509B7281DA39AD0087A5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4F04
                                                                      • Part of subcall function 0048EC70: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048EC7A
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4F42
                                                                    • construct.LIBCPMTD ref: 004A4F49
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4F76
                                                                    • construct.LIBCPMTD ref: 004A4F7D
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4FAA
                                                                    • construct.LIBCPMTD ref: 004A4FB1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$construct
                                                                    • String ID:
                                                                    • API String ID: 1998173831-0
                                                                    • Opcode ID: eee379667b90648c772396c0152ec3b83dfcb262fbd703efe8620d7f3ece3a8b
                                                                    • Instruction ID: ccba8a23f895d462e8c25f0ddafbde96184f21bdc5f19cb5aaecc9fc86dccd37
                                                                    • Opcode Fuzzy Hash: eee379667b90648c772396c0152ec3b83dfcb262fbd703efe8620d7f3ece3a8b
                                                                    • Instruction Fuzzy Hash: 433175B1D001099FDB04FFA6D953AAFB7B9AF45318F10492EF505B3281DA396D00C7A5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A0F94
                                                                      • Part of subcall function 0048EC70: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048EC7A
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A0FD2
                                                                    • construct.LIBCPMTD ref: 004A0FD9
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A1006
                                                                    • construct.LIBCPMTD ref: 004A100D
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A103A
                                                                    • construct.LIBCPMTD ref: 004A1041
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$construct
                                                                    • String ID:
                                                                    • API String ID: 1998173831-0
                                                                    • Opcode ID: 0d514c9bcb91f7de79b519fff6629f1cadb278c5fd740ea424f9a0e80e2e9d54
                                                                    • Instruction ID: 4695428b70dc232b33bd5ec3f485de8243bdb3105b54ebdad9b7989f2a568c7c
                                                                    • Opcode Fuzzy Hash: 0d514c9bcb91f7de79b519fff6629f1cadb278c5fd740ea424f9a0e80e2e9d54
                                                                    • Instruction Fuzzy Hash: 393144B1D001099FDB04FFA6D953AAFB7B9AF45318F10492EE505B7281DA396D0087A5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A1124
                                                                      • Part of subcall function 0048EC70: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048EC7A
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A1162
                                                                    • construct.LIBCPMTD ref: 004A1169
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A1196
                                                                    • construct.LIBCPMTD ref: 004A119D
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A11CA
                                                                    • construct.LIBCPMTD ref: 004A11D1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$construct
                                                                    • String ID:
                                                                    • API String ID: 1998173831-0
                                                                    • Opcode ID: dce541010264ff46fe3740efa55872502262641272a66f709c5946acddcd962d
                                                                    • Instruction ID: d2915c5d5b2aad5b18b3a74b1a791a2c7d018688e75c4d31c49d904d52fc8296
                                                                    • Opcode Fuzzy Hash: dce541010264ff46fe3740efa55872502262641272a66f709c5946acddcd962d
                                                                    • Instruction Fuzzy Hash: 723173B1E001099FDF04FFA6DD53AAFB7B9AF45318F10492EE505B3281DA39AD0087A5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A12B4
                                                                      • Part of subcall function 0048EC70: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048EC7A
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A12F2
                                                                    • construct.LIBCPMTD ref: 004A12F9
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A1326
                                                                    • construct.LIBCPMTD ref: 004A132D
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A135A
                                                                    • construct.LIBCPMTD ref: 004A1361
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$construct
                                                                    • String ID:
                                                                    • API String ID: 1998173831-0
                                                                    • Opcode ID: 00f627539973ec9452cd249dff44b97e51287d6e2595cb8d1a09c0a9b198eed8
                                                                    • Instruction ID: d65186b125475db22a8f53518c6a6b4e5b536815e1a955a8ed179579aca72d2f
                                                                    • Opcode Fuzzy Hash: 00f627539973ec9452cd249dff44b97e51287d6e2595cb8d1a09c0a9b198eed8
                                                                    • Instruction Fuzzy Hash: 523141B1E001099FDB04FFA6D953AEFB7B9AF45318F10492EE505B7281DA39AD0087A5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D3554
                                                                      • Part of subcall function 0048EC70: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048EC7A
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D3592
                                                                    • construct.LIBCPMTD ref: 004D3599
                                                                      • Part of subcall function 0047DC90: construct.LIBCPMTD ref: 0047DCAC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D35C6
                                                                    • construct.LIBCPMTD ref: 004D35CD
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004D35FA
                                                                    • construct.LIBCPMTD ref: 004D3601
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$construct
                                                                    • String ID:
                                                                    • API String ID: 1998173831-0
                                                                    • Opcode ID: 993a7f074c61b8f19e0666a5bc10b12133057aa8041ce9829eb997fecb07e111
                                                                    • Instruction ID: 9efde2c24e05b631f93ee9c2e113059f1a2b11ca55f8392084a50c9b4612f541
                                                                    • Opcode Fuzzy Hash: 993a7f074c61b8f19e0666a5bc10b12133057aa8041ce9829eb997fecb07e111
                                                                    • Instruction Fuzzy Hash: 143144B1E001099FDB04FFB6D953AAFB7B9AF44319F10492EE505B7381DA39AD0087A5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetClipBox.GDI32(0047459D,?), ref: 004F5CB5
                                                                    • CreateRectRgnIndirect.GDI32(?), ref: 004F5CC5
                                                                    • CreateRectRgnIndirect.GDI32(?), ref: 004F5CD1
                                                                    • CreateRoundRectRgn.GDI32(?,?,?,?,?,?), ref: 004F5CEA
                                                                    • CombineRgn.GDI32(?,?,00000000,00000001), ref: 004F5CFB
                                                                    • ExtSelectClipRgn.GDI32(?,?,00000001), ref: 004F5D0A
                                                                    • DeleteObject.GDI32(00000000), ref: 004F5D1B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CreateRect$ClipIndirect$CombineDeleteObjectRoundSelect
                                                                    • String ID:
                                                                    • API String ID: 2381484079-0
                                                                    • Opcode ID: 28435d9006258f83c1a937f868543689cdbc3721f7d202ab7cdc4282da5e0b22
                                                                    • Instruction ID: 8cbec3e932e2fd862db8323d81b726f1013f5dc6e327d9dab46d28b116458f3c
                                                                    • Opcode Fuzzy Hash: 28435d9006258f83c1a937f868543689cdbc3721f7d202ab7cdc4282da5e0b22
                                                                    • Instruction Fuzzy Hash: 1121F772900619AFDB01CFA4ED848EEBBBAFF49311B00411AFD05B7210C772AE55CBA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c18dc6b8dc98fa29349277db9c99661f8311944f36ccae21a1854af25603f861
                                                                    • Instruction ID: c2202a608b570376a7ac5797b0e1fbcd799a5c8e081bfb7e35223cfbb1c0234f
                                                                    • Opcode Fuzzy Hash: c18dc6b8dc98fa29349277db9c99661f8311944f36ccae21a1854af25603f861
                                                                    • Instruction Fuzzy Hash: F311E47254811BBBDF292FB69C5D9AB3E5EFFC6B74B104215F851D62D1EA308A00D2B0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00606916: _free.LIBCMT ref: 0060693F
                                                                    • _free.LIBCMT ref: 00606C1D
                                                                      • Part of subcall function 005F64BE: RtlFreeHeap.NTDLL(00000000,00000000,?,00606944,005EB47E,00000000,005EB47E,00000000,?,00606BE8,005EB47E,00000007,005EB47E,?,00606F97,005EB47E), ref: 005F64D4
                                                                      • Part of subcall function 005F64BE: GetLastError.KERNEL32(005EB47E,?,00606944,005EB47E,00000000,005EB47E,00000000,?,00606BE8,005EB47E,00000007,005EB47E,?,00606F97,005EB47E,005EB47E), ref: 005F64E6
                                                                    • _free.LIBCMT ref: 00606C28
                                                                    • _free.LIBCMT ref: 00606C33
                                                                    • _free.LIBCMT ref: 00606C87
                                                                    • _free.LIBCMT ref: 00606C92
                                                                    • _free.LIBCMT ref: 00606C9D
                                                                    • _free.LIBCMT ref: 00606CA8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 6388663d78110585d66b1fe72a5de62daf3be6399b8835bd990cedbfdc7f55e4
                                                                    • Instruction ID: 81fcc46f994b28da6a408a0bf564f89513f7d63cf57fe93b880d9eeee2a3cf1f
                                                                    • Opcode Fuzzy Hash: 6388663d78110585d66b1fe72a5de62daf3be6399b8835bd990cedbfdc7f55e4
                                                                    • Instruction Fuzzy Hash: EA119631D80B0ABAD970BBB0CD4BFDB7B9F7F40740F404818B6996A492DA39B6244751
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492A90
                                                                    • type_info::name.LIBCMTD ref: 00492A97
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492AB5
                                                                    • type_info::name.LIBCMTD ref: 00492ABC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492ADA
                                                                    • type_info::name.LIBCMTD ref: 00492AE1
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492AEF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$type_info::name
                                                                    • String ID:
                                                                    • API String ID: 4123023048-0
                                                                    • Opcode ID: 9297d25fee21f69c87bcee79cf592040d30d049b90cdb1988b1fa3a082f02e0c
                                                                    • Instruction ID: 9d328a10aab0fab2ac0c6db69df419868221ef5d3acbe440e565f9946f866a61
                                                                    • Opcode Fuzzy Hash: 9297d25fee21f69c87bcee79cf592040d30d049b90cdb1988b1fa3a082f02e0c
                                                                    • Instruction Fuzzy Hash: 46014CE5E00104ABDB04FFB2EC1389F37AD5F4532CB00483EB50EA7242E939AA009399
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492DA0
                                                                    • type_info::name.LIBCMTD ref: 00492DA7
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492DC5
                                                                    • type_info::name.LIBCMTD ref: 00492DCC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492DEA
                                                                    • type_info::name.LIBCMTD ref: 00492DF1
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492DFF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$type_info::name
                                                                    • String ID:
                                                                    • API String ID: 4123023048-0
                                                                    • Opcode ID: e9db36e21c37acb6a01793b9e07193561a9b19051e8c71a29362e5a574d5622f
                                                                    • Instruction ID: 476ee3b9b38c64b9e4f6ddae59162d903986aa3da6dd18234950886e5725e70d
                                                                    • Opcode Fuzzy Hash: e9db36e21c37acb6a01793b9e07193561a9b19051e8c71a29362e5a574d5622f
                                                                    • Instruction Fuzzy Hash: 13014CE5E001046BDB04FFB2EC1389F37AD5F4432CB00483EB50EA7242E939AA009399
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A0EE0
                                                                    • type_info::name.LIBCMTD ref: 004A0EE7
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A0F05
                                                                    • type_info::name.LIBCMTD ref: 004A0F0C
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A0F2A
                                                                    • type_info::name.LIBCMTD ref: 004A0F31
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A0F3F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$type_info::name
                                                                    • String ID:
                                                                    • API String ID: 4123023048-0
                                                                    • Opcode ID: 7891067ecab0e6c755b3bc6a6d9c763a4119d5da14654336fcc8bb8d763ee630
                                                                    • Instruction ID: 159ab03c7311db5328eddd017b062b710b3fccc03895f687e056aaecfe8652ec
                                                                    • Opcode Fuzzy Hash: 7891067ecab0e6c755b3bc6a6d9c763a4119d5da14654336fcc8bb8d763ee630
                                                                    • Instruction Fuzzy Hash: 65010CE5E10104ABDB04FFB6ED5789F37AD5F4532CF00483EB50EA7242E939AA109799
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492F20
                                                                    • type_info::name.LIBCMTD ref: 00492F27
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492F45
                                                                    • type_info::name.LIBCMTD ref: 00492F4C
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492F6A
                                                                    • type_info::name.LIBCMTD ref: 00492F71
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00492F7F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$type_info::name
                                                                    • String ID:
                                                                    • API String ID: 4123023048-0
                                                                    • Opcode ID: 55f80fdeb088f7b97a929a2cfdf869a22106e3d47b0fd442ae311e59986d8447
                                                                    • Instruction ID: 93a4b8612ff56938d9f12654c9880b9ac95ca21d18b54287b5badec0065a50d1
                                                                    • Opcode Fuzzy Hash: 55f80fdeb088f7b97a929a2cfdf869a22106e3d47b0fd442ae311e59986d8447
                                                                    • Instruction Fuzzy Hash: 37010CE5E101046BDB04FFB6EC5789F37AD5F4532CB00483EB50EA7242E939AA109799
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00493150
                                                                    • type_info::name.LIBCMTD ref: 00493157
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00493175
                                                                    • type_info::name.LIBCMTD ref: 0049317C
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0049319A
                                                                    • type_info::name.LIBCMTD ref: 004931A1
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004931AF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$type_info::name
                                                                    • String ID:
                                                                    • API String ID: 4123023048-0
                                                                    • Opcode ID: 4ff9403fad525f140c08499b2824c470c9253e8e7cf38d972b8556e0fa1a53f0
                                                                    • Instruction ID: f444aef8ea4d1254199898d115f247b9f0388b255d626a29310b786c3ed5a60f
                                                                    • Opcode Fuzzy Hash: 4ff9403fad525f140c08499b2824c470c9253e8e7cf38d972b8556e0fa1a53f0
                                                                    • Instruction Fuzzy Hash: 97010CE5E101046BDB04FFB6EC5799F37AD5F4532CB00483EB50EA7242E939AA109799
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 00493380
                                                                    • type_info::name.LIBCMTD ref: 00493387
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004933A5
                                                                    • type_info::name.LIBCMTD ref: 004933AC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004933CA
                                                                    • type_info::name.LIBCMTD ref: 004933D1
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004933DF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$type_info::name
                                                                    • String ID:
                                                                    • API String ID: 4123023048-0
                                                                    • Opcode ID: e9206eb3482b22dd7eaa0fc8cb1b79239aedb520b91aac7b2aaad8818aefad17
                                                                    • Instruction ID: 9465f2efa991864269a806eead8057f69e1447273ab59bdcd0587cd4e014b39d
                                                                    • Opcode Fuzzy Hash: e9206eb3482b22dd7eaa0fc8cb1b79239aedb520b91aac7b2aaad8818aefad17
                                                                    • Instruction Fuzzy Hash: 05010CE5E101046BDB04FFB6EC5799F37AD5F8532CB00483EB50EA7242ED39AA109799
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreatePen.GDI32(00000006,?,00000000), ref: 004F58C0
                                                                    • SelectObject.GDI32(?,00000000), ref: 004F58D3
                                                                    • GetStockObject.GDI32(00000005), ref: 004F58D9
                                                                    • SelectObject.GDI32(?,00000000), ref: 004F58E3
                                                                    • RoundRect.GDI32(?,?,?,?,?,?,?), ref: 004F58FC
                                                                    • SelectObject.GDI32(?,00000000), ref: 004F5906
