Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1445897
MD5:e154829a16292c782b579d217e0ea8bf
SHA1:5d2fb1535930184e7212b5fb780c638f32a03cee
SHA256:132fe6d8e5c0026b4f9e0de786ccc4a35fc22d86821d230f8d8ea924e825ffbf
Tags:exe
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Snort IDS alert for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • file.exe (PID: 6864 cmdline: "C:\Users\user\Desktop\file.exe" MD5: E154829A16292C782B579D217E0EA8BF)
    • RegAsm.exe (PID: 6032 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["5.42.65.115:40551"], "Bot Id": "LogsDiller Cloud (TG: @logsdillabot)", "Authorization Header": "3a050df92d0cf082b2cdaf87863616be"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000001.00000002.1755940383.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              Process Memory Space: file.exe PID: 6864JoeSecurity_RedLineYara detected RedLine StealerJoe Security
                Click to see the 2 entries
                SourceRuleDescriptionAuthorStrings
                1.2.RegAsm.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.2.file.exe.3e0000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    No Sigma rule has matched
                    Timestamp:05/22/24-18:20:00.737450
                    SID:2046045
                    Source Port:49730
                    Destination Port:40551
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:05/22/24-18:20:00.932379
                    SID:2043234
                    Source Port:40551
                    Destination Port:49730
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:05/22/24-18:20:12.066922
                    SID:2043231
                    Source Port:49730
                    Destination Port:40551
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:05/22/24-18:20:06.193796
                    SID:2046056
                    Source Port:40551
                    Destination Port:49730
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: file.exeAvira: detected
                    Source: 1.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["5.42.65.115:40551"], "Bot Id": "LogsDiller Cloud (TG: @logsdillabot)", "Authorization Header": "3a050df92d0cf082b2cdaf87863616be"}
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: file.exeJoe Sandbox ML: detected
                    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003F4493 FindFirstFileExW,0_2_003F4493

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2046045 ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) 192.168.2.4:49730 -> 5.42.65.115:40551
                    Source: TrafficSnort IDS: 2043231 ET TROJAN Redline Stealer TCP CnC Activity 192.168.2.4:49730 -> 5.42.65.115:40551
                    Source: TrafficSnort IDS: 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response 5.42.65.115:40551 -> 192.168.2.4:49730
                    Source: TrafficSnort IDS: 2046056 ET TROJAN Redline Stealer/MetaStealer Family Activity (Response) 5.42.65.115:40551 -> 192.168.2.4:49730
                    Source: Malware configuration extractorURLs: 5.42.65.115:40551
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 5.42.65.115:40551
                    Source: Joe Sandbox ViewASN Name: RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: unknownTCP traffic detected without corresponding DNS query: 5.42.65.115
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                    Source: RegAsm.exe, 00000001.00000002.1756284252.0000000000CDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adp/1.0//
                    Source: RegAsm.exe, 00000001.00000002.1756284252.0000000000CDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.microsofo/1.2/R
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.00000000030C0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Responsean
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9ResponseD
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: file.exe, 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000001.00000002.1755940383.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabS
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp9897.tmpJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp98C7.tmpJump to dropped file
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003F6AF80_2_003F6AF8
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003F35600_2_003F3560
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00E3DC741_2_00E3DC74
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_064567D81_2_064567D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0645A3D81_2_0645A3D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_06453F501_2_06453F50
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_06456FE81_2_06456FE8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_06456FF81_2_06456FF8
                    Source: C:\Users\user\Desktop\file.exeCode function: String function: 003E51D0 appears 48 times
                    Source: file.exe, 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameChazan.exe8 vs file.exe
                    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: file.exeStatic PE information: Section: .data ZLIB complexity 0.9890492263349514
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/5@0/1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp9897.tmpJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Program Files (x86)\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: esdsip.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: linkinfo.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
                    Source: Google Chrome.lnk.1.drLNK file: ..\..\..\Program Files\Google\Chrome\Application\chrome.exe
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E4964 push ecx; ret 0_2_003E4977
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0645E060 push es; ret 1_2_0645E070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0645ECF2 push eax; ret 1_2_0645ED01
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_06453B4F push dword ptr [esp+ecx*2-75h]; ret 1_2_06453B53
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_064549AB push FFFFFF8Bh; retf 1_2_064549AD

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 BlobJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: DF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2BA0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2900000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 861Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 5014Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6620Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3140Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003F4493 FindFirstFileExW,0_2_003F4493
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RegAsm.exe, 00000001.00000002.1764671889.00000000054C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllii
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E8F06 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003E8F06
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003EC35D mov ecx, dword ptr fs:[00000030h]0_2_003EC35D
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003F560E mov eax, dword ptr fs:[00000030h]0_2_003F560E
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003F7C0D GetProcessHeap,0_2_003F7C0D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E5102 SetUnhandledExceptionFilter,0_2_003E5102
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E5237 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_003E5237
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E8F06 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003E8F06
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E4FA6 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003E4FA6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\file.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00BB018D CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_00BB018D
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 432000Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 84E008Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E4CCC cpuid 0_2_003E4CCC
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_003EF01F
                    Source: C:\Users\user\Desktop\file.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_003F7047
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_003F78DC
                    Source: C:\Users\user\Desktop\file.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_003F79AB
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_003F72E9
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_003F7334
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_003F73CF
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_003F745A
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_003EF545
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_003F76AD
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_003F77D6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003E4EA0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_003E4EA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.3e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1755940383.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6032, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                    Source: Yara matchFile source: 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6032, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.3e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1755940383.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6032, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    411
                    Process Injection
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    LSASS Memory241
                    Security Software Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)241
                    Virtualization/Sandbox Evasion
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
                    Process Injection
                    NTDS241
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Obfuscated Files or Information
                    Cached Domain Credentials2
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Install Root Certificate
                    DCSync134
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    Software Packing
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    DLL Side-Loading
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    file.exe100%AviraHEUR/AGEN.1317026
                    file.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%URL Reputationsafe
                    http://tempuri.org/Entity/Id14ResponseD0%URL Reputationsafe
                    http://tempuri.org/Entity/Id23ResponseD0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%URL Reputationsafe
                    http://tempuri.org/Entity/Id12Response0%URL Reputationsafe
                    http://tempuri.org/0%URL Reputationsafe
                    http://tempuri.org/Entity/Id2Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%URL Reputationsafe
                    http://tempuri.org/Entity/Id21Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%URL Reputationsafe
                    http://tempuri.org/Entity/Id90%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%URL Reputationsafe
                    http://tempuri.org/Entity/Id80%URL Reputationsafe
                    http://tempuri.org/Entity/Id6ResponseD0%URL Reputationsafe
                    http://tempuri.org/Entity/Id50%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%URL Reputationsafe
                    http://tempuri.org/Entity/Id40%URL Reputationsafe
                    http://tempuri.org/Entity/Id70%URL Reputationsafe
                    http://tempuri.org/Entity/Id60%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%URL Reputationsafe
                    http://tempuri.org/Entity/Id13ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%URL Reputationsafe
                    http://tempuri.org/Entity/Id15Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id5ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp90%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%URL Reputationsafe
                    http://tempuri.org/Entity/Id6Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%URL Reputationsafe
                    https://api.ip.sb/ip0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/sc0%URL Reputationsafe
                    http://tempuri.org/Entity/Id1ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%URL Reputationsafe
                    http://tempuri.org/Entity/Id9Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id200%URL Reputationsafe
                    http://tempuri.org/Entity/Id210%URL Reputationsafe
                    http://tempuri.org/Entity/Id220%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%URL Reputationsafe
                    http://tempuri.org/Entity/Id230%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%URL Reputationsafe
                    http://tempuri.org/Entity/Id240%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%URL Reputationsafe
                    http://tempuri.org/Entity/Id24Response0%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    http://tempuri.org/Entity/Id1Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey0%URL Reputationsafe
                    http://tempuri.org/Entity/Id21ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust0%URL Reputationsafe
                    http://tempuri.org/Entity/Id100%URL Reputationsafe
                    http://tempuri.org/Entity/Id110%URL Reputationsafe
                    http://tempuri.org/Entity/Id10ResponseD0%URL Reputationsafe
                    http://tempuri.org/Entity/Id120%URL Reputationsafe
                    http://tempuri.org/Entity/Id16Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel0%URL Reputationsafe
                    http://tempuri.org/Entity/Id130%URL Reputationsafe
                    http://tempuri.org/Entity/Id140%URL Reputationsafe
                    http://tempuri.org/Entity/Id150%URL Reputationsafe
                    http://tempuri.org/Entity/Id160%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce0%URL Reputationsafe
                    http://tempuri.org/Entity/Id170%URL Reputationsafe
                    http://tempuri.org/Entity/Id180%URL Reputationsafe
                    http://tempuri.org/Entity/Id5Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id190%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%URL Reputationsafe
                    http://tempuri.org/Entity/Id15ResponseD0%URL Reputationsafe
                    http://tempuri.org/Entity/Id10Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Renew0%URL Reputationsafe
                    http://tempuri.org/Entity/Id11ResponseD0%URL Reputationsafe
                    http://tempuri.org/Entity/Id8Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.00%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentity0%URL Reputationsafe
                    http://tempuri.org/Entity/Id17ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                    https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                    https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                    http://ns.adp/1.0//0%Avira URL Cloudsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sctRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/chrome_newtabRegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/ac/?q=RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id14ResponseDRegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id23ResponseDRegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id12ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id2ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id21ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id9RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id8RegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id6ResponseDRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id5RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/PrepareRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id4RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id7RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id6RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licenseRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/AbortedRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id13ResponseDRegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/faultRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsatRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id15ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id5ResponseDRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/RenewRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id6ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ip.sb/ipfile.exe, 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000001.00000002.1755940383.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/scRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id1ResponseDRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/CancelRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id9ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id20RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id21RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id22RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id23RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id24RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/IssueRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id24ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.ecosia.org/newtab/RegAsm.exe, 00000001.00000002.1757758189.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002EE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004094000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1759891500.0000000004078000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id1ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReplayRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64BinaryRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id21ResponseDRegAsm.exe, 00000001.00000002.1757758189.0000000002D42000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressingRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ns.adp/1.0//RegAsm.exe, 00000001.00000002.1756284252.0000000000CDE000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/CompletionRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trustRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id10RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id11RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id10ResponseDRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id12RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id16ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/CancelRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id13RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id14RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id15RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id16RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/NonceRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id17RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id18RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id5ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id19RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id15ResponseDRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id10ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RenewRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id11ResponseDRegAsm.exe, 00000001.00000002.1757758189.00000000030C0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id8ResponseRegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0RegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentityRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id17ResponseDRegAsm.exe, 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/soap/envelope/RegAsm.exe, 00000001.00000002.1757758189.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    5.42.65.115
                    unknownRussian Federation
                    39493RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1445897
                    Start date and time:2024-05-22 18:19:12 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 10s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:file.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/5@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 98
                    • Number of non-executed functions: 55
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • VT rate limit hit for: file.exe
                    TimeTypeDescription
                    12:20:08API Interceptor30x Sleep call for process: RegAsm.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    5.42.65.115Pp8XG0Vz4D.exeGet hashmaliciousGCleanerBrowse
                    • 5.42.65.115/advdlc.php
                    mxsujj4FZz.exeGet hashmaliciousGCleaner, RedLineBrowse
                    • 5.42.65.115/advdlc.php
                    UzMahCzo58.exeGet hashmaliciousLummaC, GCleaner, LummaC StealerBrowse
                    • 5.42.65.115/advdlc.php
                    hkXE3abs6j.exeGet hashmaliciousGCleaner, RedLineBrowse
                    • 5.42.65.115/advdlc.php
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRUfile.exeGet hashmaliciousRedLineBrowse
                    • 5.42.65.115
                    2T6MGxlKZT.exeGet hashmaliciousSmokeLoaderBrowse
                    • 5.42.96.170
                    file.exeGet hashmaliciousUnknownBrowse
                    • 5.42.66.10
                    http://0nline.jjwconstructlon.comGet hashmaliciousHTMLPhisherBrowse
                    • 5.42.65.53
                    file.exeGet hashmaliciousRedLineBrowse
                    • 5.42.65.85
                    https://url12.mailanyone.net/scanner?m=1s9PCz-0000cD-4j&d=4%7Cmail%2F90%2F1716296400%2F1s9PCz-0000cD-4j%7Cin12g%7C57e1b682%7C11949542%7C14589158%7C664C9C811D87B03FE2E6472997A0C22E&o=%2Fphtl%3A%2Fatsnhtaageeteoilogt.rgsigc%2Faz.&s=1YKQiaLIfHH0tTbjCAvEAnTGAIUGet hashmaliciousHTMLPhisherBrowse
                    • 5.42.65.53
                    https://url12.mailanyone.net/scanner?m=1s9PCz-0000cD-4j&d=4%7Cmail%2F90%2F1716296400%2F1s9PCz-0000cD-4j%7Cin12g%7C57e1b682%7C11949542%7C14589158%7C664C9C811D87B03FE2E6472997A0C22E&o=%2Fphtl%3A%2Fatsnhtaageeteoilogt.rgsigc%2Faz.&s=1YKQiaLIfHH0tTbjCAvEAnTGAIUGet hashmaliciousHTMLPhisherBrowse
                    • 5.42.65.53
                    https://url12.mailanyone.net/scanner?m=1s9PCz-0000cD-4j&d=4%7Cmail%2F90%2F1716296400%2F1s9PCz-0000cD-4j%7Cin12g%7C57e1b682%7C11949542%7C14589158%7C664C9C811D87B03FE2E6472997A0C22E&o=%2Fphtl%3A%2Fatsnhtaageeteoilogt.rgsigc%2Faz.&s=1YKQiaLIfHH0tTbjCAvEAnTGAIUGet hashmaliciousHTMLPhisherBrowse
                    • 5.42.65.53
                    file.exeGet hashmaliciousRisePro StealerBrowse
                    • 5.42.96.64
                    8a180cbdd2a7a7b4f60d93c574bee9248b17d5c1cb782850441a41fd6db0727a_dump.exeGet hashmaliciousRedLineBrowse
                    • 5.42.65.85
                    No context
                    No context
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:28 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                    Category:dropped
                    Size (bytes):2104
                    Entropy (8bit):3.4556070346954355
                    Encrypted:false
                    SSDEEP:48:8S0dZTBnxRYrnvPdAKRkdAGdAKRFdAKR/U:8SyK
                    MD5:76EA8642EDFC0D70B8C0F0B5D9C1784A
                    SHA1:C23DCA143ED074418571E27A2E99C7BAB5A3703A
                    SHA-256:1B98DCB6FD1A24A0B051D6F6E1A4261ABC071096940758EAAFBA87DEA3656695
                    SHA-512:D1B67DC5D7089CB11D10C1138E785E6C5EF6FAF92CF1C48C7A24713122B7856DC9C2C9B393D64C2B66B86CDAD9B5CC3A88AEB0D2DC70124B67C72EBEE3AB9771
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ......,....)..........q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.IDW5`....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWO`....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWO`....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWO`..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDWH`..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.!.-.-.p.r.o.x.y.-.s.e.r.v.e.r
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):3274
                    Entropy (8bit):5.3318368586986695
                    Encrypted:false
                    SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymRLKTqdqlq7qqjqc85VD:Pq5qHwCYqh3qtI6eqzxP0at9KTqdqlq0
                    MD5:0C1110E9B7BBBCB651A0B7568D796468
                    SHA1:7AEE00407EE27655FFF0ADFBC96CF7FAD9610AAA
                    SHA-256:112E21404A85963FB5DF8388F97429D6A46E9D4663435CC86267C563C0951FA2
                    SHA-512:46E37552764B4E61006AB99F8C542D55B2418668B097D3C6647D306604C3D7CA3FAF34F8B4121D94B0E7168295B2ABEB7C21C3B96F37208943537B887BC81590
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):2662
                    Entropy (8bit):7.8230547059446645
                    Encrypted:false
                    SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                    MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                    SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                    SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                    SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):2662
                    Entropy (8bit):7.8230547059446645
                    Encrypted:false
                    SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                    MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                    SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                    SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                    SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):2251
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:3::
                    MD5:0158FE9CEAD91D1B027B795984737614
                    SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                    SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                    SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.711295641924988
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:file.exe
                    File size:470'528 bytes
                    MD5:e154829a16292c782b579d217e0ea8bf
                    SHA1:5d2fb1535930184e7212b5fb780c638f32a03cee
                    SHA256:132fe6d8e5c0026b4f9e0de786ccc4a35fc22d86821d230f8d8ea924e825ffbf
                    SHA512:d0acbc1d810f628107e095959a2c53ef6e58adcc8631f1ab16353b1294b7f51f13b1ff9936ab5e86aff2d3c4fad9c56f3df263d9f7b27de8ffa3cd508537a300
                    SSDEEP:12288:mQJRsrrQqYvbeUVOyJ3GJNu0ADIJTls9tJBKM1I59rM:akkyJoNYDOsrqM259A
                    TLSH:B6A4F181B0C08072EA73153609E4D6F4AE7EFD704EA69D9F77484BBE5F301819A21B67
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......jL$..-J,.-J,.-J,._I-"-J,._O-.-J,._N-;-J,._K---J,.-K,u-J,..N-<-J,..I-:-J,..O-`-J,..O-/-J,..H-/-J,Rich.-J,........PE..L.....Nf...