                                                                    • DeleteObject.GDI32(?), ref: 004F590B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Object$Select$CreateDeleteRectRoundStock
                                                                    • String ID:
                                                                    • API String ID: 1454345155-0
                                                                    • Opcode ID: db3828bfc3e648f9463bbc123cc1d853fdf39c304fba8f472783721363438a6c
                                                                    • Instruction ID: 3a1cbf36d983250d2074e9888af55b507d74767d152dbaed4f8cc149aa009a94
                                                                    • Opcode Fuzzy Hash: db3828bfc3e648f9463bbc123cc1d853fdf39c304fba8f472783721363438a6c
                                                                    • Instruction Fuzzy Hash: FB01DA75500119BFDF055FA1DC18DEA3F66EF89352B04801AFE19891A0C737D962EFA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreatePen.GDI32(00000006,FF85E4FF,?), ref: 004F5848
                                                                    • SelectObject.GDI32(00000002,00000000), ref: 004F585B
                                                                    • GetStockObject.GDI32(00000005), ref: 004F5861
                                                                    • SelectObject.GDI32(00000002,00000000), ref: 004F586B
                                                                    • Rectangle.GDI32(00000002,?,?,FF85E4FF,00000002), ref: 004F587E
                                                                    • SelectObject.GDI32(00000002,00000000), ref: 004F5888
                                                                    • DeleteObject.GDI32(0046F783), ref: 004F588D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Object$Select$CreateDeleteRectangleStock
                                                                    • String ID:
                                                                    • API String ID: 2689421921-0
                                                                    • Opcode ID: 05af5b8158db1050fb7839023be5c564cc23fede2abe7fd01a76b7e7ee79da00
                                                                    • Instruction ID: 0f6e94dd1754450de0cf6f84e5196a90cfda399e89e3b374dfaa1f24352919a5
                                                                    • Opcode Fuzzy Hash: 05af5b8158db1050fb7839023be5c564cc23fede2abe7fd01a76b7e7ee79da00
                                                                    • Instruction Fuzzy Hash: F201FF35100119BFDF059FA5DC18DEA7F6AEF89352B05801AFA09991B0C737D962EBB0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,005EA105,005EA105,?,?,?,005FF140,00000001,00000001,8CE85006), ref: 005FEF49
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,005FF140,00000001,00000001,8CE85006,?,?,?), ref: 005FEFCF
                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8CE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 005FF0C9
                                                                    • __freea.LIBCMT ref: 005FF0D6
                                                                      • Part of subcall function 005F6A05: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 005F6A37
                                                                    • __freea.LIBCMT ref: 005FF0DF
                                                                    • __freea.LIBCMT ref: 005FF104
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1414292761-0
                                                                    • Opcode ID: 092f767403cfb031cc1b7dc2b7267a84ac15fee4a03b063c6c0a5bd021343e9f
                                                                    • Instruction ID: 7f304e2034d0cd74368e1ade1f14947b1a3573421e1bcd55e0e58c739b7c4d45
                                                                    • Opcode Fuzzy Hash: 092f767403cfb031cc1b7dc2b7267a84ac15fee4a03b063c6c0a5bd021343e9f
                                                                    • Instruction Fuzzy Hash: 7F51BD7261020BAFDB258E60DC49EBF7BAAFF44754B144629FE06D6185EF38DC408760
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: __cftoe
                                                                    • String ID:
                                                                    • API String ID: 4189289331-0
                                                                    • Opcode ID: fb8c553792888765021e237901f2b2103fa74f2698968fbb351de85aebf998ed
                                                                    • Instruction ID: 54a7927b0bec47daebc0d972670bec458fb57d97fc12af2a068b8234366e7ef6
                                                                    • Opcode Fuzzy Hash: fb8c553792888765021e237901f2b2103fa74f2698968fbb351de85aebf998ed
                                                                    • Instruction Fuzzy Hash: 8151EB3690420EABDF245B58CC49EBE7FA9BF89360F50461DFA15971C2DF39D9008764
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0049A11A
                                                                    • int.LIBCPMTD ref: 0049A133
                                                                      • Part of subcall function 0047EEF0: std::_Lockit::_Lockit.LIBCPMT ref: 0047EF06
                                                                      • Part of subcall function 0047EEF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0047EF30
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0049A1CB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                    • String ID:
                                                                    • API String ID: 593203224-0
                                                                    • Opcode ID: 064e31c7a38fa789bc3f9bc46c55188e396dcb64b76d6d1626e73786b115323d
                                                                    • Instruction ID: c0b5150abe24683868e968fa053cf82fef43de943e2f29a5e1bccb809cfd745c
                                                                    • Opcode Fuzzy Hash: 064e31c7a38fa789bc3f9bc46c55188e396dcb64b76d6d1626e73786b115323d
                                                                    • Instruction Fuzzy Hash: EE313EB5D04209DFCB04DF95D882AFFBBB5FB48314F10462AE415A7390D7386A44CBA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0049C33A
                                                                    • int.LIBCPMTD ref: 0049C353
                                                                      • Part of subcall function 0047EEF0: std::_Lockit::_Lockit.LIBCPMT ref: 0047EF06
                                                                      • Part of subcall function 0047EEF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0047EF30
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0049C3EB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                    • String ID:
                                                                    • API String ID: 593203224-0
                                                                    • Opcode ID: 5e8aed3e1af7f73a1cbaf91d9c11bbd0aa4578bebca0acd092bbce730a37114a
                                                                    • Instruction ID: 2c6a3164f6265a42efdd62bb65889e1a79850f1ab3c679328abfc22d52d76587
                                                                    • Opcode Fuzzy Hash: 5e8aed3e1af7f73a1cbaf91d9c11bbd0aa4578bebca0acd092bbce730a37114a
                                                                    • Instruction Fuzzy Hash: E7314DB5D00209DFCF14DF95C881AFEBBB5FB48314F10862AE816A7390D738AA00CB95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0049BF0A
                                                                    • int.LIBCPMTD ref: 0049BF23
                                                                      • Part of subcall function 0047EEF0: std::_Lockit::_Lockit.LIBCPMT ref: 0047EF06
                                                                      • Part of subcall function 0047EEF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0047EF30
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0049BFBB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                    • String ID:
                                                                    • API String ID: 593203224-0
                                                                    • Opcode ID: d60386ebc8905df8f16c10f7fa3c91e8a6c9b23f5f7661c57f6bfda2410f5871
                                                                    • Instruction ID: 6abd75c03e294ec24f6916fd32cb1cdea991cdc4f1b0dcaf644163c4600ad8c9
                                                                    • Opcode Fuzzy Hash: d60386ebc8905df8f16c10f7fa3c91e8a6c9b23f5f7661c57f6bfda2410f5871
                                                                    • Instruction Fuzzy Hash: BE314BB5D00209DFCB08DF95D981AFEBBB1FB48304F10462AE515A7395E738AA04CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0049C00A
                                                                    • int.LIBCPMTD ref: 0049C023
                                                                      • Part of subcall function 0047EEF0: std::_Lockit::_Lockit.LIBCPMT ref: 0047EF06
                                                                      • Part of subcall function 0047EEF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0047EF30
                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0049C0BB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                    • String ID:
                                                                    • API String ID: 593203224-0
                                                                    • Opcode ID: f592325ad8b42491b6ae7de95eca66ef226a24d3dbd3a0b52300bd22e2940766
                                                                    • Instruction ID: 2ecee544a695754b7a2c2ae081d6b0471dea7f4b9f6070cb2fdc7af8716b1b29
                                                                    • Opcode Fuzzy Hash: f592325ad8b42491b6ae7de95eca66ef226a24d3dbd3a0b52300bd22e2940766
                                                                    • Instruction Fuzzy Hash: 2E313AB5D00209DFCB08DF95D981AFFBBB5FB48314F10462AE416A7391D739AA00CBA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • new.LIBCMT ref: 0046B6C1
                                                                    • new.LIBCMT ref: 0046B6D5
                                                                      • Part of subcall function 005C97B8: Concurrency::cancel_current_task.LIBCPMT ref: 005C97D0
                                                                    • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 0046B6EE
                                                                    • shared_ptr.LIBCMTD ref: 0046B710
                                                                      • Part of subcall function 004D1FE0: std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 004D1FEA
                                                                      • Part of subcall function 004CD240: new.LIBCMT ref: 004CD29F
                                                                      • Part of subcall function 004CD240: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 004CD2CA
                                                                      • Part of subcall function 004CD240: new.LIBCMT ref: 004CD305
                                                                      • Part of subcall function 004CD240: new.LIBCMT ref: 004CD365
                                                                    • shared_ptr.LIBCMTD ref: 0046B759
                                                                      • Part of subcall function 004D2010: std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 004D201A
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0046B774
                                                                      • Part of subcall function 0048A4C0: _Ptr_base.LIBCMTD ref: 0048A4E9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ProcessorVirtual$std::_$Concurrency::Iterator_baseIterator_base::_RootRoot::shared_ptr$Concurrency::cancel_current_taskContainer_base12Container_base12::~_Ptr_base
                                                                    • String ID:
                                                                    • API String ID: 2736077689-0
                                                                    • Opcode ID: 359fe9f8fa6065c56478c5607a5d721b2fa912bd7d0e31d5bdc281070e7e66a8
                                                                    • Instruction ID: 08257124170dec88dee429e7789d1d0b033c047d09a0eb2b1f9c86a5b9e08de6
                                                                    • Opcode Fuzzy Hash: 359fe9f8fa6065c56478c5607a5d721b2fa912bd7d0e31d5bdc281070e7e66a8
                                                                    • Instruction Fuzzy Hash: 183108B1D04249EFCB04DFA9D945BEEBBB1FB48314F10826EE415A7381D7795A00CBA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CreatePenIndirect.GDI32(?), ref: 004F57BD
                                                                    • SelectObject.GDI32(?,00000000), ref: 004F57C7
                                                                    • MoveToEx.GDI32(?,?,?,00000000), ref: 004F57E6
                                                                    • LineTo.GDI32(?,?,?), ref: 004F57F8
                                                                    • SelectObject.GDI32(?,00000000), ref: 004F5802
                                                                    • DeleteObject.GDI32(00000000), ref: 004F5809
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Object$Select$CreateDeleteIndirectLineMove
                                                                    • String ID:
                                                                    • API String ID: 191790629-0
                                                                    • Opcode ID: 9bb594d45d21f97a256ef2e00c3c6d6f6d52bd6894d87898208028ae911cef46
                                                                    • Instruction ID: 12b995d2d18d2a2cfe15bdb4ab3812666928e71276f6f0d04277b11cd312842b
                                                                    • Opcode Fuzzy Hash: 9bb594d45d21f97a256ef2e00c3c6d6f6d52bd6894d87898208028ae911cef46
                                                                    • Instruction Fuzzy Hash: 9F2108759001199FCB00CFA8DC999EEBBF9FB4C312F04815AF906E7260D7359A55DBA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,004D41D4,005E66AE,004D41D4,?,?,005F2B48,004D41D4,?,00000000), ref: 005FED4A
                                                                    • _free.LIBCMT ref: 005FED7D
                                                                    • _free.LIBCMT ref: 005FEDA5
                                                                    • SetLastError.KERNEL32(00000000,004D41D4,?,00000000), ref: 005FEDB2
                                                                    • SetLastError.KERNEL32(00000000,004D41D4,?,00000000), ref: 005FEDBE
                                                                    • _abort.LIBCMT ref: 005FEDC4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free$_abort
                                                                    • String ID:
                                                                    • API String ID: 3160817290-0
                                                                    • Opcode ID: cea6590d333cc36fea673feb5defacf3f783965657c67cfc1b232d7a0fe0f050
                                                                    • Instruction ID: 6b80d747731fa94c179a4e19517dde38b3a9223681e45cbf39031ec5111d6dc0
                                                                    • Opcode Fuzzy Hash: cea6590d333cc36fea673feb5defacf3f783965657c67cfc1b232d7a0fe0f050
                                                                    • Instruction Fuzzy Hash: DAF0A43618460A36D71633346C4FEBA2D2BBFD1B61B254529FF15D25F1EF2D88014171
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: __aulldvrm
                                                                    • String ID: $+$0123456789ABCDEF$0123456789abcdef
                                                                    • API String ID: 1302938615-2293345791
                                                                    • Opcode ID: b6b3b7f602e4f8d64a0bc6345a9b8e02c5eee9621008ae64b18fc365f897f0ba
                                                                    • Instruction ID: 7129a4d74b8cb8579a6b583afd5b91dded8c8a4eafebc1afb6fc6b09cea8689e
                                                                    • Opcode Fuzzy Hash: b6b3b7f602e4f8d64a0bc6345a9b8e02c5eee9621008ae64b18fc365f897f0ba
                                                                    • Instruction Fuzzy Hash: DF817B72A087519FD710DE28C844AAFBFE5BFC8748F14091DF995A7212DB30ED058B92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0048FCF0: std::ios_base::good.LIBCPMTD ref: 0048FD34
                                                                      • Part of subcall function 0048FCF0: std::ios_base::good.LIBCPMTD ref: 0048FD91
                                                                    • char_traits.LIBCPMTD ref: 0049A3DE
                                                                    • char_traits.LIBCPMTD ref: 0049A43C
                                                                    • char_traits.LIBCPMTD ref: 0049A4C8
                                                                    • std::ios_base::width.LIBCPMTD ref: 0049A524
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: char_traits$std::ios_base::good$std::ios_base::width
                                                                    • String ID: fAH
                                                                    • API String ID: 2544722642-578738534
                                                                    • Opcode ID: 4e5770bd057780e37c69da03ad6f23b14d73b81d7340f0e53aa0d5d147517004
                                                                    • Instruction ID: 63557c0bef109dc826d4df2cf0c3a0079ce8c047ca21b630dd8b3556215a9510
                                                                    • Opcode Fuzzy Hash: 4e5770bd057780e37c69da03ad6f23b14d73b81d7340f0e53aa0d5d147517004
                                                                    • Instruction Fuzzy Hash: 03A10774900248DFDF14DFA5C895BAEBBB1FF48308F14812AE9066B355D738AA45CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ___from_strstr_to_strchr.LIBCMT ref: 0046A73F
                                                                    Strings
                                                                    • The requested method(s) are not currently supported, xrefs: 0046A7D8
                                                                    • Invalid parameter specified for method_type, xrefs: 0046A815
                                                                    • Error allocated space for method preferences, xrefs: 0046A70C
                                                                    • nl, xrefs: 0046A5F8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ___from_strstr_to_strchr
                                                                    • String ID: Error allocated space for method preferences$Invalid parameter specified for method_type$The requested method(s) are not currently supported$nl
                                                                    • API String ID: 601868998-832783182
                                                                    • Opcode ID: b3212edf2833e6b192bf99a01dd24a40634ca89c34565418b13898c275aed3ad
                                                                    • Instruction ID: 21c1be13a366304e520f71138d27aceb49ee6662cece8051a01aa92543703fa7
                                                                    • Opcode Fuzzy Hash: b3212edf2833e6b192bf99a01dd24a40634ca89c34565418b13898c275aed3ad
                                                                    • Instruction Fuzzy Hash: 3E7115705087479FC710DF24D8846ABBBE5EF85304F14882EE89967302F639DA598F97
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • libssh2_channel_window_read_ex.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?,00000000,00000000,?,?,?,00000002,?,0045DC77), ref: 0045DAD7
                                                                    Strings
                                                                    • Unable to allocate SFTP packet, xrefs: 0045DAA7
                                                                    • Error waiting for SFTP packet, xrefs: 0045DB90
                                                                    • SFTP packet too large, xrefs: 0045DA7F
                                                                    • channel read, xrefs: 0045DA47
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: D.5531.23089libssh2_channel_window_read_ex.