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x40490e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x664E1414 [Wed May 22 15:49:40 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:3253afb4f76368b87a5ee602b0490ec8
                    Instruction
                    call 00007FDD6086DA6Fh
                    jmp 00007FDD6086D309h
                    push ebp
                    mov ebp, esp
                    jmp 00007FDD6086D49Fh
                    push dword ptr [ebp+08h]
                    call 00007FDD608767C5h
                    pop ecx
                    test eax, eax
                    je 00007FDD6086D4A1h
                    push dword ptr [ebp+08h]
                    call 00007FDD6087348Eh
                    pop ecx
                    test eax, eax
                    je 00007FDD6086D478h
                    pop ebp
                    ret
                    cmp dword ptr [ebp+08h], FFFFFFFFh
                    je 00007FDD6086A934h
                    jmp 00007FDD6086DD62h
                    push ebp
                    mov ebp, esp
                    push dword ptr [ebp+08h]
                    call 00007FDD6086DD74h
                    pop ecx
                    pop ebp
                    ret
                    cmp ecx, dword ptr [00473500h]
                    jne 00007FDD6086D493h
                    ret
                    jmp 00007FDD6086DD90h
                    mov ecx, dword ptr [ebp-0Ch]
                    mov dword ptr fs:[00000000h], ecx
                    pop ecx
                    pop edi
                    pop edi
                    pop esi
                    pop ebx
                    mov esp, ebp
                    pop ebp
                    push ecx
                    ret
                    mov ecx, dword ptr [ebp-10h]
                    xor ecx, ebp
                    call 00007FDD6086D469h
                    jmp 00007FDD6086D472h
                    push eax
                    push dword ptr fs:[00000000h]
                    lea eax, dword ptr [esp+0Ch]
                    sub esp, dword ptr [esp+0Ch]
                    push ebx
                    push esi
                    push edi
                    mov dword ptr [eax], ebp
                    mov ebp, eax
                    mov eax, dword ptr [00473500h]
                    xor eax, ebp
                    push eax
                    push dword ptr [ebp-04h]
                    mov dword ptr [ebp-04h], FFFFFFFFh
                    lea eax, dword ptr [ebp-0Ch]
                    mov dword ptr fs:[00000000h], eax
                    ret
                    push eax
                    push dword ptr fs:[00000000h]
                    lea eax, dword ptr [esp+0Ch]
                    sub esp, dword ptr [esp+0Ch]
                    push ebx
                    push esi
                    push edi
                    mov dword ptr [eax], ebp
                    mov ebp, eax
                    mov eax, dword ptr [00473500h]
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x2599c0x28.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x760000x1950.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x23fc80x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x23f080x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x1d0000x140.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x1a59f0x1a600958a190d2e286e394b8f216995317189False0.5829939277251185data6.602027588555361IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .bSs0x1c0000x3150x4006e172757ba390471c9226323f78cdc03False0.6591796875data5.456564594277736IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x1d0000x90d00x9200c16a9693e3f1bd814224ee07625ccb81False0.390089897260274data4.688642176445258IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x270000x4e2140x4d400f82928d5af1ad00b42833e2c6bb5d9d0False0.9890492263349514data7.992045422958882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .reloc0x760000x19500x1a00372541e493b33588efc8de3f292b1268False0.7569110576923077data6.484945587212282IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    DLLImport
                    KERNEL32.dllCloseHandle, WaitForSingleObjectEx, CreateThread, VirtualAlloc, GetModuleHandleA, GetProcAddress, EncodePointer, DecodePointer, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, MultiByteToWideChar, WideCharToMultiByte, LCMapStringEx, GetStringTypeW, GetCPInfo, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetModuleHandleW, GetCurrentProcess, TerminateProcess, CreateFileW, RaiseException, RtlUnwind, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetProcessHeap, HeapSize, WriteConsoleW
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    05/22/24-18:20:00.737450TCP2046045ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)4973040551192.168.2.45.42.65.115
                    05/22/24-18:20:00.932379TCP2043234ET MALWARE Redline Stealer TCP CnC - Id1Response40551497305.42.65.115192.168.2.4
                    05/22/24-18:20:12.066922TCP2043231ET TROJAN Redline Stealer TCP CnC Activity4973040551192.168.2.45.42.65.115
                    05/22/24-18:20:06.193796TCP2046056ET TROJAN Redline Stealer/MetaStealer Family Activity (Response)40551497305.42.65.115192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    May 22, 2024 18:20:00.041604996 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:00.046922922 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:00.047151089 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:00.055115938 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:00.097771883 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:00.709685087 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:00.737449884 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:00.742768049 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:00.932379007 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:00.975501060 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:05.994251013 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:06.001460075 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.193795919 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.195012093 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.195228100 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:06.197375059 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.199944973 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.200128078 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:06.202553988 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.245553970 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.245712042 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:06.315599918 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:06.320960999 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.514353037 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.569255114 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:06.576057911 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:06.581509113 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.581584930 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:06.586414099 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.586446047 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.586473942 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.586491108 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:06.586529970 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.586560011 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.586587906 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.586616039 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.591240883 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.591270924 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.591300964 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.595953941 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.595969915 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.595982075 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.653402090 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.869519949 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:06.912880898 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:06.977698088 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:06.987680912 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.178246975 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.225464106 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.226576090 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.235788107 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.430304050 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.475471973 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.541631937 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.552222013 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.552468061 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.557775974 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.557807922 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.557840109 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.557872057 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.557877064 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.557900906 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.557902098 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.557929039 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.557949066 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.557956934 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.557977915 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.557985067 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.557997942 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.558012962 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.558029890 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.558043957 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.558059931 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.558072090 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.558093071 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.558099985 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.558128119 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.558128119 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.558139086 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.558156013 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.558178902 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.558182955 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.558193922 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.558263063 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.562515974 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.562618971 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.569880009 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.569996119 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.576176882 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576205969 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576232910 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576241016 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.576261044 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576268911 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.576289892 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576306105 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.576318979 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576340914 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.576348066 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576363087 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.576375008 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576399088 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.576406002 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576432943 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576435089 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.576452971 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.576459885 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576487064 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576515913 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576543093 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.576569080 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.580967903 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.580996037 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581022978 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581049919 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581077099 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581105947 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581135988 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581162930 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581190109 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581217051 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581243038 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581269026 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581295967 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581321955 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581350088 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581376076 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581403017 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581429958 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.581456900 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.584811926 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.585789919 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.585819960 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.585848093 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.585850000 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.585875988 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.585877895 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.585900068 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.585906982 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.585922956 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.585936069 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.585963011 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.585964918 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.585987091 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.585992098 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.586009979 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.586019993 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.586046934 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.586077929 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.590567112 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590595007 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590622902 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.590622902 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590651989 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590655088 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.590672016 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.590681076 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590708971 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590732098 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.590737104 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590764999 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590768099 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.590792894 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590821981 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590831041 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.590833902 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590859890 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.590928078 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.591963053 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.591990948 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592015028 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592016935 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592045069 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592072010 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592098951 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592125893 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592153072 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592180014 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592205048 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592223883 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592231989 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592258930 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592259884 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592278957 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592288017 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592309952 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592317104 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592334986 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592344999 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592372894 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592380047 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592401981 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592405081 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592433929 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592437029 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592456102 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592461109 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592473030 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592488050 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592509031 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592514992 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.592540026 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.592556953 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.601309061 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.601341963 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.601368904 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.601372004 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.601391077 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.601397038 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.601424932 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.601432085 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.601452112 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.601458073 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.601479053 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.601479053 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.601505995 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.601509094 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.601526976 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.601536989 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.601563931 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.601564884 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.601588964 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.601608038 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603084087 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603135109 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603152037 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603166103 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603183031 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603194952 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603219032 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603224039 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603250027 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603252888 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603269100 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603281975 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603305101 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603310108 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603332043 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603338957 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603368044 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603372097 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603389978 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603395939 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603424072 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603427887 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603451014 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603452921 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603478909 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603487015 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603507042 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603526115 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603535891 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603558064 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603564024 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603583097 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603591919 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603612900 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603620052 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603637934 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.603647947 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.603674889 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604238033 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604271889 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604300022 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604326963 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604353905 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604382038 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604408979 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604437113 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604464054 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604490995 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604517937 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604546070 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604567051 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.604573965 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604607105 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604610920 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.604629040 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.604633093 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604649067 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.604660988 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604687929 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.604687929 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604711056 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.604717970 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604736090 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.604746103 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604773998 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604774952 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.604794979 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.604800940 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604820967 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.604830980 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.604861975 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.604893923 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.606188059 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.606247902 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.608931065 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.608959913 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.608985901 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.608988047 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609004974 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609015942 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609034061 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609044075 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609071970 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609072924 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609092951 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609100103 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609126091 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609127998 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609148979 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609153986 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609179974 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609180927 