                                                                    • String ID: Error waiting for SFTP packet$SFTP packet too large$Unable to allocate SFTP packet$channel read
                                                                    • API String ID: 2964706823-2237773506
                                                                    • Opcode ID: f00fd20ec42db885aabffae468961bd7b48ca7e10ad91c13a08dbfc67bd3eace
                                                                    • Instruction ID: d0b0611a012153b9f90eb3f0f82da8ae8e0ce95717f62a767ed6766df763acee
                                                                    • Opcode Fuzzy Hash: f00fd20ec42db885aabffae468961bd7b48ca7e10ad91c13a08dbfc67bd3eace
                                                                    • Instruction Fuzzy Hash: 1A51E8B2A017045BD220DA399C81A6BB3D5FF85326F54062FF94787B82E739B8048764
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ___from_strstr_to_strchr.LIBCMT ref: 005278E3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ___from_strstr_to_strchr
                                                                    • String ID: error:%08lX:%s:%s:%s$func(%lu)$lib(%lu)$reason(%lu)
                                                                    • API String ID: 601868998-2416195885
                                                                    • Opcode ID: e0b8fc793cd4466e429397710a8eee7fb69ecb66dbb9a742118549c33011ea74
                                                                    • Instruction ID: 1fdc2c3c767bb7f6bda69fe795628f6d96fb47290b3924498e9ecc0b638bed93
                                                                    • Opcode Fuzzy Hash: e0b8fc793cd4466e429397710a8eee7fb69ecb66dbb9a742118549c33011ea74
                                                                    • Instruction Fuzzy Hash: A041E97160831A9BD724DA14EC49FAFBBD9FF95304F00082DF54593282E775E908CBA2
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(00000000,?,0041208B,?,00004000), ref: 0051EBC4
                                                                    • libssh2_trace_sethandler.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(00000000,?,0041208B,?,00004000), ref: 0051EC18
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: D.5531.23089libssh2_trace_sethandler.
                                                                    • String ID: .rnd$HOME$RANDFILE
                                                                    • API String ID: 3710141464-2139794832
                                                                    • Opcode ID: 6ebc9fc9233a8021ea7dda56baa2144f366f0b4fd5b9a3dc8cb7ace7f5a6b112
                                                                    • Instruction ID: d2236b448cd099b1c5c6330fe37afe4b394a2345e48931d4fa1ceea1b1246065
                                                                    • Opcode Fuzzy Hash: 6ebc9fc9233a8021ea7dda56baa2144f366f0b4fd5b9a3dc8cb7ace7f5a6b112
                                                                    • Instruction Fuzzy Hash: 5E218E2360857216EB229A247C03AEBAFCA6FD2728F1D0559EC41A7203E2459CC387E1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetClassInfoExW.USER32(00000000,00000000), ref: 004FFE42
                                                                    • GetClassInfoExW.USER32(00000000,00000000), ref: 004FFE5E
                                                                    • RegisterClassExW.USER32(00000030), ref: 004FFE8E
                                                                    • GetLastError.KERNEL32(?,?), ref: 004FFE99
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Class$Info$ErrorLastRegister
                                                                    • String ID: 0
                                                                    • API String ID: 3973468783-4108050209
                                                                    • Opcode ID: 2571653fee970d08f3eed163d37a584266f273764e72e80d0c9ca3c394cde612
                                                                    • Instruction ID: ce15f854aa2a48abcea10c2b768af135169bfe327ab6d78b51cf8f86d5795675
                                                                    • Opcode Fuzzy Hash: 2571653fee970d08f3eed163d37a584266f273764e72e80d0c9ca3c394cde612
                                                                    • Instruction Fuzzy Hash: EC118274A10218AFDB109FB9D888AEFBBFDFF04755F04842AF505D3251D77498048B60
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,005FF36F,?,00000000,00000000,00000000,?,005FF69B,00000006,FlsSetValue), ref: 005FF3FA
                                                                    • GetLastError.KERNEL32(?,005FF36F,?,00000000,00000000,00000000,?,005FF69B,00000006,FlsSetValue,0066F6F0,0066F6F8,00000000,00000364,?,005FEE18), ref: 005FF406
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,005FF36F,?,00000000,00000000,00000000,?,005FF69B,00000006,FlsSetValue,0066F6F0,0066F6F8,00000000), ref: 005FF414
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID: +_
                                                                    • API String ID: 3177248105-2050882381
                                                                    • Opcode ID: 6baa476818695d7d73e54c81a5c6c42ac3d2c6d9b5a6cf8ceeecfdb486429608
                                                                    • Instruction ID: a3e4e1fce970494cff861a1dc90d43e6068d8f94e2f74171df55a6b3eaaba657
                                                                    • Opcode Fuzzy Hash: 6baa476818695d7d73e54c81a5c6c42ac3d2c6d9b5a6cf8ceeecfdb486429608
                                                                    • Instruction Fuzzy Hash: 7D01F73261123BABCB214B69AC48AB73F99BF04B617145531FA06D3640D724D800C7F0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsrchr
                                                                    • String ID: .bat$.cmd$.com$.exe
                                                                    • API String ID: 1752292252-4019086052
                                                                    • Opcode ID: 7844cadf2f20e6531e3f062719155c769ac65ab8e353b44a0c0feeae0cf57b9c
                                                                    • Instruction ID: 834be78da437ad709e7da94de04bd08c7cb9cbc0db70c5dddb67d39a66fe5cfc
                                                                    • Opcode Fuzzy Hash: 7844cadf2f20e6531e3f062719155c769ac65ab8e353b44a0c0feeae0cf57b9c
                                                                    • Instruction Fuzzy Hash: EDF0FC33648F5B649B1C2112AE176BB1F89EF823B0B600016F748954C2FF89AC81C0B9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __EH_prolog3_GS.LIBCMT ref: 0051E5BB
                                                                      • Part of subcall function 0051BF37: __EH_prolog3.LIBCMT ref: 0051BF3E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3H_prolog3_
                                                                    • String ID: 9Q$C!^$C!^${D27CDB6E-AE6D-11CF-96B8-444553540000}
                                                                    • API String ID: 3355343447-516461409
                                                                    • Opcode ID: 76f1aca5a921b3d1a1dc1302888aa461a2ca98dc753dd64c34b65eb1ab9608f5
                                                                    • Instruction ID: 7c35cc67b15b37670ada990a59aad2fee0d3960c2c270097063bfc6c032caad2
                                                                    • Opcode Fuzzy Hash: 76f1aca5a921b3d1a1dc1302888aa461a2ca98dc753dd64c34b65eb1ab9608f5
                                                                    • Instruction Fuzzy Hash: E7117FB0800F658ADB20DF65DC09BDBBFF9AF91309F40458EA09DA7281DBB01688CF51
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,005F945D,005E77FD,?,005F93FD,005E77FD,006B9E68,0000000C,005F9554,005E77FD,00000002), ref: 005F94CC
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005F94DF
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,005F945D,005E77FD,?,005F93FD,005E77FD,006B9E68,0000000C,005F9554,005E77FD,00000002,00000000), ref: 005F9502
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: 53960c1fa40676ed8622a3b3332dafe2cb35b34cf950c264d9e459f0ee2ce3f8
                                                                    • Instruction ID: 74b038589d65fc06ef091152b2d36b0e8c2530f3ef796a7b3a8faeed62e595d5
                                                                    • Opcode Fuzzy Hash: 53960c1fa40676ed8622a3b3332dafe2cb35b34cf950c264d9e459f0ee2ce3f8
                                                                    • Instruction Fuzzy Hash: D9F0AF30A0021DBBCB159F90DC1DBEEBFBAFF44715F044069F906A61A0CB358A41CAA0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __EH_prolog3.LIBCMT ref: 0051D95F
                                                                      • Part of subcall function 0051BF37: __EH_prolog3.LIBCMT ref: 0051BF3E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID: -Q$7Q$AQ$C!^
                                                                    • API String ID: 431132790-2858313133
                                                                    • Opcode ID: ee30c6ef1191556df7f1b6399f338f5b5eb4a693d7da3237195799e4502e9b19
                                                                    • Instruction ID: 4f31a28e20d5c4c2762eaf346ef1a631a1bdead20e424edf1e9fab812653d654
                                                                    • Opcode Fuzzy Hash: ee30c6ef1191556df7f1b6399f338f5b5eb4a693d7da3237195799e4502e9b19
                                                                    • Instruction Fuzzy Hash: 9B110CB0501F518EC760DF79984879BBFE2BF4530AF81092DA0AA9B241DBB52544CF81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 004D7A57
                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004D7A5E
                                                                    • GetCurrentProcess.KERNEL32(00000000), ref: 004D7A71
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: AddressCurrentHandleModuleProcProcess
                                                                    • String ID: IsWow64Process$kernel32
                                                                    • API String ID: 4190356694-3789238822
                                                                    • Opcode ID: b3c1ba96f3fa86081933790941f95a7d4abbc5a7fa8df10d9da57cdc432f340a
                                                                    • Instruction ID: 967a5673d3dcc13e6480c75b8547b04bd00ebd722ce00bd37f97885cf4ff65ea
                                                                    • Opcode Fuzzy Hash: b3c1ba96f3fa86081933790941f95a7d4abbc5a7fa8df10d9da57cdc432f340a
                                                                    • Instruction Fuzzy Hash: D9E0E574800208FBCF00ABE4A91DA8DBBB9AB08701F149096A901A3250D7745A44DB61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 925bb211ab69b30b80bab6a006187ae8d82e4e015e169a9913d2dd32551a569d
                                                                    • Instruction ID: df63c9af4360abc97a090b6aabacbc519763b1d516ded2e74466a4359e5f7c1a
                                                                    • Opcode Fuzzy Hash: 925bb211ab69b30b80bab6a006187ae8d82e4e015e169a9913d2dd32551a569d
                                                                    • Instruction Fuzzy Hash: CB71B03198126B9BDB298F55C848AFFBBBBEF45351F14466AE412573C0D7708E42C7A0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00483FD2
                                                                      • Part of subcall function 0048B7E0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048B809
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484028
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484053
                                                                    • _DebugHeapAllocator.LIBCPMTD ref: 00484209
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484218
                                                                      • Part of subcall function 0048B820: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048B82A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_$Base::Concurrency::details::ContextIdentityQueueWork$AllocatorDebugHeap
                                                                    • String ID:
                                                                    • API String ID: 4207642963-0
                                                                    • Opcode ID: ded7e784b08f3e36c8193d90e9a693750ca525e3867dee8e4a74794a75505efc
                                                                    • Instruction ID: 1afed85d0bf40bf1309dcc4793ab507b1c5eb8c894ed0e1f0288d772fa768332
                                                                    • Opcode Fuzzy Hash: ded7e784b08f3e36c8193d90e9a693750ca525e3867dee8e4a74794a75505efc
                                                                    • Instruction Fuzzy Hash: 9BA16A71900218DFCB14EB64CC91BEEB775EF55304F04459EE14AA7292DB382E89CF96
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::ios_base::getloc.LIBCPMTD ref: 0049047C
                                                                    • _Mpunct.LIBCPMTD ref: 004904D0
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 004905BD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_Mpunctstd::_std::ios_base::getloc
                                                                    • String ID:
                                                                    • API String ID: 152818851-0
                                                                    • Opcode ID: 961a466f302cf0685dfe457c8fde5d4904a31abb31c34a81372b51d7614a9e4b
                                                                    • Instruction ID: 38f2c23e79c4f908b17bb3d45597cf5d692c9dbfa7404843ed648bf4660d41ea
                                                                    • Opcode Fuzzy Hash: 961a466f302cf0685dfe457c8fde5d4904a31abb31c34a81372b51d7614a9e4b
                                                                    • Instruction Fuzzy Hash: 657120B19002089FCF14EF99C891AEEBBB5BF48314F14852EF519A7291DB349D45CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::ios_base::good.LIBCPMTD ref: 004949FC
                                                                    • std::ios_base::getloc.LIBCPMTD ref: 00494A6D
                                                                    • char_traits.LIBCPMTD ref: 00494B01
                                                                    • std::ios_base::good.LIBCPMTD ref: 00494B8D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: std::ios_base::good$char_traitsstd::ios_base::getloc
                                                                    • String ID:
                                                                    • API String ID: 1920461149-0
                                                                    • Opcode ID: b221100308e9df102fb8d1ec373b8f0bdb732ddf12b918dbd1222d7f0b107002
                                                                    • Instruction ID: 043b28d2f44e35b6c2177d2085140c3536cfd767c07f37ba22f5cbd3ea754171
                                                                    • Opcode Fuzzy Hash: b221100308e9df102fb8d1ec373b8f0bdb732ddf12b918dbd1222d7f0b107002
                                                                    • Instruction Fuzzy Hash: CA516274E002099FCF04DF95C892EBEBBB1BF84318F14816EE515A7391DB39A941CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: a36ddc3cd3e88d3f5107c8b49f0ed837ecb1fa881ce0eb45577d248e2aa1c6be
                                                                    • Instruction ID: 5d834ff3699117a75438aeb9bf28faecb5055d7a5e6681861c4686cf3c7da4b9
                                                                    • Opcode Fuzzy Hash: a36ddc3cd3e88d3f5107c8b49f0ed837ecb1fa881ce0eb45577d248e2aa1c6be
                                                                    • Instruction Fuzzy Hash: 3841C136A00208DFDB20DF78C885A6DBBB6FF89714B254569E615EB391DB35AD01CB80
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: char_traits
                                                                    • String ID:
                                                                    • API String ID: 1158913984-0
                                                                    • Opcode ID: ff12374529c5b45d71528623a7935018d0322c7bd07979183a048aa4d1cae143
                                                                    • Instruction ID: df9129c85a99687035451e739a2bccceacef9de770e2b4c51cfb44ea5c8edf4e
                                                                    • Opcode Fuzzy Hash: ff12374529c5b45d71528623a7935018d0322c7bd07979183a048aa4d1cae143
                                                                    • Instruction Fuzzy Hash: 3431ABB6D00109ABCF04FBA2D8919EE7B756F54308F0489BFE4065B242EB39DB45C7A5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::ios_base::good.LIBCPMTD ref: 0049B36E