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609205008 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609209061 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609225988 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609236956 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609263897 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609266996 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609292030 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609293938 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609313011 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609321117 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609335899 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609349012 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609375954 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609379053 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609399080 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609402895 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609421015 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609431028 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609450102 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609458923 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609489918 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.609492064 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609512091 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.609533072 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.610980988 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611013889 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611036062 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.611042976 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611061096 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.611071110 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611097097 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611099005 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.611124992 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611154079 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611181021 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611207008 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611233950 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611262083 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611289978 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611316919 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611344099 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611371040 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611397982 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611424923 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611452103 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611479044 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611505032 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611532927 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611542940 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.611560106 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.611591101 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.611614943 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613058090 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613091946 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613118887 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613126993 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613147020 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613153934 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613174915 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613195896 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613203049 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613229990 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613234043 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613253117 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613257885 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613274097 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613286972 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613308907 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613315105 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613336086 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613343000 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613369942 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613370895 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613390923 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613398075 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613413095 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613425970 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613450050 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613454103 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613466978 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613481998 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613503933 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613509893 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613531113 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613538027 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613555908 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613567114 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.613585949 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.613609076 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618443012 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618472099 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618494987 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618519068 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618537903 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618546963 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618573904 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618592024 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618601084 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618616104 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618628979 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618654966 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618658066 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618673086 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618685007 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618702888 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618712902 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618731976 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618741035 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618755102 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618769884 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618791103 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618798018 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.618815899 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.618827105 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619431019 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619461060 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619487047 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619514942 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619540930 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619568110 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619595051 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619621992 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619648933 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619676113 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619703054 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619729996 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619756937 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619784117 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619812012 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619844913 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619872093 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619899988 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619927883 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619954109 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.619955063 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.619981050 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.620033026 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621593952 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621628046 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621655941 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621655941 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621680975 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621682882 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621706009 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621711016 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621728897 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621738911 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621751070 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621767044 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621793985 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621794939 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621813059 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621824026 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621851921 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621857882 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621877909 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621880054 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621901035 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621906996 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621926069 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621934891 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621963024 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.621973991 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.621989965 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.622013092 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.622016907 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.622031927 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.622045994 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.622070074 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.622072935 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.622095108 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.622101068 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.622124910 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.622128010 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.622148037 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.622155905 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.622176886 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.622183084 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.622205973 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.622235060 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.623706102 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.623739004 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.623764038 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.623768091 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.623783112 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.623795986 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.623821020 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.623823881 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.623846054 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.623852015 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.623879910 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.623907089 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.623934031 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.623961926 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.625906944 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.625936031 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.625963926 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.625991106 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626019001 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626046896 