                                                                    • make_pair.LIBCPMTD ref: 0049B397
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 0049B3DA
                                                                    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 0049B3ED
                                                                    • make_pair.LIBCPMTD ref: 0049B442
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: make_pair$Affinity::operator!=Concurrency::details::HardwareMutex_baseMutex_base::~_std::_std::ios_base::good
                                                                    • String ID:
                                                                    • API String ID: 3397314618-0
                                                                    • Opcode ID: 5d48bb4556b975830baceb67be8ddc343921f8978adbd471fb300d7f5dfa0d5c
                                                                    • Instruction ID: 7b2768039d58be6350bee7eaf58ab728adfc6e1956569045a32e7cc00d840666
                                                                    • Opcode Fuzzy Hash: 5d48bb4556b975830baceb67be8ddc343921f8978adbd471fb300d7f5dfa0d5c
                                                                    • Instruction Fuzzy Hash: F63182B5910109ABDF04EF91D8418EF7779FF84300F04842FF81697292DB38AA14C7A5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::ios_base::good.LIBCPMTD ref: 0049B48C
                                                                    • make_pair.LIBCPMTD ref: 0049B4B5
                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 0049B4F8
                                                                    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 0049B507
                                                                    • make_pair.LIBCPMTD ref: 0049B555
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: make_pair$Affinity::operator!=Concurrency::details::HardwareMutex_baseMutex_base::~_std::_std::ios_base::good
                                                                    • String ID:
                                                                    • API String ID: 3397314618-0
                                                                    • Opcode ID: 1f114988d8ed62f61632ddc4c6f190269fbdbe4735b6740677cebcc6ecfe2c6d
                                                                    • Instruction ID: c6cc5ea8dd40e9d1ae22aaba4e383d91e5acb6a90e445f26faa519cb3c4656a4
                                                                    • Opcode Fuzzy Hash: 1f114988d8ed62f61632ddc4c6f190269fbdbe4735b6740677cebcc6ecfe2c6d
                                                                    • Instruction Fuzzy Hash: 71315075900109ABCB05EF91D891CEF7779FF84304F00856FF90657291EB38AA15CBA9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • new.LIBCMT ref: 0049C6E4
                                                                    • std::locale::c_str.LIBCPMTD ref: 0049C6F9
                                                                    • std::_Locinfo::_Locinfo.LIBCPMTD ref: 0049C702
                                                                      • Part of subcall function 0047EC30: std::_Lockit::_Lockit.LIBCPMT ref: 0047EC5D
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC6F
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC7E
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC8D
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC9C
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047ECAB
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047ECBA
                                                                      • Part of subcall function 0047EC30: std::bad_exception::bad_exception.LIBCMTD ref: 0047ECD1
                                                                      • Part of subcall function 0047EC30: __CxxThrowException@8.LIBVCRUNTIME ref: 0047ECDF
                                                                      • Part of subcall function 0047EC30: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0047ECEC
                                                                    • numpunct.LIBCPMTD ref: 0049C728
                                                                      • Part of subcall function 0049CF80: std::locale::facet::facet.LIBCPMTD ref: 0049CFAD
                                                                      • Part of subcall function 0049CF80: numpunct.LIBCPMTD ref: 0049CFCE
                                                                    • std::_Locinfo::~_Locinfo.LIBCPMTD ref: 0049C764
                                                                      • Part of subcall function 0047ED10: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0047ED3A
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED48
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED53
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED5E
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED69
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED74
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED7F
                                                                      • Part of subcall function 0047ED10: std::_Lockit::~_Lockit.LIBCPMT ref: 0047ED87
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: std::_$Container_base12Container_base12::~_Yarn$Locinfo::_$LocinfoLockitnumpunct$Exception@8Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_Throwstd::bad_exception::bad_exceptionstd::locale::c_strstd::locale::facet::facet
                                                                    • String ID:
                                                                    • API String ID: 3907924921-0
                                                                    • Opcode ID: 2cdf7418fec38f6d1504aea68df733c6fd54b3b33b5cde1043e672facdb95378
                                                                    • Instruction ID: bbde198619586ed9e2aa452fc2027649cd28d36a900795a07d17364d96a5528a
                                                                    • Opcode Fuzzy Hash: 2cdf7418fec38f6d1504aea68df733c6fd54b3b33b5cde1043e672facdb95378
                                                                    • Instruction Fuzzy Hash: CD2125B1D0020ADFDF14DF98C981BEEBBB1FB48714F10866AE415AB380D7796A00CB95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • new.LIBCMT ref: 0049CB84
                                                                    • std::locale::c_str.LIBCPMTD ref: 0049CB99
                                                                    • std::_Locinfo::_Locinfo.LIBCPMTD ref: 0049CBA2
                                                                      • Part of subcall function 0047EC30: std::_Lockit::_Lockit.LIBCPMT ref: 0047EC5D
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC6F
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC7E
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC8D
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC9C
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047ECAB
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047ECBA
                                                                      • Part of subcall function 0047EC30: std::bad_exception::bad_exception.LIBCMTD ref: 0047ECD1
                                                                      • Part of subcall function 0047EC30: __CxxThrowException@8.LIBVCRUNTIME ref: 0047ECDF
                                                                      • Part of subcall function 0047EC30: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0047ECEC
                                                                    • ctype.LIBCPMTD ref: 0049CBC6
                                                                      • Part of subcall function 0049D0E0: std::bad_exception::bad_exception.LIBCMTD ref: 0049D10D
                                                                    • std::_Locinfo::~_Locinfo.LIBCPMTD ref: 0049CC02
                                                                      • Part of subcall function 0047ED10: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0047ED3A
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED48
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED53
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED5E
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED69
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED74
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED7F
                                                                      • Part of subcall function 0047ED10: std::_Lockit::~_Lockit.LIBCPMT ref: 0047ED87
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: std::_$Container_base12Container_base12::~_Yarn$Locinfo::_$LocinfoLockitstd::bad_exception::bad_exception$Exception@8Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_Throwctypestd::locale::c_str
                                                                    • String ID:
                                                                    • API String ID: 69252773-0
                                                                    • Opcode ID: 162aca304105e37c74734de9fcc76a444507cfa8adc9ce5f79b310a82d24bd5c
                                                                    • Instruction ID: d26ce9c190d575c93df16c736260c6e2dd9ce4fe2a393393b5a194451f242ecd
                                                                    • Opcode Fuzzy Hash: 162aca304105e37c74734de9fcc76a444507cfa8adc9ce5f79b310a82d24bd5c
                                                                    • Instruction Fuzzy Hash: 3A21F5B1D00249DFDF04DF98C955BEEBBB1FB48314F10866AE419AB380D7796A04CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • new.LIBCMT ref: 0049CC64
                                                                    • std::locale::c_str.LIBCPMTD ref: 0049CC79
                                                                    • std::_Locinfo::_Locinfo.LIBCPMTD ref: 0049CC82
                                                                      • Part of subcall function 0047EC30: std::_Lockit::_Lockit.LIBCPMT ref: 0047EC5D
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC6F
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC7E
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC8D
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047EC9C
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047ECAB
                                                                      • Part of subcall function 0047EC30: _Yarn.LIBCPMTD ref: 0047ECBA
                                                                      • Part of subcall function 0047EC30: std::bad_exception::bad_exception.LIBCMTD ref: 0047ECD1
                                                                      • Part of subcall function 0047EC30: __CxxThrowException@8.LIBVCRUNTIME ref: 0047ECDF
                                                                      • Part of subcall function 0047EC30: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0047ECEC
                                                                    • ctype.LIBCPMTD ref: 0049CCA6
                                                                      • Part of subcall function 0049D150: std::locale::facet::facet.LIBCPMTD ref: 0049D17D
                                                                    • std::_Locinfo::~_Locinfo.LIBCPMTD ref: 0049CCE2
                                                                      • Part of subcall function 0047ED10: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0047ED3A
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED48
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED53
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED5E
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED69
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED74
                                                                      • Part of subcall function 0047ED10: std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0047ED7F
                                                                      • Part of subcall function 0047ED10: std::_Lockit::~_Lockit.LIBCPMT ref: 0047ED87
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: std::_$Container_base12Container_base12::~_Yarn$Locinfo::_$LocinfoLockit$Exception@8Locinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_Throwctypestd::bad_exception::bad_exceptionstd::locale::c_strstd::locale::facet::facet
                                                                    • String ID:
                                                                    • API String ID: 3257443147-0
                                                                    • Opcode ID: 4b15576f291bf59706c1d6b03e5ebd3bce36a019c81bf01fc2eededb48fead9f
                                                                    • Instruction ID: a083e81034d5abc8fe639a1f53de98c20dabe09da6c1c0c665ba5a26f0ab7b44
                                                                    • Opcode Fuzzy Hash: 4b15576f291bf59706c1d6b03e5ebd3bce36a019c81bf01fc2eededb48fead9f
                                                                    • Instruction Fuzzy Hash: E52107B1D00249DFDF04DF98C955BEEBBB1FB49314F10866AE429AB380D7796A00CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,00000000,005EB47E,005F2B0D,00000000), ref: 005FEDCF
                                                                    • _free.LIBCMT ref: 005FEE04
                                                                    • _free.LIBCMT ref: 005FEE2B
                                                                    • SetLastError.KERNEL32(00000000,005EB47E,005F2B0D,00000000), ref: 005FEE38
                                                                    • SetLastError.KERNEL32(00000000,005EB47E,005F2B0D,00000000), ref: 005FEE41
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free
                                                                    • String ID:
                                                                    • API String ID: 3170660625-0
                                                                    • Opcode ID: f701a49753f9bc50636b4b74843bc66c4afd41fa75171b063f72b39c5af59162
                                                                    • Instruction ID: 3f9230e4f14b6ed44a0b45cd2e34e10d4160b7277667a742ac296287317cba16
                                                                    • Opcode Fuzzy Hash: f701a49753f9bc50636b4b74843bc66c4afd41fa75171b063f72b39c5af59162
                                                                    • Instruction Fuzzy Hash: 3201AD3614060A2B871222647C8FD7B2E2EBBD17617280439FB11921A2EE2D880141A1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _free.LIBCMT ref: 006066A9
                                                                      • Part of subcall function 005F64BE: RtlFreeHeap.NTDLL(00000000,00000000,?,00606944,005EB47E,00000000,005EB47E,00000000,?,00606BE8,005EB47E,00000007,005EB47E,?,00606F97,005EB47E), ref: 005F64D4
                                                                      • Part of subcall function 005F64BE: GetLastError.KERNEL32(005EB47E,?,00606944,005EB47E,00000000,005EB47E,00000000,?,00606BE8,005EB47E,00000007,005EB47E,?,00606F97,005EB47E,005EB47E), ref: 005F64E6
                                                                    • _free.LIBCMT ref: 006066BB
                                                                    • _free.LIBCMT ref: 006066CD
                                                                    • _free.LIBCMT ref: 006066DF
                                                                    • _free.LIBCMT ref: 006066F1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: eb8ae81559d61357638ceeef2fdda4ac340183b227e0e93b9d925fcacabb5456
                                                                    • Instruction ID: 843f06990c462fe4bf2dc698517c485ba8a58ea20824eb1dd7a8492b0ce2996d
                                                                    • Opcode Fuzzy Hash: eb8ae81559d61357638ceeef2fdda4ac340183b227e0e93b9d925fcacabb5456
                                                                    • Instruction Fuzzy Hash: 2BF0AF32554604AFCA28EB58F9CDC677BDBBA803503280804F458D3F40CA3AFCA08A15
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: char_traits$std::ios_base::width
                                                                    • String ID: x`
                                                                    • API String ID: 735177774-1397163517
                                                                    • Opcode ID: 69ca35f6f208d4323ac5030f4d918788183c34ace9be891a5470fd118143bcaa
                                                                    • Instruction ID: debb555ba1f6b727534f406455e7a42b43f89366b2860c36b09f5feecce7fcd4
                                                                    • Opcode Fuzzy Hash: 69ca35f6f208d4323ac5030f4d918788183c34ace9be891a5470fd118143bcaa
                                                                    • Instruction Fuzzy Hash: EBB1F774D00208DFCF14DF95C891AAEBBB1FF88308F24816EE906AB355D738A955CB95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: </Downloader>$<Downloader>$Download_url
                                                                    • API String ID: 0-2463169464
                                                                    • Opcode ID: 03d0e288cdb87d5f4f3b2e06c021997eef26e297b03684dea3073543fbe6ecf3
                                                                    • Instruction ID: 2c568fb7363732986dcf4cfaeec1b590c7c1ae31f72713f01359dbf15a8c4826
                                                                    • Opcode Fuzzy Hash: 03d0e288cdb87d5f4f3b2e06c021997eef26e297b03684dea3073543fbe6ecf3
                                                                    • Instruction Fuzzy Hash: AFA14970D0014CEFCB14EFA9C895AEDBBB0AF14318F24855EE0166B2D1DB786E45DB98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CountStateTick_wcsstr
                                                                    • String ID: RichEditUI
                                                                    • API String ID: 1310091763-2796277332
                                                                    • Opcode ID: 589f81167c077b4f8552d6d470e758e68190ba2f1bebd89a2023a982dc78d43b
                                                                    • Instruction ID: 383bb49fdd603629bc2edabf0fb1144a8938149a9dcc23c40294af3245bce63c
                                                                    • Opcode Fuzzy Hash: 589f81167c077b4f8552d6d470e758e68190ba2f1bebd89a2023a982dc78d43b
                                                                    • Instruction Fuzzy Hash: BB814074A00609EFCB08CF99D494AEEF7B2BF88300F14C1AAD819AB351D7359A45CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • libssh2_knownhost_readline.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?,?,?,00000001), ref: 00458699
                                                                    Strings
                                                                    • Unsupported type of known-host information store, xrefs: 00458622
                                                                    • Failed to parse known hosts file, xrefs: 004586E2
                                                                    • Failed to open file, xrefs: 00458719
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: D.5531.23089libssh2_knownhost_readline.
                                                                    • String ID: Failed to open file$Failed to parse known hosts file$Unsupported type of known-host information store
                                                                    • API String ID: 3155965070-3548788175
                                                                    • Opcode ID: 25a7484a196988800fbc66c4278c9c17474c8a62858bf9b46e258c94bef46d48
                                                                    • Instruction ID: 7f3ffbbbbfeb88c8209f0a40c92d3f8a74aee6ba94e81f3d3cae2220dc33f3e6
                                                                    • Opcode Fuzzy Hash: 25a7484a196988800fbc66c4278c9c17474c8a62858bf9b46e258c94bef46d48
                                                                    • Instruction Fuzzy Hash: 193108B2B042015BC720AB64AC46FAB73D9BFC4314F54852EF9D992282FD39950CCBD6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _wcsstr
                                                                    • String ID: ListHeader$ListHeaderItemUI$ListItem
                                                                    • API String ID: 1512112989-3885667446
                                                                    • Opcode ID: d5b1dc0f56e4fb299218b977c85dc92c72bbf45c9b981eb70a3848bbec924226
                                                                    • Instruction ID: d5954f94b25ec94dbd35f4042e35b02829a49c9a6f95626e407f06c0c707242e
                                                                    • Opcode Fuzzy Hash: d5b1dc0f56e4fb299218b977c85dc92c72bbf45c9b981eb70a3848bbec924226
                                                                    • Instruction Fuzzy Hash: 58316B753405019FD718DF28C8A8A29BBE5FF85328B18416DE656CBBA1CB31EC10CB96
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ___from_strstr_to_strchr_fwprintf
                                                                    • String ID: %I64i$OPENSSL_ia32cap
                                                                    • API String ID: 3950272715-1470193844
                                                                    • Opcode ID: ff20365c5aac2e057e9c7f478f2be4f054a325c247af75476b7040e6590913b2
                                                                    • Instruction ID: 8797d11de9f961fbe4de8cae6d9b8e868ec473531bb3d5febfcb514a1678ae05
                                                                    • Opcode Fuzzy Hash: ff20365c5aac2e057e9c7f478f2be4f054a325c247af75476b7040e6590913b2
                                                                    • Instruction Fuzzy Hash: 9B31A2B5D043426FF700DF619C42B2A7BE5BB94344F18843EF88896252E7B89948C7A3
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0048485C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_
                                                                    • String ID: fileStream$filename$maxLogFileSize
                                                                    • API String ID: 1531518832-804276554
                                                                    • Opcode ID: d71ed8693786fa8c707c93d11b5ebe4ee16e3035a0aad5c893843f0877bdf932
                                                                    • Instruction ID: ef1f25900d38a3fd3aa19c88cb4bc652e9bec1214f2297723ebc44c21d9e98bb
                                                                    • Opcode Fuzzy Hash: d71ed8693786fa8c707c93d11b5ebe4ee16e3035a0aad5c893843f0877bdf932
                                                                    • Instruction Fuzzy Hash: 24315D7591014CAFCB04EFA4E891FEEBBB5BF45704F10462EF412A7281DB386940CB98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00471AB6
                                                                    • SetCursor.USER32(00000000,?,0046E0B5,?), ref: 00471ABD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Cursor$Load
                                                                    • String ID: menu$timer
                                                                    • API String ID: 1675784387-2593718399
                                                                    • Opcode ID: 9586126e51d8fd74038692dbe1d9cd0e92c09881f17b18584e729f2e7604b671
                                                                    • Instruction ID: b13e141726c9d3389c5a7fc0a9dbec4a72e71d0e2e1bedfdb0099beee508c0d8
                                                                    • Opcode Fuzzy Hash: 9586126e51d8fd74038692dbe1d9cd0e92c09881f17b18584e729f2e7604b671
                                                                    • Instruction Fuzzy Hash: 2531FD34600104EFCB08CF98C991EEE77B6BB89341F248199E5095B362D735AE82DB99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID: C!^
                                                                    • API String ID: 431132790-2379318171
                                                                    • Opcode ID: 7a18d661e3699ae206992a8c0aabd06b249228f3bbfbd50ca81cfa5ce6fe19cc
                                                                    • Instruction ID: aceba834413b910088a7195f2e4d7146327eef4a69780141bbc8a3dcb6447a6f
                                                                    • Opcode Fuzzy Hash: 7a18d661e3699ae206992a8c0aabd06b249228f3bbfbd50ca81cfa5ce6fe19cc
                                                                    • Instruction Fuzzy Hash: C4315CB0905B868ED760DF7888497DEBEE4BB45300F104A6DE0AADB2C1DB7466418F55
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .\crypto\err\err.c$Operation not permitted$unknown
                                                                    • API String ID: 0-3427296222
                                                                    • Opcode ID: 9a067eb78db6437a67ff3a5a44117b50d701d256dab74ee80604c5226c1b029d
                                                                    • Instruction ID: 0cd2582b67544e59c987f77fd837763518a03d18ef0d0541d907e06a71b4063a
                                                                    • Opcode Fuzzy Hash: 9a067eb78db6437a67ff3a5a44117b50d701d256dab74ee80604c5226c1b029d
                                                                    • Instruction Fuzzy Hash: 2E1193E1FC1B217AFB202A647C4BF762A42BF61B16F451568FA883D1C2F6F604918653
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(User32.dll), ref: 00475EBA
                                                                    • GetProcAddress.KERNEL32(00000000,SetLayeredWindowAttributes), ref: 00475ED2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: SetLayeredWindowAttributes$User32.dll
                                                                    • API String ID: 1646373207-2510956139
                                                                    • Opcode ID: 02855a14f57d5d8283852ecc834017645464a585b78f3b6027d54bd68834100b
                                                                    • Instruction ID: 87cbe1104b86a74501c5a7b4a9a2ac1cd8d31514b143a96f964c86c41ac1f593
                                                                    • Opcode Fuzzy Hash: 02855a14f57d5d8283852ecc834017645464a585b78f3b6027d54bd68834100b
                                                                    • Instruction Fuzzy Hash: 6F31FD74900609EFDB10CFA4C994BEEBBB1FB44304F20C19AE415AB380C7B59B81DB95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 005C9B68
                                                                    • ___raise_securityfailure.LIBCMT ref: 005C9C4F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                    • String ID: +_$`l
                                                                    • API String ID: 3761405300-918106383
                                                                    • Opcode ID: a16a6dfe22102d29aa929fc4c26b3b5bf38f6466a3b7f9bb3a43efe9bf1a2c37
                                                                    • Instruction ID: a703c7f034b275b1b97dd2ea824f365f74ba0951052be5241b70d50ba00780f3
                                                                    • Opcode Fuzzy Hash: a16a6dfe22102d29aa929fc4c26b3b5bf38f6466a3b7f9bb3a43efe9bf1a2c37
                                                                    • Instruction Fuzzy Hash: 5E21E2B4505304DEE714CF15F946F207BBAFB48304F14662AE909CB7B0E7BA5A80CB06
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • new.LIBCMT ref: 004D28B8
                                                                    • _Ref_count.LIBCMTD ref: 004D28D4
                                                                      • Part of subcall function 004D2DD0: std::_Ref_count_base::_Ref_count_base.LIBCMTD ref: 004D2DDA
                                                                    • _Resetp0.LIBCMTD ref: 004D2900
                                                                      • Part of subcall function 0049F140: _Ptr_base.LIBCMTD ref: 0049F152
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Ptr_baseRef_countRef_count_baseRef_count_base::_Resetp0std::_
                                                                    • String ID: + M
                                                                    • API String ID: 3640632022-1454401948
                                                                    • Opcode ID: aa46b38d3d2da981634dc1134059f6b8d792ab0e651ffe838b9934d2f8ba0a10
                                                                    • Instruction ID: b479e80a6777e106f7878ac1f0026a9683ef652c1e222496273985930c49667d
                                                                    • Opcode Fuzzy Hash: aa46b38d3d2da981634dc1134059f6b8d792ab0e651ffe838b9934d2f8ba0a10
                                                                    • Instruction Fuzzy Hash: 9A113AB1E04208EFCB04DF99D951BEEBBF4FB48710F20826AE415A3380D7755A40CBA9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __EH_prolog3.LIBCMT ref: 004EE3CC
                                                                    • Concurrency::critical_section::critical_section.LIBCONCRT ref: 004EE401
                                                                    • Concurrency::details::stl_critical_section_vista::stl_critical_section_vista.LIBCPMT ref: 004EE433
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Concurrency::critical_section::critical_sectionConcurrency::details::stl_critical_section_vista::stl_critical_section_vistaH_prolog3
                                                                    • String ID: MN
                                                                    • API String ID: 1288270742-3864018884
                                                                    • Opcode ID: eefc4f0a40cd6eb848c0244c011d2f1a7f1064d56cef820aeaa2296de811318a
                                                                    • Instruction ID: 55af42cf1d4ca850c82061830b6d0f82d5044295be8b59d1b012385890ddd896
                                                                    • Opcode Fuzzy Hash: eefc4f0a40cd6eb848c0244c011d2f1a7f1064d56cef820aeaa2296de811318a
                                                                    • Instruction Fuzzy Hash: 63F031343012868BDB289F53E56AB7E3762EF44306B14506EE902CB792D738D841D75A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: __alldvrm$_strrchr
                                                                    • String ID:
                                                                    • API String ID: 1036877536-0
                                                                    • Opcode ID: 9f978e63e2ed2404ce51fdebf7a5a6fef1c7826b8877976665664424d9d1d3f8
                                                                    • Instruction ID: 42f697ca7322107ba05e0c67698239a8c6b1a85f5078c7ac40b9d0750d8da054
                                                                    • Opcode Fuzzy Hash: 9f978e63e2ed2404ce51fdebf7a5a6fef1c7826b8877976665664424d9d1d3f8
                                                                    • Instruction Fuzzy Hash: FAA13432A842869FEB2D8F58C8917EFBBE6EF52310F1441ADE5959F3C1C6348982C750
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0048EC70: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048EC7A
                                                                    • allocator.LIBCONCRTD ref: 004D3095
                                                                    • allocator.LIBCONCRTD ref: 004D30ED
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: allocator$Base::Concurrency::details::ContextIdentityQueueWork
                                                                    • String ID:
                                                                    • API String ID: 50617054-0
                                                                    • Opcode ID: ac2bd51a77ad33575bc978ea88b1dbac7d38fb5f02c54ea3877ee8c7a71c881f
                                                                    • Instruction ID: 4d3242f0545cfbd290266e5591f9ffef00dd2e390932c415df4d9b95c2e90da9
                                                                    • Opcode Fuzzy Hash: ac2bd51a77ad33575bc978ea88b1dbac7d38fb5f02c54ea3877ee8c7a71c881f
                                                                    • Instruction Fuzzy Hash: E3B14D71D041499FCB04EFE9C8A19EFBBB5AF48304F14411EF506A7341DB34AA45CBA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0048EC70: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048EC7A
                                                                    • allocator.LIBCONCRTD ref: 0049F715
                                                                    • allocator.LIBCONCRTD ref: 0049F76D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: allocator$Base::Concurrency::details::ContextIdentityQueueWork
                                                                    • String ID:
                                                                    • API String ID: 50617054-0
                                                                    • Opcode ID: 02b0beff676268d71fdd1b1515895567cd1e59076abb71ad197a7a306ee55044
                                                                    • Instruction ID: 4bb23ef8b68c1dcc40da8e456de2ebd1026f47fdaaec645fa2b226e1e520b913
                                                                    • Opcode Fuzzy Hash: 02b0beff676268d71fdd1b1515895567cd1e59076abb71ad197a7a306ee55044