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626074076 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626100063 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626127958 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626153946 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626179934 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626207113 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626234055 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626261950 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626291037 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626317024 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626344919 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626370907 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626399040 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626425028 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626454115 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.626507998 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.629352093 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.629384995 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.629415035 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.629451036 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.672815084 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.673067093 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.673269987 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.673413038 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.711258888 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.711570978 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.711570978 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.711767912 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.716767073 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.763511896 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.763552904 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.763581991 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.763609886 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:07.763921976 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:07.808109045 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:08.614713907 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:08.619342089 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:08.625715017 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:08.818742037 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:08.866105080 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:09.233766079 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:09.239377975 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:09.244223118 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:09.244277000 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:09.528629065 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:09.554436922 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:09.559642076 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:09.749232054 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:09.750848055 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:09.756304026 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:09.945738077 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:09.949565887 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:09.954616070 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:10.144108057 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:10.147768021 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:10.153278112 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:10.343456984 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:10.397492886 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:10.404406071 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:10.449954033 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:10.639611006 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:10.641222000 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:10.646224022 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:10.839525938 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:10.843481064 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:10.849813938 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.041181087 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.044030905 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:11.049491882 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.240643024 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.242731094 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:11.248182058 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.442259073 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.452106953 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:11.463579893 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.663566113 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.667942047 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:11.673365116 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.678178072 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.678229094 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.678258896 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.678287029 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.678316116 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.727658033 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.727701902 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.868026972 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:11.868587971 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:11.873720884 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:12.066140890 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:12.066921949 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:12.072355986 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:12.262933016 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:12.300235033 CEST4973040551192.168.2.45.42.65.115
                    May 22, 2024 18:20:12.581267118 CEST40551497305.42.65.115192.168.2.4
                    May 22, 2024 18:20:12.581445932 CEST4973040551192.168.2.45.42.65.115
                    TimestampSource PortDest PortSource IPDest IP
                    May 22, 2024 18:20:22.466888905 CEST53604751.1.1.1192.168.2.4
                    May 22, 2024 18:20:48.030168056 CEST5358739162.159.36.2192.168.2.4
                    May 22, 2024 18:20:48.572839975 CEST53583271.1.1.1192.168.2.4

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:12:19:57
                    Start date:22/05/2024
                    Path:C:\Users\user\Desktop\file.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\file.exe"
                    Imagebase:0x3e0000
                    File size:470'528 bytes
                    MD5 hash:E154829A16292C782B579D217E0EA8BF
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:12:19:58
                    Start date:22/05/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Imagebase:0x730000
                    File size:65'440 bytes
                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000001.00000002.1755940383.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000001.00000002.1757758189.0000000002C49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:3.5%
                      Dynamic/Decrypted Code Coverage:0.5%
                      Signature Coverage:1.6%
                      Total number of Nodes:1520
                      Total number of Limit Nodes:14
                      execution_graph 15127 3e101f 15128 3e1028 15127->15128 15135 3e24be 15128->15135 15130 3e1037 15141 3e2d6a 15130->15141 15136 3e24ca __EH_prolog3 15135->15136 15137 3e4918 codecvt 43 API calls 15136->15137 15138 3e24ff 15137->15138 15140 3e2510 codecvt 15138->15140 15148 3e3e12 15138->15148 15140->15130 15143 3e2d89 15141->15143 15142 3e104b 15145 3e4c8a 15142->15145 15143->15142 15264 3e931f 15143->15264 15271 3e4c5d 15145->15271 15149 3e3e1e __EH_prolog3 15148->15149 15160 3e3c2f 15149->15160 15154 3e3e3c 15172 3e3f98 15154->15172 15155 3e3e97 codecvt 15155->15140 15159 3e3e5a 15182 3e3c87 15159->15182 15161 3e3c3e 15160->15161 15163 3e3c45 15160->15163 15189 3ea914 15161->15189 15164 3e3c43 15163->15164 15194 3e44a2 EnterCriticalSection 15163->15194 15164->15159 15166 3e3f75 15164->15166 15167 3e4918 codecvt 43 API calls 15166->15167 15168 3e3f80 15167->15168 15169 3e3f94 15168->15169 15246 3e3ca6 15168->15246 15169->15154 15173 3e3e44 15172->15173 15174 3e3fa4 15172->15174 15176 3e3d6a 15173->15176 15249 3e4450 15174->15249 15177 3e3d78 15176->15177 15181 3e3da3 _Yarn 15176->15181 15178 3e3d84 15177->15178 15179 3ea859 _Yarn 14 API calls 15177->15179 15180 3ea92b _Yarn 15 API calls 15178->15180 15178->15181 15179->15178 15180->15181 15181->15159 15183 3ea922 15182->15183 15184 3e3c91 15182->15184 15263 3ea8fd LeaveCriticalSection 15183->15263 15185 3e3ca4 15184->15185 15262 3e44b0 LeaveCriticalSection 15184->15262 15185->15155 15187 3ea929 15187->15155 15195 3ef71b 15189->15195 15194->15164 15216 3ef0ca 15195->15216 15215 3ef74d 15215->15215 15217 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 15216->15217 15218 3ef0e0 15217->15218 15219 3ef0e4 15218->15219 15220 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 15219->15220 15221 3ef0fa 15220->15221 15222 3ef0fe 15221->15222 15223 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 15222->15223 15224 3ef114 15223->15224 15225 3ef118 15224->15225 15226 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 15225->15226 15227 3ef12e 15226->15227 15228 3ef132 15227->15228 15229 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 15228->15229 15230 3ef148 15229->15230 15231 3ef14c 15230->15231 15232 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 15231->15232 15233 3ef162 15232->15233 15234 3ef166 15233->15234 15235 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 15234->15235 15236 3ef17c 15235->15236 15237 3ef180 15236->15237 15238 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 15237->15238 15239 3ef196 15238->15239 15240 3ef1b4 15239->15240 15241 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 15240->15241 15242 3ef1ca 15241->15242 15243 3ef19a 15242->15243 15244 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 15243->15244 15245 3ef1b0 15244->15245 15245->15215 15247 3e3d6a _Yarn 15 API calls 15246->15247 15248 3e3ce0 15247->15248 15248->15154 15250 3eb237 15249->15250 15251 3e4460 EncodePointer 15249->15251 15252 3f2f8a _unexpected 2 API calls 15250->15252 15251->15173 15251->15250 15253 3eb23c 15252->15253 15254 3f2fcf _unexpected 41 API calls 15253->15254 15257 3eb247 15253->15257 15254->15257 15255 3eb270 15259 3ec42e _unexpected 23 API calls 15255->15259 15256 3eb251 IsProcessorFeaturePresent 15258 3eb25d 15256->15258 15257->15255 15257->15256 15260 3e8f06 _unexpected 8 API calls 15258->15260 15261 3eb27a 15259->15261 15260->15255 15262->15185 15263->15187 15265 3e932b 15264->15265 15267 3e9340 15264->15267 15266 3eb318 __strnicoll 14 API calls 15265->15266 15268 3e9330 15266->15268 15267->15142 15269 3e9102 __strnicoll 41 API calls 15268->15269 15270 3e933b 15269->15270 15270->15142 15272 3e4c6c 15271->15272 15273 3e4c73 15271->15273 15277 3edf70 15272->15277 15280 3edfed 15273->15280 15276 3e1055 15278 3edfed 44 API calls 15277->15278 15279 3edf82 15278->15279 15279->15276 15283 3edd39 15280->15283 15284 3edd45 ___scrt_is_nonwritable_in_current_image 15283->15284 15291 3ea8b5 EnterCriticalSection 15284->15291 15286 3edd53 15292 3edd94 15286->15292 15288 3edd60 15302 3edd88 15288->15302 15291->15286 15293 3eddaf 15292->15293 15294 3ede22 std::_Locinfo::_Locinfo_ctor 15292->15294 15293->15294 15295 3ede02 15293->15295 15297 3f7ba0 44 API calls 15293->15297 15294->15288 15295->15294 15296 3f7ba0 44 API calls 15295->15296 15298 3ede18 15296->15298 15299 3eddf8 15297->15299 15300 3eefd8 ___free_lconv_mon 14 API calls 15298->15300 15301 3eefd8 ___free_lconv_mon 14 API calls 15299->15301 15300->15294 15301->15295 15305 3ea8fd LeaveCriticalSection 15302->15305 15304 3edd71 15304->15276 15305->15304 15000 bb018d 15001 bb01c5 15000->15001 15001->15001 15002 bb02d3 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 15001->15002 15002->15001 15003 bb03a2 WriteProcessMemory 15002->15003 15004 bb03e7 15003->15004 15005 bb0429 WriteProcessMemory Wow64SetThreadContext ResumeThread 15004->15005 15006 bb03ec WriteProcessMemory 15004->15006 15006->15004 15398 3e1000 15403 3e2456 15398->15403 15400 3e1013 15401 3e4c8a 44 API calls 