                                                                    • Instruction Fuzzy Hash: 34B14CB1D04149AFCF04EFE9D891AEFBBB5AF89304F14402EF506A7251DB34A945CBA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 0048EC70: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 0048EC7A
                                                                    • allocator.LIBCONCRTD ref: 0049FF75
                                                                    • allocator.LIBCONCRTD ref: 0049FFCD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: allocator$Base::Concurrency::details::ContextIdentityQueueWork
                                                                    • String ID:
                                                                    • API String ID: 50617054-0
                                                                    • Opcode ID: 03633247de61aefa434aee28a846e843ec2e584e987d3ba601203c01132c2d04
                                                                    • Instruction ID: b13771d7c2f57663ce23d484fa39c58b3afc1a439a0729d9ec48f007380361cd
                                                                    • Opcode Fuzzy Hash: 03633247de61aefa434aee28a846e843ec2e584e987d3ba601203c01132c2d04
                                                                    • Instruction Fuzzy Hash: F7B16DB1E041499FCF04EFE9D891AEFBBB5AF59304F14802EF506A7241DB34A945CBA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • char_traits.LIBCPMTD ref: 0049ABF3
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0049AC34
                                                                    • char_traits.LIBCPMTD ref: 0049ACCB
                                                                    • std::ios_base::width.LIBCPMTD ref: 0049ACF8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: char_traits$Container_base12Container_base12::~_std::_std::ios_base::width
                                                                    • String ID:
                                                                    • API String ID: 1883241956-0
                                                                    • Opcode ID: 617751d1cb763d52590f839dffce35639a399bc14f5c4b337e86917a93e57311
                                                                    • Instruction ID: 25a08ea4312d28cf6c6d20320251b7a79cc49201e1681473deaa93bc5bc2cf7f
                                                                    • Opcode Fuzzy Hash: 617751d1cb763d52590f839dffce35639a399bc14f5c4b337e86917a93e57311
                                                                    • Instruction Fuzzy Hash: 35A10B74900209DFCF04DF95C495AAEBBB2FF48308F24852EE506AB351D738AA41CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetFileType.KERNEL32(00000000,00000000,00000000,0041209E), ref: 005F521B
                                                                      • Part of subcall function 005F58C9: __dosmaperr.LIBCMT ref: 005F590C
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,005F4FA0,00000000,000000FF), ref: 005F532C
                                                                    • __dosmaperr.LIBCMT ref: 005F5333
                                                                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 005F5370
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: __dosmaperr$ErrorFileLastNamedPeekPipeType
                                                                    • String ID:
                                                                    • API String ID: 3955570002-0
                                                                    • Opcode ID: abb2662e5079a3fa44418b95ed1b0ea5c1d838736bbb94138b6ebb27754aa284
                                                                    • Instruction ID: d8ec7f42854718fcb4ced93fac24244c96da618cedc32d4296f3d60f05a81bf5
                                                                    • Opcode Fuzzy Hash: abb2662e5079a3fa44418b95ed1b0ea5c1d838736bbb94138b6ebb27754aa284
                                                                    • Instruction Fuzzy Hash: D051CC72900A0DAFDB149FB8DC459BEBBF9FF48354B14492AE652D32A0F77498058B60
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: 01031f8639864e843e091878342ed267cd0dee627c37d7da8320e8325b450ef7
                                                                    • Instruction ID: cf7151c524125845c9dd5d51e1617cea93bced4a533e16cfab3d6028e5722f28
                                                                    • Opcode Fuzzy Hash: 01031f8639864e843e091878342ed267cd0dee627c37d7da8320e8325b450ef7
                                                                    • Instruction Fuzzy Hash: 254119B1680116ABDB3C6AB98C8ABBF3EA7FF81370F140115F624962D2DF34C8418661
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::ios_base::clear.LIBCPMTD ref: 0048FF58
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0048FF96
                                                                    • _swprintf_s.LIBCONCRTD ref: 0048FF9C
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0048FFAE
                                                                      • Part of subcall function 00493DA0: std::ios_base::getloc.LIBCPMTD ref: 00493ED7
                                                                      • Part of subcall function 00493DA0: ctype.LIBCPMTD ref: 00493F43
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_$_swprintf_sctypestd::ios_base::clearstd::ios_base::getloc
                                                                    • String ID:
                                                                    • API String ID: 1526239729-0
                                                                    • Opcode ID: 8515eacbd98bd4943f0069db3cab34435c8d369be01fa2c1ddd5a4e22a421255
                                                                    • Instruction ID: 329df0cfe4ec5d1439c98e00412fe59a312f0001622c46b77ad51ec00976a035
                                                                    • Opcode Fuzzy Hash: 8515eacbd98bd4943f0069db3cab34435c8d369be01fa2c1ddd5a4e22a421255
                                                                    • Instruction Fuzzy Hash: 75517AB1D1020C9FCB04EFA5DC91AEEBBB5BF48304F00852EF815A7291EB389949CB54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::ios_base::clear.LIBCPMTD ref: 00490127
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00490165
                                                                    • _swprintf_s.LIBCONCRTD ref: 0049016B
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0049017D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_std::_$_swprintf_sstd::ios_base::clear
                                                                    • String ID:
                                                                    • API String ID: 142669532-0
                                                                    • Opcode ID: 5292096840fa7f79a6c9ede5456f9ad7573a20fd2ceae47335115d6822109f01
                                                                    • Instruction ID: 58a92e9128bd0cf7a1b9361ee984091abb25a35578e8b2256e48176557ca530f
                                                                    • Opcode Fuzzy Hash: 5292096840fa7f79a6c9ede5456f9ad7573a20fd2ceae47335115d6822109f01
                                                                    • Instruction Fuzzy Hash: 425149B1D1024C9FCF09EFA5E892BAEBBB5BF48704F00852EF415A7281DB389945CB54
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3ee5b07c61d09d264f9efa2c514d4482e439b0fb44a2bb762089531548ab87e8
                                                                    • Instruction ID: 51e912ce95e9bc7d2d993eb381e24add09356593b2a0602246cf9b83607e03ff
                                                                    • Opcode Fuzzy Hash: 3ee5b07c61d09d264f9efa2c514d4482e439b0fb44a2bb762089531548ab87e8
                                                                    • Instruction Fuzzy Hash: 7041F87260474DBFE7249F78C849B6A7FA9FB88714F20852EF251DB281D2759901C780
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(004D41D4,00000000,?,00000008,00000000,00000000,?,?,?,004D41D4,00000001,00000008,?,00000001,?,00000000), ref: 00603535
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 006035BE
                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 006035D0
                                                                    • __freea.LIBCMT ref: 006035D9
                                                                      • Part of subcall function 005F6A05: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 005F6A37
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                    • String ID:
                                                                    • API String ID: 2652629310-0
                                                                    • Opcode ID: da336b199e93fa9b9eb8921ef75842f4a89ce29486ed1a79bcc8d2916ad7a734
                                                                    • Instruction ID: bc974f756e26655ca71d4b5014284af46a28eda6ede78d6f7ced8e79e4d625d8
                                                                    • Opcode Fuzzy Hash: da336b199e93fa9b9eb8921ef75842f4a89ce29486ed1a79bcc8d2916ad7a734
                                                                    • Instruction Fuzzy Hash: 9E31C271A0021AABDB2A9F65DC45DEF7BAAEB40711F144129FC04D72A0EB35CE54C7A0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: fpos
                                                                    • String ID:
                                                                    • API String ID: 1083263101-0
                                                                    • Opcode ID: dc43ca7aede05e8c7f9b49eba310e603c54447ba9ff9e3d6fba2355f5124d7c2
                                                                    • Instruction ID: 67fc2d9a28407c5b092e6baac2897865ff727a945e1b36abe0add84dee2e326d
                                                                    • Opcode Fuzzy Hash: dc43ca7aede05e8c7f9b49eba310e603c54447ba9ff9e3d6fba2355f5124d7c2
                                                                    • Instruction Fuzzy Hash: 23311B71A00109EFDB08EF99C991DEEB7B5BF88700F148599F9059B355E734AE40CBA4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004C80CB
                                                                    • char_traits.LIBCPMTD ref: 004C80EC
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004C8116
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWork$char_traits
                                                                    • String ID:
                                                                    • API String ID: 1941806930-0
                                                                    • Opcode ID: 52a88e34d22d531078fdfeb2298424ab19981939e7008a250bfeb80beb6c6e22
                                                                    • Instruction ID: bfa30a18039625a13b25d8362a2838bf4241746f8a3b04488869508593465424
                                                                    • Opcode Fuzzy Hash: 52a88e34d22d531078fdfeb2298424ab19981939e7008a250bfeb80beb6c6e22
                                                                    • Instruction Fuzzy Hash: 5F313A34A00109EFCB14DFA5C991DAE77B2BF84344F60856EE4166B355DF38AE01DB88
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: char_traits
                                                                    • String ID:
                                                                    • API String ID: 1158913984-0
                                                                    • Opcode ID: ce06b6ff01f15d8564c4daded3151b3bda2f1d191a18ca130900d28e9890a72d
                                                                    • Instruction ID: 5dcf68b1d5911712c96d6aa72c23eb1fddf003c3a3eea638eaabb6ae6bd2550f
                                                                    • Opcode Fuzzy Hash: ce06b6ff01f15d8564c4daded3151b3bda2f1d191a18ca130900d28e9890a72d
                                                                    • Instruction Fuzzy Hash: 8421DDB6C0110966CF04FBA2DC528FF7B74AE54308F0486BFF40A5B282FA3897058795
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • FileTimeToSystemTime.KERNEL32(00000000,005F4FA0,005F529E,005F4FA0,00000000,00000000,0041209E,?,?,00000000), ref: 005F557B
                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 005F558F
                                                                    • GetLastError.KERNEL32 ref: 005F55D3
                                                                    • __dosmaperr.LIBCMT ref: 005F55DA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Time$System$ErrorFileLastLocalSpecific__dosmaperr
                                                                    • String ID:
                                                                    • API String ID: 593088924-0
                                                                    • Opcode ID: 9b28d34d3c155d9272d15c94a88e4ce62eaee01dcb3d79d4f3c63fc371d6d90e
                                                                    • Instruction ID: 4ee4420f4a6d062a6fa169e3d2d712447943b2e1805cb85ca5d18b1c97529132
                                                                    • Opcode Fuzzy Hash: 9b28d34d3c155d9272d15c94a88e4ce62eaee01dcb3d79d4f3c63fc371d6d90e
                                                                    • Instruction Fuzzy Hash: 01111C7290410DABCF10DFE1D988AEF7BBDBF48320F505666F615D6090EB34EA448B61
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Time__aulldiv$FileSystem__aullrem
                                                                    • String ID:
                                                                    • API String ID: 1233763301-0
                                                                    • Opcode ID: 97a4219393c559a0b9e5870ec59ef34cc0271fad6d8c1433b0bdc4ba969f858f
                                                                    • Instruction ID: b49f506b2f39d9b9e6b13d07ee21b7074d418fa0765be3ba6de4988847385663
                                                                    • Opcode Fuzzy Hash: 97a4219393c559a0b9e5870ec59ef34cc0271fad6d8c1433b0bdc4ba969f858f
                                                                    • Instruction Fuzzy Hash: CAF0E976A443057BD720AEA16C8AF977FACFFC5B25F054829F904B7241D274E0048676
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    • [%s]:%d, xrefs: 00457DB1
                                                                    • Unable to allocate memory for base64-encoded key, xrefs: 00457D89
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Unable to allocate memory for base64-encoded key$[%s]:%d
                                                                    • API String ID: 0-1652693923
                                                                    • Opcode ID: dfb799c3cb6ac92a35e989766f2aa05f97b96026c6eda35c23d5358fa2695d57
                                                                    • Instruction ID: c67e9d23ca23835ea5d67f3bfd2d2f1bb9d2b603add1ec993bf4456fef4c3b84
                                                                    • Opcode Fuzzy Hash: dfb799c3cb6ac92a35e989766f2aa05f97b96026c6eda35c23d5358fa2695d57
                                                                    • Instruction Fuzzy Hash: 4691C57250C3414BC721CF24E891ABBB7E6AF95315F04496EEC9987342E73AD90CC79A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • ___from_strstr_to_strchr.LIBCMT ref: 00469D5C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ___from_strstr_to_strchr
                                                                    • String ID: nl$nl
                                                                    • API String ID: 601868998-2445265424
                                                                    • Opcode ID: 082b10cf058606ccb2d9c59c1218f615805107d3dcf5e26e2d81d4e2920f2996
                                                                    • Instruction ID: 559f585c838dc5cdcea0eb937d88c5e68b47df957e4c601e9e3c6f727fb81462
                                                                    • Opcode Fuzzy Hash: 082b10cf058606ccb2d9c59c1218f615805107d3dcf5e26e2d81d4e2920f2996
                                                                    • Instruction Fuzzy Hash: C341E4766042119FC720CE28D840A6B77D9EF897A4F08062AF94497391F7BAEC05C7D6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • libssh2_session_last_errno.SECURITEINFO.COM.PROGRAM.UNWANTED.5531.23089.22779(?,?,?,?,?,0045B141,?,?), ref: 0045B0B7
                                                                    Strings
                                                                    • direct-tcpip, xrefs: 0045B0A0
                                                                    • Unable to allocate memory for direct-tcpip connection, xrefs: 0045B02E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: D.5531.23089libssh2_session_last_errno.
                                                                    • String ID: Unable to allocate memory for direct-tcpip connection$direct-tcpip
                                                                    • API String ID: 1735628876-1888759788
                                                                    • Opcode ID: b7206022bff0110bc414dc9142b9b592f89c23f8b97c253459692f7199da3250
                                                                    • Instruction ID: 27d4ca222e2feb83fee205d0c8eb604ea55cf48659281d67084687f6c3913500
                                                                    • Opcode Fuzzy Hash: b7206022bff0110bc414dc9142b9b592f89c23f8b97c253459692f7199da3250
                                                                    • Instruction Fuzzy Hash: 6231C4B22047006FE320DF35DC85D97B7E9EB85318F144A2EF95A83281EA75E90D8765
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,006078CB,?,00000050,?,?,?,?,?), ref: 0060774B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ACP$OCP
                                                                    • API String ID: 0-711371036
                                                                    • Opcode ID: c1720704bb97cad87ee379d7e5bfe7a786d4538d056da14a7bd9c22fb636d396
                                                                    • Instruction ID: 6e021013deee3c47e45795e157b4971e500d7e3916605ed357a8921cbc67c19f
                                                                    • Opcode Fuzzy Hash: c1720704bb97cad87ee379d7e5bfe7a786d4538d056da14a7bd9c22fb636d396
                                                                    • Instruction Fuzzy Hash: 7221C762E98505A6DB2C9B18C905BE7736BAF50B91F564464E90AD7380F733FD41C3A0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: _strlen_wcslen
                                                                    • String ID: /
                                                                    • API String ID: 2847511282-2043925204
                                                                    • Opcode ID: da8259aa5b4ff36794112ef57a629610e83436c6983049b8854be497f0b764fb
                                                                    • Instruction ID: 1622ba12ec8bce2217d05c5687b4f8899c51e4b9edd9912778b7ab46f7745abe
                                                                    • Opcode Fuzzy Hash: da8259aa5b4ff36794112ef57a629610e83436c6983049b8854be497f0b764fb
                                                                    • Instruction Fuzzy Hash: 4B21297150421DAEDB209F66CC49AFF73ACAB05311F1006AFFB45D3151E778E98487A9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: CountFocusTick
                                                                    • String ID: killfocus
                                                                    • API String ID: 3897604831-1616503811
                                                                    • Opcode ID: b9bcc8584894f9af1c9f4c988c397414cfd2f279b6102186ca76a7daecbb0f25
                                                                    • Instruction ID: 19416c4e04cea3ab6a134ff715c235fa972ae683503b94ba2d045479b7718dc6
                                                                    • Opcode Fuzzy Hash: b9bcc8584894f9af1c9f4c988c397414cfd2f279b6102186ca76a7daecbb0f25
                                                                    • Instruction Fuzzy Hash: 2C419374A00208EFDB44DF98C995BEDB7F1BB49304F2481A9E408AB351D7756E41DF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __EH_prolog3.LIBCMT ref: 00513A3D
                                                                      • Part of subcall function 0050026D: __EH_prolog3.LIBCMT ref: 00500274
                                                                      • Part of subcall function 0050F370: __EH_prolog3.LIBCMT ref: 0050F377
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID: ?<Q$C!^
                                                                    • API String ID: 431132790-3897313672
                                                                    • Opcode ID: 2b9755cccb92f47a1d44fc7ffa0450f74c20bf5e15a5022f47f198a96f8ca704
                                                                    • Instruction ID: 11fd81006dc7c33085b96048880523d1ecc866dcd0a3319bc7f121b7cf045908
                                                                    • Opcode Fuzzy Hash: 2b9755cccb92f47a1d44fc7ffa0450f74c20bf5e15a5022f47f198a96f8ca704
                                                                    • Instruction Fuzzy Hash: 60415AB0A05B87AED308DFB9C489BE9FBA5BF44304F00435DE16857282DB742624CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetProcAddress.KERNEL32(00000000,005EB47E), ref: 005FF38C
                                                                    • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005FF399
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc__crt_fast_encode_pointer
                                                                    • String ID: +_
                                                                    • API String ID: 2279764990-2050882381
                                                                    • Opcode ID: e859a6f37755bb60108f8c6c45bb6f6462f3c7fe651985e0ab84f56c37bff3d8
                                                                    • Instruction ID: d784c0260cc6fb472d4b0db603f687408b7e0264d3270cfd16e57e85196ebdbd
                                                                    • Opcode Fuzzy Hash: e859a6f37755bb60108f8c6c45bb6f6462f3c7fe651985e0ab84f56c37bff3d8
                                                                    • Instruction Fuzzy Hash: EC11E333A002299B9B219E29EC50DBE7B96BF847247264A35FE25EB6D4D634DC0087D0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 004A4ED0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4F04
                                                                      • Part of subcall function 004A4ED0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4F42
                                                                      • Part of subcall function 004A4ED0: construct.LIBCPMTD ref: 004A4F49
                                                                      • Part of subcall function 004A4ED0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4F76
                                                                      • Part of subcall function 004A4ED0: construct.LIBCPMTD ref: 004A4F7D
                                                                      • Part of subcall function 004A4ED0: Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A4FAA
                                                                      • Part of subcall function 004A4ED0: construct.LIBCPMTD ref: 004A4FB1
                                                                    • Concurrency::details::ContextBase::GetWorkQueueIdentity.LIBCMTD ref: 004A173B
                                                                    • construct.LIBCPMTD ref: 004A1742
                                                                      • Part of subcall function 004A5200: construct.LIBCPMTD ref: 004A521C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Base::Concurrency::details::ContextIdentityQueueWorkconstruct
                                                                    • String ID: ~I
                                                                    • API String ID: 3904939386-2662688817
                                                                    • Opcode ID: 7417bccbced4f4fd2f30b5c7a98b04f35c73bf1b9667d633e01af9fdb22f3758
                                                                    • Instruction ID: cd42ec5aef2e543a8d8acbb6b3bb651986b41d6f6f3ce62e744bf35ed752b103
                                                                    • Opcode Fuzzy Hash: 7417bccbced4f4fd2f30b5c7a98b04f35c73bf1b9667d633e01af9fdb22f3758
                                                                    • Instruction Fuzzy Hash: 8411BBF5D002499FDB00EFA5D942BAFBBB8EB55314F10453EF415A7381D6396A00C7A6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Cnd_initstd::_
                                                                    • String ID: TRUE$true
                                                                    • API String ID: 1955959516-406173685
                                                                    • Opcode ID: 6252b2afdd1d280b46ea7ac87d355ba8358f457533abd058119118b2bb30c263
                                                                    • Instruction ID: 525eb5e2a36b9573d9f051185e6bb3958c968f99acdf97f0f66aca140e149aef
                                                                    • Opcode Fuzzy Hash: 6252b2afdd1d280b46ea7ac87d355ba8358f457533abd058119118b2bb30c263
                                                                    • Instruction Fuzzy Hash: 8B11E9B5C00209ABCF00EF50E841BEE7B78AB05704F50856EF80566381F778C7098BE5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 005FEDCA: GetLastError.KERNEL32(?,?,00000000,005EB47E,005F2B0D,00000000), ref: 005FEDCF
                                                                      • Part of subcall function 005FEDCA: _free.LIBCMT ref: 005FEE04
                                                                      • Part of subcall function 005FEDCA: SetLastError.KERNEL32(00000000,005EB47E,005F2B0D,00000000), ref: 005FEE38
                                                                    • _free.LIBCMT ref: 005F816D
                                                                    Strings
                                                                    • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 005F814B, 005F817C
                                                                    • Operation not permitted, xrefs: 005F8153
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast_free
                                                                    • String ID: Operation not permitted$Visual C++ CRT: Not enough memory to complete call to strerror.