15400->15401 15402 3e101d 15401->15402 15404 3e2462 __EH_prolog3 15403->15404 15407 3e3180 15404->15407 15406 3e24b4 codecvt 15406->15400 15416 3e2e24 15407->15416 15409 3e318b 15424 3e37dd 15409->15424 15411 3e319e 15412 3e31b7 15411->15412 15413 3e1eb1 std::ios_base::_Init 43 API calls 15411->15413 15414 3e31c3 15412->15414 15428 3e42a8 15412->15428 15413->15412 15414->15406 15417 3e2e30 __EH_prolog3 15416->15417 15418 3e1eb1 std::ios_base::_Init 43 API calls 15417->15418 15419 3e2e61 15418->15419 15420 3e4918 codecvt 43 API calls 15419->15420 15421 3e2e68 15420->15421 15422 3e3e12 std::ios_base::_Init 47 API calls 15421->15422 15423 3e2e79 codecvt 15421->15423 15422->15423 15423->15409 15425 3e37e9 __EH_prolog3 15424->15425 15433 3e239c 15425->15433 15427 3e3801 std::ios_base::_Ios_base_dtor codecvt 15427->15411 15429 3e3c2f std::_Lockit::_Lockit 7 API calls 15428->15429 15430 3e42b8 15429->15430 15431 3e3c87 std::_Lockit::~_Lockit 2 API calls 15430->15431 15432 3e42f6 15431->15432 15432->15414 15434 3e23a8 __EH_prolog3 15433->15434 15435 3e3c2f std::_Lockit::_Lockit 7 API calls 15434->15435 15436 3e23b2 15435->15436 15449 3e2867 15436->15449 15438 3e23c9 15448 3e23dc 15438->15448 15455 3e2cbe 15438->15455 15439 3e3c87 std::_Lockit::~_Lockit 2 API calls 15441 3e2423 codecvt 15439->15441 15441->15427 15442 3e23ec 15443 3e242b 15442->15443 15444 3e23f3 15442->15444 15468 3e2f6e 15443->15468 15465 3e3de0 15444->15465 15448->15439 15450 3e2897 15449->15450 15451 3e2873 15449->15451 15450->15438 15452 3e3c2f std::_Lockit::_Lockit 7 API calls 15451->15452 15453 3e287d 15452->15453 15454 3e3c87 std::_Lockit::~_Lockit 2 API calls 15453->15454 15454->15450 15457 3e2cca __EH_prolog3 15455->15457 15456 3e2d1b codecvt 15456->15442 15457->15456 15458 3e4918 codecvt 43 API calls 15457->15458 15459 3e2ce3 codecvt 15458->15459 15464 3e2d0a 15459->15464 15472 3e25a5 15459->15472 15462 3e2cff 15484 3e252f 15462->15484 15464->15456 15487 3e2781 15464->15487 15466 3e4918 codecvt 43 API calls 15465->15466 15467 3e3deb 15466->15467 15467->15448 15469 3e2f7c Concurrency::cancel_current_task 15468->15469 15470 3e5a72 std::_Xinvalid_argument RaiseException 15469->15470 15471 3e2f8a 15470->15471 15473 3e25b1 __EH_prolog3 15472->15473 15474 3e3c2f std::_Lockit::_Lockit 7 API calls 15473->15474 15475 3e25be 15474->15475 15476 3e2607 15475->15476 15477 3e25f2 15475->15477 15513 3e21c9 15476->15513 15504 3e3f10 15477->15504 15480 3e25fb codecvt 15480->15462 15560 3e4025 15484->15560 15605 3e3f5b 15487->15605 15490 3e27bc 15492 3e27cf 15490->15492 15494 3ea859 _Yarn 14 API calls 15490->15494 15491 3ea859 _Yarn 14 API calls 15491->15490 15493 3e27e0 15492->15493 15495 3ea859 _Yarn 14 API calls 15492->15495 15496 3ea859 _Yarn 14 API calls 15493->15496 15497 3e27f1 15493->15497 15494->15492 15495->15493 15496->15497 15498 3ea859 _Yarn 14 API calls 15497->15498 15499 3e2802 15497->15499 15498->15499 15500 3e2813 15499->15500 15502 3ea859 _Yarn 14 API calls 15499->15502 15501 3e3c87 std::_Lockit::~_Lockit 2 API calls 15500->15501 15503 3e281e 15501->15503 15502->15500 15503->15456 15518 3eab8b 15504->15518 15507 3e3d6a _Yarn 15 API calls 15508 3e3f34 15507->15508 15509 3e3f44 15508->15509 15510 3eab8b std::_Locinfo::_Locinfo_ctor 69 API calls 15508->15510 15511 3e3d6a _Yarn 15 API calls 15509->15511 15510->15509 15512 3e3f58 15511->15512 15512->15480 15557 3e215d 15513->15557 15516 3e5a72 std::_Xinvalid_argument RaiseException 15517 3e21e8 15516->15517 15519 3ef71b std::_Locinfo::_Locinfo_ctor 5 API calls 15518->15519 15520 3eab98 15519->15520 15523 3ea936 15520->15523 15524 3ea942 ___scrt_is_nonwritable_in_current_image 15523->15524 15531 3ea8b5 EnterCriticalSection 15524->15531 15526 3ea950 15532 3ea991 15526->15532 15531->15526 15533 3eaaf0 std::_Locinfo::_Locinfo_ctor 69 API calls 15532->15533 15534 3ea9ac 15533->15534 15535 3eec90 _unexpected 41 API calls 15534->15535 15553 3ea95d 15534->15553 15536 3ea9b9 15535->15536 15537 3f26bc std::_Locinfo::_Locinfo_ctor 43 API calls 15536->15537 15538 3ea9de 15537->15538 15539 3ea9e5 15538->15539 15540 3f2001 __strnicoll 15 API calls 15538->15540 15542 3e912f _Deallocate 11 API calls 15539->15542 15539->15553 15541 3eaa0a 15540->15541 15544 3f26bc std::_Locinfo::_Locinfo_ctor 43 API calls 15541->15544 15541->15553 15543 3eaaef 15542->15543 15545 3eaa26 15544->15545 15546 3eaa2d 15545->15546 15547 3eaa48 15545->15547 15546->15539 15548 3eaa3f 15546->15548 15549 3eefd8 ___free_lconv_mon 14 API calls 15547->15549 15551 3eaa73 15547->15551 15550 3eefd8 ___free_lconv_mon 14 API calls 15548->15550 15549->15551 15550->15553 15552 3eefd8 ___free_lconv_mon 14 API calls 15551->15552 15551->15553 15552->15553 15554 3ea985 15553->15554 15555 3ea8fd std::_Lockit::~_Lockit LeaveCriticalSection 15554->15555 15556 3e3f1c 15555->15556 15556->15507 15558 3e19ca std::exception::exception 42 API calls 15557->15558 15559 3e216f 15558->15559 15559->15516 15572 3ead24 15560->15572 15562 3e402e __Getctype 15563 3e4048 15562->15563 15564 3e4066 15562->15564 15577 3eabc3 15563->15577 15566 3eabc3 __Getctype 41 API calls 15564->15566 15567 3e404f 15566->15567 15582 3ead49 15567->15582 15570 3e2552 15570->15464 15573 3eec90 _unexpected 41 API calls 15572->15573 15574 3ead2f 15573->15574 15575 3f26fa __Getctype 41 API calls 15574->15575 15576 3ead3f 15575->15576 15576->15562 15578 3eec90 _unexpected 41 API calls 15577->15578 15579 3eabce 15578->15579 15580 3f26fa __Getctype 41 API calls 15579->15580 15581 3eabde 15580->15581 15581->15567 15583 3eec90 _unexpected 41 API calls 15582->15583 15584 3ead54 15583->15584 15585 3f26fa __Getctype 41 API calls 15584->15585 15586 3e4077 15585->15586 15586->15570 15587 3eb1d8 15586->15587 15588 3eb1e5 15587->15588 15593 3eb220 15587->15593 15589 3ea92b _Yarn 15 API calls 15588->15589 15590 3eb208 15589->15590 15590->15593 15596 3f2e58 15590->15596 15593->15570 15594 3e912f _Deallocate 11 API calls 15595 3eb236 15594->15595 15597 3f2e74 15596->15597 15598 3f2e66 15596->15598 15599 3eb318 __strnicoll 14 API calls 15597->15599 15598->15597 15603 3f2e8e 15598->15603 15600 3f2e7e 15599->15600 15602 3e9102 __strnicoll 41 API calls 15600->15602 15601 3eb219 15601->15593 15601->15594 15602->15601 15603->15601 15604 3eb318 __strnicoll 14 API calls 15603->15604 15604->15600 15606 3e3f67 15605->15606 15607 3e27ad 15605->15607 15608 3eab8b std::_Locinfo::_Locinfo_ctor 69 API calls 15606->15608 15607->15490 15607->15491 15608->15607 17563 3eeb57 17564 3eeb72 17563->17564 17565 3eeb62 17563->17565 17569 3eeb78 17565->17569 17568 3eefd8 ___free_lconv_mon 14 API calls 17568->17564 17570 3eeb8d 17569->17570 17571 3eeb93 17569->17571 17572 3eefd8 ___free_lconv_mon 14 API calls 17570->17572 17573 3eefd8 ___free_lconv_mon 14 API calls 17571->17573 17572->17571 17574 3eeb9f 17573->17574 17575 3eefd8 ___free_lconv_mon 14 API calls 17574->17575 17576 3eebaa 17575->17576 17577 3eefd8 ___free_lconv_mon 14 API calls 17576->17577 17578 3eebb5 17577->17578 17579 3eefd8 ___free_lconv_mon 14 API calls 17578->17579 17580 3eebc0 17579->17580 17581 3eefd8 ___free_lconv_mon 14 API calls 17580->17581 17582 3eebcb 17581->17582 17583 3eefd8 ___free_lconv_mon 14 API calls 17582->17583 17584 3eebd6 17583->17584 17585 3eefd8 ___free_lconv_mon 14 API calls 17584->17585 17586 3eebe1 17585->17586 17587 3eefd8 ___free_lconv_mon 14 API calls 17586->17587 17588 3eebec 17587->17588 17589 3eefd8 ___free_lconv_mon 14 API calls 17588->17589 17590 3eebfa 17589->17590 17595 3ee9a4 17590->17595 17596 3ee9b0 ___scrt_is_nonwritable_in_current_image 17595->17596 17611 3ea8b5 EnterCriticalSection 17596->17611 17599 3ee9ba 17601 3eefd8 ___free_lconv_mon 14 API calls 17599->17601 17602 3ee9e4 17599->17602 17601->17602 17612 3eea03 17602->17612 17603 3eea0f 17604 3eea1b ___scrt_is_nonwritable_in_current_image 17603->17604 17616 3ea8b5 EnterCriticalSection 17604->17616 17606 3eea25 17607 3eec45 _unexpected 14 API calls 17606->17607 17608 3eea38 17607->17608 17617 3eea58 17608->17617 17611->17599 17615 3ea8fd LeaveCriticalSection 17612->17615 17614 3ee9f1 17614->17603 17615->17614 17616->17606 17620 3ea8fd LeaveCriticalSection 17617->17620 17619 3eea46 17619->17568 17620->17619 16066 3ec8a8 16069 3ec574 16066->16069 16070 3ec580 ___scrt_is_nonwritable_in_current_image 16069->16070 16077 3ea8b5 EnterCriticalSection 16070->16077 16072 3ec58a 16073 3ec5b8 16072->16073 16075 3f68fb __Getctype 14 API calls 16072->16075 16078 3ec5d6 16073->16078 16075->16072 16077->16072 16081 3ea8fd LeaveCriticalSection 16078->16081 16080 3ec5c4 16081->16080 13679 3e478c 13680 3e4798 ___scrt_is_nonwritable_in_current_image 13679->13680 13705 3e4ac4 13680->13705 13682 3e479f 13683 3e48f8 13682->13683 13693 3e47c9 ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 13682->13693 13753 3e4fa6 IsProcessorFeaturePresent 13683->13753 13685 3e48ff 13686 3e4905 13685->13686 13733 3ec46a 13685->13733 13757 3ec42e 13686->13757 13690 3e47e8 13691 3e4869 13713 3ec0a8 13691->13713 13693->13690 13693->13691 13736 3ec444 13693->13736 13695 3e486f 13717 3fc274 13695->13717 13700 3e4894 13701 3e489d 13700->13701 13744 3ec41f 13700->13744 13747 3e4c35 13701->13747 13706 3e4acd 13705->13706 13760 3e4ccc IsProcessorFeaturePresent 13706->13760 13710 3e4ade 13711 3e4ae2 13710->13711 13770 3e7a2d 13710->13770 13711->13682 13714 3ec0b6 13713->13714 13715 3ec0b1 13713->13715 13714->13695 13830 3ebe02 13715->13830 14489 3e116f 13717->14489 13719 3fc295 GetModuleHandleA 14497 3e1852 13719->14497 13721 3fc2b1 _strlen 14501 3e1e58 13721->14501 13723 3fc2c7 _strlen 13724 3e1e58 std::ios_base::_Init 43 API calls 13723->13724 13725 3fc2dd GetProcAddress 13724->13725 13726 3fc2f8 13725->13726 14505 3fc20e VirtualAlloc 13726->14505 13728 3fc2fd 14510 3e1dfe 13728->14510 13731 3e4956 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 13732 3e4886 13731->13732 13742 3e50c0 GetModuleHandleW 13732->13742 14775 3ec252 13733->14775 13737 3ec45a ___scrt_is_nonwritable_in_current_image std::_Locinfo::_Locinfo_ctor 13736->13737 13737->13691 13738 3eec90 _unexpected 41 API calls 13737->13738 13741 3ee1cd 13738->13741 13739 3eb237 __purecall 41 API calls 13740 3ee1f7 13739->13740 13741->13739 13743 3e4890 13742->13743 13743->13685 13743->13700 13745 3ec252 _unexpected 23 API calls 13744->13745 13746 3ec42a 13745->13746 13746->13701 13748 3e4c41 13747->13748 13750 3e48a6 13748->13750 14852 3ee12d 13748->14852 13750->13690 13751 3e4c4f 13752 3e7a2d ___scrt_uninitialize_crt 7 API calls 13751->13752 13752->13750 13754 3e4fbc __fread_nolock _unexpected 13753->13754 13755 3e5067 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 13754->13755 13756 3e50ab _unexpected 13755->13756 13756->13685 13758 3ec252 _unexpected 23 API calls 13757->13758 13759 3e490d 13758->13759 13761 3e4ad9 13760->13761 13762 3e7a0e 13761->13762 13776 3e8ae7 13762->13776 13765 3e7a17 13765->13710 13767 3e7a1f 13768 3e7a2a 13767->13768 13790 3e8b23 13767->13790 13768->13710 13771 3e7a36 13770->13771 13772 3e7a40 13770->13772 13773 3e7ba6 ___vcrt_uninitialize_ptd 6 API calls 13771->13773 13772->13711 13774 3e7a3b 13773->13774 13775 3e8b23 ___vcrt_uninitialize_locks DeleteCriticalSection 13774->13775 13775->13772 13777 3e8af0 13776->13777 13779 3e8b19 13777->13779 13780 3e7a13 13777->13780 13794 3e8d2c 13777->13794 13781 3e8b23 ___vcrt_uninitialize_locks DeleteCriticalSection 13779->13781 13780->13765 13782 3e7b73 13780->13782 13781->13780 13811 3e8c3d 13782->13811 13787 3e7ba3 13787->13767 13789 3e7b88 13789->13767 13791 3e8b4d 13790->13791 13792 3e8b2e 13790->13792 13791->13765 13793 3e8b38 DeleteCriticalSection 13792->13793 13793->13791 13793->13793 13799 3e8b52 13794->13799 13797 3e8d64 InitializeCriticalSectionAndSpinCount 13798 3e8d4f 13797->13798 13798->13777 13800 3e8b6f 13799->13800 13803 3e8b73 13799->13803 13800->13797 13800->13798 13802 3e8bdb GetProcAddress 13802->13800 13803->13800 13803->13802 13804 3e8bcc 13803->13804 13806 3e8bf2 LoadLibraryExW 13803->13806 13804->13802 13805 3e8bd4 FreeLibrary 13804->13805 13805->13802 13807 3e8c09 GetLastError 13806->13807 13808 3e8c39 13806->13808 13807->13808 13809 3e8c14 ___vcrt_FlsFree 13807->13809 13808->13803 13809->13808 13810 3e8c2a LoadLibraryExW 13809->13810 13810->13803 13812 3e8b52 ___vcrt_FlsFree 5 API calls 13811->13812 13813 3e8c57 13812->13813 13814 3e8c70 TlsAlloc 13813->13814 13815 3e7b7d 13813->13815 13815->13789 13816 3e8cee 13815->13816 13817 3e8b52 ___vcrt_FlsFree 5 API calls 13816->13817 13818 3e8d08 13817->13818 13819 3e8d23 TlsSetValue 13818->13819 13820 3e7b96 13818->13820 13819->13820 13820->13787 13821 3e7ba6 13820->13821 13822 3e7bb6 13821->13822 13823 3e7bb0 13821->13823 13822->13789 