                                                                    • API String ID: 2283115069-3972167996
                                                                    • Opcode ID: b67b56f021aa3843943ad5119177b5a9e7a04b9571a6eed62e4efa2e7ccd7926
                                                                    • Instruction ID: df6ce73f5e486df2d7d2dcf3f21620bf62b30db72ff4270e1af9f3f838ccb1bf
                                                                    • Opcode Fuzzy Hash: b67b56f021aa3843943ad5119177b5a9e7a04b9571a6eed62e4efa2e7ccd7926
                                                                    • Instruction Fuzzy Hash: 1101A222940B1D67D63126694C8AE377A6EBBC07A4F150624FB45AB641DF6ADC038190
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 00484C71
                                                                      • Part of subcall function 0048A4C0: _Ptr_base.LIBCMTD ref: 0048A4E9
                                                                      • Part of subcall function 00482DF0: Concurrency::details::ExternalContextBase::~ExternalContextBase.LIBCONCRTD ref: 00482E0E
                                                                      • Part of subcall function 00480AB0: std::bad_exception::~bad_exception.LIBCMTD ref: 00480AC8
                                                                    • boost::exception::~exception.LIBCPMTD ref: 00484CC4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ContextExternal$BaseBase::~Concurrency::details::Container_base12Container_base12::~_Ptr_baseboost::exception::~exceptionstd::_std::bad_exception::~bad_exception
                                                                    • String ID: H
                                                                    • API String ID: 2993533300-1725543860
                                                                    • Opcode ID: 6296953f71d06e6f71f66837b22cfb69ed1947ecf75e309640e00b892dd2266c
                                                                    • Instruction ID: 708898b07d3a574893efabf82126f69c14b37def987df99e74a0e87d5276fd17
                                                                    • Opcode Fuzzy Hash: 6296953f71d06e6f71f66837b22cfb69ed1947ecf75e309640e00b892dd2266c
                                                                    • Instruction Fuzzy Hash: FF111FB49041599FCB08EF99DCA1ABFB776FF44708F04091EE41267382CB786810CB99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __EH_prolog3.LIBCMT ref: 004F694B
                                                                      • Part of subcall function 0050026D: __EH_prolog3.LIBCMT ref: 00500274
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID: C!^$nkO
                                                                    • API String ID: 431132790-2922325901
                                                                    • Opcode ID: 91a693c2a2726dd2cab8bad952e52c44a957099a60dc949ef450a238a4c464f8
                                                                    • Instruction ID: d3f099fdcdfd3e5ba85e115bb5c527bb9485d78835f63a2dc6e14759633d9bcc
                                                                    • Opcode Fuzzy Hash: 91a693c2a2726dd2cab8bad952e52c44a957099a60dc949ef450a238a4c464f8
                                                                    • Instruction Fuzzy Hash: 562107F0405B868EC320DFB5C1497DAFAE5BF54308F44085DD6EA57282DBB82648CB29
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Smanip
                                                                    • String ID: *NH$TH
                                                                    • API String ID: 2140389272-2732294657
                                                                    • Opcode ID: 794c9f094d4f7ad4b11e067573b646fef031d6d6005246cb5dbf46b8518f7e2f
                                                                    • Instruction ID: 3903e69df19fe5f237a493b42fafaf7eb23c0db73c86d5e870490ac557a7e801
                                                                    • Opcode Fuzzy Hash: 794c9f094d4f7ad4b11e067573b646fef031d6d6005246cb5dbf46b8518f7e2f
                                                                    • Instruction Fuzzy Hash: 0A110CB2D14108ABCB09EF94E845FEEB7B8FF48714F10462EF426A7291DB346905CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 005FED46: GetLastError.KERNEL32(?,004D41D4,005E66AE,004D41D4,?,?,005F2B48,004D41D4,?,00000000), ref: 005FED4A
                                                                      • Part of subcall function 005FED46: _free.LIBCMT ref: 005FED7D
                                                                      • Part of subcall function 005FED46: SetLastError.KERNEL32(00000000,004D41D4,?,00000000), ref: 005FEDBE
                                                                      • Part of subcall function 005FED46: _abort.LIBCMT ref: 005FEDC4
                                                                    • _abort.LIBCMT ref: 006059C3
                                                                    • _free.LIBCMT ref: 006059F7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast_abort_free
                                                                    • String ID: hwl
                                                                    • API String ID: 289325740-2650767816
                                                                    • Opcode ID: 518762ed712fb3c7430ce5a195721e04e395476791b51a13d58c01c26c1dfff8
                                                                    • Instruction ID: 69662c19b0824f01d44a504c0c7f2bfbcc4aa8728a7a4d2647c0637fe7276f52
                                                                    • Opcode Fuzzy Hash: 518762ed712fb3c7430ce5a195721e04e395476791b51a13d58c01c26c1dfff8
                                                                    • Instruction Fuzzy Hash: 1601C031D81F26DBC728AF698941AAFBB62BF44B20B05420AF962673C1D7342D41CFD1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 004CCF59
                                                                    • shared_ptr.LIBCPMTD ref: 004CCF78
                                                                      • Part of subcall function 0048A500: std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 0048A529
                                                                      • Part of subcall function 0048A500: _Reset.LIBCMTD ref: 0048A535
                                                                      • Part of subcall function 00482DB0: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 00482DBA
                                                                      • Part of subcall function 004CF6B0: _DebugHeapAllocator.LIBCPMTD ref: 004CF6C0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ProcessorVirtual$Concurrency::RootRoot::$AllocatorDebugHeapIterator_baseIterator_base::_Resetshared_ptrstd::_
                                                                    • String ID: H
                                                                    • API String ID: 1622751682-1725543860
                                                                    • Opcode ID: 073a300e24fe4f4fe6ddc48e4ec649ee8ff22c018b4412c6b413948bc48d7427
                                                                    • Instruction ID: 0e79fb765fe90f3641a0178f868cae2ac1b85313b05689049c0077ea26b7ba2d
                                                                    • Opcode Fuzzy Hash: 073a300e24fe4f4fe6ddc48e4ec649ee8ff22c018b4412c6b413948bc48d7427
                                                                    • Instruction Fuzzy Hash: 091121B1904149EFCB04EF98CD51BAEBBB5FF05318F14466DE42267381CB795900CB69
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 004F9E68
                                                                    • RegisterClassExW.USER32(00000030), ref: 004F9E8A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ClassCursorLoadRegister
                                                                    • String ID: 0
                                                                    • API String ID: 1693014935-4108050209
                                                                    • Opcode ID: f91465869ead92eba969a60b62ab0d20169e431c6999676fbe4347981db18051
                                                                    • Instruction ID: 1a3d05505ca275a2c825900bab9704296a54ad82a1b92ff8d727177b58e29b96
                                                                    • Opcode Fuzzy Hash: f91465869ead92eba969a60b62ab0d20169e431c6999676fbe4347981db18051
                                                                    • Instruction Fuzzy Hash: 0F0129B0C01208ABDB01DFA9E945BEEFBF9BB85300F04515BE904A7350D7B51645CFA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 005F2554: RtlEnterCriticalSection.NTDLL(004586FA), ref: 005F256F
                                                                    • FlushFileBuffers.KERNEL32(00000000,006BA130,0000000C,00600B60,?,?,?,?,?,00000000,?,00000000,?,00000000,?,00000000), ref: 00600AED
                                                                    • GetLastError.KERNEL32(?,00000000,?,00000000,?,00000000,?,?,?,?,?,?,?,tPHK,?,00000001), ref: 00600AFE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                                                                    • String ID: tPHK
                                                                    • API String ID: 4109680722-798176179
                                                                    • Opcode ID: 7e65e390e42132323f528854272f808f80243bf771c99cd69d9837c31c0fa453
                                                                    • Instruction ID: 7cd79e889f0d1025b95fca233f01e297a80d25f5dec44b1a9ed9d2e3406d0c68
                                                                    • Opcode Fuzzy Hash: 7e65e390e42132323f528854272f808f80243bf771c99cd69d9837c31c0fa453
                                                                    • Instruction Fuzzy Hash: A501A771A102069FE714BFB8C94DA9E7FA6BF49724F14420AF4509B3E2D7749D41CB50
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Func_class
                                                                    • String ID: 'I$'I
                                                                    • API String ID: 1670654298-4175295586
                                                                    • Opcode ID: 7d0dca64477acb2c2bc90c76a08b1c5a3a0889bdc15a174b044a43607335d2c7
                                                                    • Instruction ID: ff947df20d8d73c7190fc943c0c1f0e85c8048f9278898020bd143fe406bb4e9
                                                                    • Opcode Fuzzy Hash: 7d0dca64477acb2c2bc90c76a08b1c5a3a0889bdc15a174b044a43607335d2c7
                                                                    • Instruction Fuzzy Hash: B7E0C075D0010CABCB04EF99D95199E77B99F88304F108169B909A7251DA34AE1197A5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • __EH_prolog3.LIBCMT ref: 005159E2
                                                                      • Part of subcall function 0050F201: __EH_prolog3.LIBCMT ref: 0050F208
                                                                      • Part of subcall function 0050F201: new.LIBCMT ref: 0050F272
                                                                      • Part of subcall function 0050F201: new.LIBCMT ref: 0050F29E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: H_prolog3
                                                                    • String ID: [Q$C!^
                                                                    • API String ID: 431132790-132578463
                                                                    • Opcode ID: 21bb03051a0e9deba59f6feef969db58f7d11dbe5dc24409601e6caf12720fc8
                                                                    • Instruction ID: f6a7cf85280a29bb97a6a260a2e7c72381392c262ef6af286ab62cfd5bbc1f5b
                                                                    • Opcode Fuzzy Hash: 21bb03051a0e9deba59f6feef969db58f7d11dbe5dc24409601e6caf12720fc8
                                                                    • Instruction Fuzzy Hash: 20F03AB0641B13DED3649FB4C45869EBEE1BF84304F800A2DE05E9B242CBB01445CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetEnvironmentVariableA.KERNEL32(004CBF56,user-PC,00000032,?,?,004CBF56), ref: 004CBF26
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentVariable
                                                                    • String ID: 2$user-PC
                                                                    • API String ID: 1431749950-1756956206
                                                                    • Opcode ID: 593f878aebd0fe8258ef80dedbcc0d16b040f7146b3373932656e8f1535469ac
                                                                    • Instruction ID: 2fbc54687cd9fced6e3ca2eaaeaebe891d10233a06a84dc34ffe06f231f91dfc
                                                                    • Opcode Fuzzy Hash: 593f878aebd0fe8258ef80dedbcc0d16b040f7146b3373932656e8f1535469ac
                                                                    • Instruction Fuzzy Hash: 2AD05E306543086BCB988F699C0AF6636DDD705784F50C16D7908DB341D664C9008BA5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::system_error::system_error.LIBCPMT ref: 004EE12B
                                                                      • Part of subcall function 004EE08F: __EH_prolog3_GS.LIBCMT ref: 004EE096
                                                                      • Part of subcall function 004EE08F: std::_System_error::_System_error.LIBCPMTD0 ref: 004EE0BC
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004EE139
                                                                      • Part of subcall function 005E24F3: RaiseException.KERNEL32(?,?,?,004EDAA7,?,?,?,?,?,?,?,?,004EDAA7,?,006B5B28), ref: 005E2552
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionException@8H_prolog3_RaiseSystem_errorSystem_error::_Throwstd::_std::system_error::system_error
                                                                    • String ID: h\k
                                                                    • API String ID: 2532468404-3138971037
                                                                    • Opcode ID: 8bf89e9d29a01ac6ae30ed43239d9b8a71f7312c50c2f21dc80b443939cddc9e
                                                                    • Instruction ID: 40f55365638ca99bac0d1555b74be4998aa7b3cbe8effcbf91253fb6477528cc
                                                                    • Opcode Fuzzy Hash: 8bf89e9d29a01ac6ae30ed43239d9b8a71f7312c50c2f21dc80b443939cddc9e
                                                                    • Instruction Fuzzy Hash: 44D05E744042AA6BCF04FBA6DC17CFF7B2EAF04305F850016B581730A6D664AA0587B6
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::_Container_base12::~_Container_base12.LIBCPMTD ref: 0048AC86
                                                                    • boost::exception::~exception.LIBCPMTD ref: 0048AC8E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: Container_base12Container_base12::~_boost::exception::~exceptionstd::_
                                                                    • String ID: H
                                                                    • API String ID: 527083134-1725543860
                                                                    • Opcode ID: f30c75d6b4d4a6fd43db3fe787472b1366001fb801f33e372626c41b3cfccd44
                                                                    • Instruction ID: 0b13b882c27badd6d930f5fdc5404cc3133a49abce84ff160497fc56b3915f2d
                                                                    • Opcode Fuzzy Hash: f30c75d6b4d4a6fd43db3fe787472b1366001fb801f33e372626c41b3cfccd44
                                                                    • Instruction Fuzzy Hash: 7AD05E3091410CEB8704EF89D91145EB7B59B01308B1000DEE8056B301CA302E109B99
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • std::invalid_argument::invalid_argument.LIBCONCRT ref: 004EDAF1
                                                                      • Part of subcall function 004EDA3D: std::exception::exception.LIBCONCRTD ref: 004EDA4A
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004EDAFF
                                                                      • Part of subcall function 005E24F3: RaiseException.KERNEL32(?,?,?,004EDAA7,?,?,?,?,?,?,?,?,004EDAA7,?,006B5B28), ref: 005E2552
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                                                    • String ID: bad function call
                                                                    • API String ID: 1586462112-3612616537
                                                                    • Opcode ID: c3ca52efd5e35bd9afc52dba903e8bc22f16e1d014917f7d9be7116f46c9cb90
                                                                    • Instruction ID: f084329c6fdd49293d5518a6e45b21629d1fe51208a1633d82400d7c5b98d2c1
                                                                    • Opcode Fuzzy Hash: c3ca52efd5e35bd9afc52dba903e8bc22f16e1d014917f7d9be7116f46c9cb90
                                                                    • Instruction Fuzzy Hash: 61C0127CC0424C77CF04FBA5C866CCC7B2D6B40300F805465762096085D67496598691
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00502CE1,00000000,?,00502ECF), ref: 00504E21
                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,?,00502CE1,00000000,?,00502ECF,?,00000000,?,?,?), ref: 00504E45
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00502CE1,00000000,?,00502ECF), ref: 00504E66
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00502CE1,00000000,?,00502ECF,?,00000000,?,?,?), ref: 00504E86
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide
                                                                    • String ID:
                                                                    • API String ID: 626452242-0
                                                                    • Opcode ID: d1a6aff42a6b9bf989533d7e85d486b847a90594336ad66fa701d75fe31af477
                                                                    • Instruction ID: f0c383216ca378d3205e1fe20b72bf6ba9ad8a68ce8d1a8efd549add47111afb
                                                                    • Opcode Fuzzy Hash: d1a6aff42a6b9bf989533d7e85d486b847a90594336ad66fa701d75fe31af477
                                                                    • Instruction Fuzzy Hash: 5B4123B150024ABFDF248F28CC05ABE7F6EFB85320F048256FA558B2C1D771AD518BA1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,00000000,00000000,00000000,00000000,00000000,000000FF,000000FF,00000000,00000000,00000000,00000000), ref: 00602CEC
                                                                    • GetLastError.KERNEL32(?,000000FF), ref: 00602CFA
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,000000FF), ref: 00602D55
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.4484349242.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.4484333741.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006BE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000006D3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484349242.00000000007B5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484960916.00000000007C5000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.4484974869.00000000007C6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1717984340-0
                                                                    • Opcode ID: 397d2b38c3cbe48904d3bce6dfeff9b30fef52467464b4bd125b8e483c203cdc
                                                                    • Instruction ID: 9895f51977fc2577cc7f6def2e47b928c31cb56fc3e1a019651e94d51bf80e59
                                                                    • Opcode Fuzzy Hash: 397d2b38c3cbe48904d3bce6dfeff9b30fef52467464b4bd125b8e483c203cdc
                                                                    • Instruction Fuzzy Hash: C341E631640257EFDF298F65C86CAEB7BABEF42750F144159E8589B2E1DB308D41C7A0
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%