13825 3e8c78 13823->13825 13826 3e8b52 ___vcrt_FlsFree 5 API calls 13825->13826 13827 3e8c92 13826->13827 13828 3e8caa TlsFree 13827->13828 13829 3e8c9e 13827->13829 13828->13829 13829->13822 13831 3ebe21 13830->13831 13832 3ebe0b 13830->13832 13831->13714 13832->13831 13836 3ebe2e 13832->13836 13834 3ebe18 13834->13831 13853 3ebf99 13834->13853 13837 3ebe3a 13836->13837 13838 3ebe37 13836->13838 13861 3f4ee4 13837->13861 13838->13834 13843 3ebe4b 13888 3eefd8 13843->13888 13844 3ebe57 13894 3ebe88 13844->13894 13849 3eefd8 ___free_lconv_mon 14 API calls 13850 3ebe7b 13849->13850 13851 3eefd8 ___free_lconv_mon 14 API calls 13850->13851 13852 3ebe81 13851->13852 13852->13834 13854 3ebfa8 13853->13854 13855 3ec00a 13853->13855 13854->13855 13856 3eef7b _unexpected 14 API calls 13854->13856 13857 3ec00e 13854->13857 13858 3f3e34 WideCharToMultiByte std::_Locinfo::_Locinfo_ctor 13854->13858 13860 3eefd8 ___free_lconv_mon 14 API calls 13854->13860 13855->13831 13856->13854 13859 3eefd8 ___free_lconv_mon 14 API calls 13857->13859 13858->13854 13859->13855 13860->13854 13862 3f4eed 13861->13862 13863 3ebe40 13861->13863 13916 3eed4b 13862->13916 13867 3f51e6 GetEnvironmentStringsW 13863->13867 13868 3f51fe 13867->13868 13869 3ebe45 13867->13869 13870 3f3e34 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 13868->13870 13869->13843 13869->13844 13871 3f521b 13870->13871 13872 3f5225 FreeEnvironmentStringsW 13871->13872 13873 3f5230 13871->13873 13872->13869 13874 3f2001 __strnicoll 15 API calls 13873->13874 13875 3f5237 13874->13875 13876 3f523f 13875->13876 13877 3f5250 13875->13877 13878 3eefd8 ___free_lconv_mon 14 API calls 13876->13878 13879 3f3e34 std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 13877->13879 13880 3f5244 FreeEnvironmentStringsW 13878->13880 13881 3f5260 13879->13881 13880->13869 13882 3f526f 13881->13882 13883 3f5267 13881->13883 13885 3eefd8 ___free_lconv_mon 14 API calls 13882->13885 13884 3eefd8 ___free_lconv_mon 14 API calls 13883->13884 13886 3f526d FreeEnvironmentStringsW 13884->13886 13885->13886 13886->13869 13889 3eefe3 HeapFree 13888->13889 13890 3ebe51 13888->13890 13889->13890 13891 3eeff8 GetLastError 13889->13891 13890->13834 13892 3ef005 __dosmaperr 13891->13892 13893 3eb318 __strnicoll 12 API calls 13892->13893 13893->13890 13895 3ebe9d 13894->13895 13896 3eef7b _unexpected 14 API calls 13895->13896 13897 3ebec4 13896->13897 13898 3ebecc 13897->13898 13907 3ebed6 13897->13907 13899 3eefd8 ___free_lconv_mon 14 API calls 13898->13899 13915 3ebe5e 13899->13915 13900 3ebf33 13901 3eefd8 ___free_lconv_mon 14 API calls 13900->13901 13901->13915 13902 3eef7b _unexpected 14 API calls 13902->13907 13903 3ebf42 14479 3ebf6a 13903->14479 13907->13900 13907->13902 13907->13903 13909 3ebf5d 13907->13909 13911 3eefd8 ___free_lconv_mon 14 API calls 13907->13911 14470 3ee1f8 13907->14470 13908 3eefd8 ___free_lconv_mon 14 API calls 13910 3ebf4f 13908->13910 14485 3e912f IsProcessorFeaturePresent 13909->14485 13913 3eefd8 ___free_lconv_mon 14 API calls 13910->13913 13911->13907 13913->13915 13914 3ebf69 13915->13849 13917 3eed5c 13916->13917 13918 3eed56 13916->13918 13923 3eed62 13917->13923 13972 3ef503 13917->13972 13967 3ef4c4 13918->13967 13922 3eed7a 13977 3eef7b 13922->13977 13926 3eed67 13923->13926 13989 3eb237 13923->13989 13944 3f4cef 13926->13944 13929 3eed8e 13931 3ef503 _unexpected 6 API calls 13929->13931 13930 3eeda3 13932 3ef503 _unexpected 6 API calls 13930->13932 13933 3eed9a 13931->13933 13934 3eedaf 13932->13934 13938 3eefd8 ___free_lconv_mon 14 API calls 13933->13938 13935 3eedc2 13934->13935 13936 3eedb3 13934->13936 13984 3eeabe 13935->13984 13939 3ef503 _unexpected 6 API calls 13936->13939 13941 3eeda0 13938->13941 13939->13933 13941->13923 13942 3eefd8 ___free_lconv_mon 14 API calls 13943 3eedd4 13942->13943 13943->13926 14270 3f4e44 13944->14270 13951 3f4d4b 13953 3eefd8 ___free_lconv_mon 14 API calls 13951->13953 13952 3f4d59 14297 3f4f3f 13952->14297 13955 3f4d32 13953->13955 13955->13863 13957 3f4d91 13958 3eb318 __strnicoll 14 API calls 13957->13958 13960 3f4d96 13958->13960 13959 3f4dd8 13962 3f4e21 13959->13962 14308 3f4961 13959->14308 13963 3eefd8 ___free_lconv_mon 14 API calls 13960->13963 13961 3f4dac 13961->13959 13964 3eefd8 ___free_lconv_mon 14 API calls 13961->13964 13966 3eefd8 ___free_lconv_mon 14 API calls 13962->13966 13963->13955 13964->13959 13966->13955 14000 3ef2b3 13967->14000 13970 3ef4fb TlsGetValue 13971 3ef4e9 13971->13917 13973 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 13972->13973 13974 3ef51f 13973->13974 13975 3ef53d TlsSetValue 13974->13975 13976 3eed76 13974->13976 13976->13922 13976->13923 13983 3eef88 _unexpected 13977->13983 13978 3eefc8 14018 3eb318 13978->14018 13979 3eefb3 HeapAlloc 13980 3eed86 13979->13980 13979->13983 13980->13929 13980->13930 13983->13978 13983->13979 14015 3edc55 13983->14015 14055 3ee952 13984->14055 14157 3f2f8a 13989->14157 13992 3eb247 13994 3eb251 IsProcessorFeaturePresent 13992->13994 13999 3eb270 13992->13999 13995 3eb25d 13994->13995 14187 3e8f06 13995->14187 13996 3ec42e _unexpected 23 API calls 13998 3eb27a 13996->13998 13999->13996 14001 3ef2e1 14000->14001 14005 3ef2dd 14000->14005 14001->14005 14007 3ef1e8 14001->14007 14004 3ef2fb GetProcAddress 14004->14005 14006 3ef30b std::_Locinfo::_Locinfo_ctor 14004->14006 14005->13970 14005->13971 14006->14005 14013 3ef1f9 ___vcrt_FlsFree 14007->14013 14008 3ef28f 14008->14004 14008->14005 14009 3ef217 LoadLibraryExW 14010 3ef296 14009->14010 14011 3ef232 GetLastError 14009->14011 14010->14008 14012 3ef2a8 FreeLibrary 14010->14012 14011->14013 14012->14008 14013->14008 14013->14009 14014 3ef265 LoadLibraryExW 14013->14014 14014->14010 14014->14013 14021 3edc82 14015->14021 14032 3eede1 GetLastError 14018->14032 14020 3eb31d 14020->13980 14022 3edc8e ___scrt_is_nonwritable_in_current_image 14021->14022 14027 3ea8b5 EnterCriticalSection 14022->14027 14024 3edc99 14028 3edcd5 14024->14028 14027->14024 14031 3ea8fd LeaveCriticalSection 14028->14031 14030 3edc60 14030->13983 14031->14030 14033 3eedf7 14032->14033 14034 3eedfd 14032->14034 14035 3ef4c4 _unexpected 6 API calls 14033->14035 14036 3ef503 _unexpected 6 API calls 14034->14036 14052 3eee01 SetLastError 14034->14052 14035->14034 14037 3eee19 14036->14037 14039 3eef7b _unexpected 12 API calls 14037->14039 14037->14052 14040 3eee2e 14039->14040 14041 3eee36 14040->14041 14042 3eee47 14040->14042 14043 3ef503 _unexpected 6 API calls 14041->14043 14044 3ef503 _unexpected 6 API calls 14042->14044 14045 3eee44 14043->14045 14046 3eee53 14044->14046 14050 3eefd8 ___free_lconv_mon 12 API calls 14045->14050 14047 3eee6e 14046->14047 14048 3eee57 14046->14048 14051 3eeabe _unexpected 12 API calls 14047->14051 14049 3ef503 _unexpected 6 API calls 14048->14049 14049->14045 14050->14052 14053 3eee79 14051->14053 14052->14020 14054 3eefd8 ___free_lconv_mon 12 API calls 14053->14054 14054->14052 14056 3ee95e ___scrt_is_nonwritable_in_current_image 14055->14056 14069 3ea8b5 EnterCriticalSection 14056->14069 14058 3ee968 14070 3ee998 14058->14070 14061 3eea64 14062 3eea70 ___scrt_is_nonwritable_in_current_image 14061->14062 14074 3ea8b5 EnterCriticalSection 14062->14074 14064 3eea7a 14075 3eec45 14064->14075 14066 3eea92 14079 3eeab2 14066->14079 14069->14058 14073 3ea8fd LeaveCriticalSection 14070->14073 14072 3ee986 14072->14061 14073->14072 14074->14064 14076 3eec7b __Getctype 14075->14076 14077 3eec54 __Getctype 14075->14077 14076->14066 14077->14076 14082 3f662e 14077->14082 14156 3ea8fd LeaveCriticalSection 14079->14156 14081 3eeaa0 14081->13942 14083 3f6644 14082->14083 14084 3f66ae 14082->14084 14083->14084 14090 3f6677 14083->14090 14091 3eefd8 ___free_lconv_mon 14 API calls 14083->14091 14086 3eefd8 ___free_lconv_mon 14 API calls 14084->14086 14109 3f66fc 14084->14109 14087 3f66d0 14086->14087 14088 3eefd8 ___free_lconv_mon 14 API calls 14087->14088 14092 3f66e3 14088->14092 14089 3f6699 14093 3eefd8 ___free_lconv_mon 14 API calls 14089->14093 14090->14089 14097 3eefd8 ___free_lconv_mon 14 API calls 14090->14097 14095 3f666c 14091->14095 14096 3eefd8 ___free_lconv_mon 14 API calls 14092->14096 14098 3f66a3 14093->14098 14094 3f676a 14099 3eefd8 ___free_lconv_mon 14 API calls 14094->14099 14110 3f58e4 14095->14110 14101 3f66f1 14096->14101 14102 3f668e 14097->14102 14103 3eefd8 ___free_lconv_mon 14 API calls 14098->14103 14104 3f6770 14099->14104 14106 3eefd8 ___free_lconv_mon 14 API calls 14101->14106 14138 3f5d98 14102->14138 14103->14084 14104->14076 14105 3f670a 14105->14094 14108 3eefd8 14 API calls ___free_lconv_mon 14105->14108 14106->14109 14108->14105 14150 3f679f 14109->14150 14111 3f58f5 14110->14111 14137 3f59de 14110->14137 14112 3eefd8 ___free_lconv_mon 14 API calls 14111->14112 14114 3f5906 14111->14114 14112->14114 14113 3f5918 14116 3f592a 14113->14116 14118 3eefd8 ___free_lconv_mon 14 API calls 14113->14118 14114->14113 14115 3eefd8 ___free_lconv_mon 14 API calls 14114->14115 14115->14113 14117 3f593c 14116->14117 14119 3eefd8 ___free_lconv_mon 14 API calls 14116->14119 14120 3f594e 14117->14120 14121 3eefd8 ___free_lconv_mon 14 API calls 14117->14121 14118->14116 14119->14117 14122 3f5960 14120->14122 14123 3eefd8 ___free_lconv_mon 14 API calls 14120->14123 14121->14120 14124 3f5972 14122->14124 14126 3eefd8 ___free_lconv_mon 14 API calls 14122->14126 14123->14122 14125 3f5984 14124->14125 14127 3eefd8 ___free_lconv_mon 14 API calls 14124->14127 14128 3f5996 14125->14128 14129 3eefd8 ___free_lconv_mon 14 API calls 14125->14129 14126->14124 14127->14125 14130 3f59a8 14128->14130 14131 3eefd8 ___free_lconv_mon 14 API calls 14128->14131 14129->14128 14132 3f59ba 14130->14132 14134 3eefd8 ___free_lconv_mon 14 API calls 14130->14134 14131->14130 14133 3f59cc 14132->14133 14135 3eefd8 ___free_lconv_mon 14 API calls 14132->14135 14136 3eefd8 ___free_lconv_mon 14 API calls 14133->14136 14133->14137 14134->14132 14135->14133 14136->14137 14137->14090 14139 3f5da5 14138->14139 14149 3f5dfd 14138->14149 14140 3eefd8 ___free_lconv_mon 14 API calls 14139->14140 14142 3f5db5 14139->14142 14140->14142 14141 3f5dc7 14144 3f5dd9 14141->14144 14145 3eefd8 ___free_lconv_mon 14 API calls 14141->14145 14142->14141 14143 3eefd8 ___free_lconv_mon 14 API calls 14142->14143 14143->14141 14146 3f5deb 14144->14146 14147 3eefd8 ___free_lconv_mon 14 API calls 14144->14147 14145->14144 14148 3eefd8 ___free_lconv_mon 14 API calls 14146->14148 14146->14149 14147->14146 14148->14149 14149->14089 14151 3f67cb 14150->14151 14152 3f67ac 14150->14152 14151->14105 14152->14151 14153 3f62b3 __Getctype 14 API calls 14152->14153 14154 3f67c5 14153->14154 14155 3eefd8 ___free_lconv_mon 14 API calls 14154->14155 14155->14151 14156->14081 14193 3f2ebc 14157->14193 14160 3f2fcf 14161 3f2fdb ___scrt_is_nonwritable_in_current_image 14160->14161 14162 3f3002 _unexpected 14161->14162 14163 3eede1 __strnicoll 14 API calls 14161->14163 14167 3f3008 _unexpected 14161->14167 14164 3f304f 14162->14164 14162->14167 14186 3f3039 14162->14186 14163->14162 14165 3eb318 __strnicoll 14 API calls 14164->14165 14166 3f3054 14165->14166 14204 3e9102 14166->14204 14169 3f307b 14167->14169 14207 3ea8b5 EnterCriticalSection 14167->14207 14172 3f31ae 14169->14172 14173 3f30bd 14169->14173 14183 3f30ec 14169->14183 14174 3f31b9 14172->14174 14239 3ea8fd LeaveCriticalSection 14172->14239 14173->14183 14208 3eec90 GetLastError 14173->14208 14177 3ec42e _unexpected 23 API calls 14174->14177 14179 3f31c1 14177->14179 14180 3eec90 _unexpected 41 API calls 14184 3f3141 14180->14184 14182 3eec90 _unexpected 41 API calls 14182->14183 14235 3f315b 14183->14235 14185 3eec90 _unexpected 41 API calls 14184->14185 14184->14186 14185->14186 14186->13992 14188 3e8f22 __fread_nolock _unexpected 14187->14188 14189 3e8f4e IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14188->14189 14192 3e901f _unexpected 14189->14192 14191 3e903d 14191->13999 14262 3e4956 14192->14262 14194 3f2ec8 ___scrt_is_nonwritable_in_current_image 14193->14194 14199 3ea8b5 EnterCriticalSection 14194->14199 14196 3f2ed6 14200 3f2f14 14196->14200 14199->14196 14203 3ea8fd LeaveCriticalSection 14200->14203 14202 3eb23c 14202->13992 14202->14160 14203->14202 14240 3e904e 14204->14240 14207->14169 14209 3eeca6 14208->14209 14210 3eecac 14208->14210 14211 3ef4c4 _unexpected 6 API calls 14209->14211 14212 3ef503 _unexpected 6 API calls 14210->14212 14214 3eecb0 SetLastError 14210->14214 14211->14210 14213 3eecc8 14212->14213 14213->14214 14216 3eef7b _unexpected 14 API calls 14213->14216 14217 3eed45 14214->14217 14218 3eed40 14214->14218 14219 3eecdd 14216->14219 14220 3eb237 __purecall 39 API calls 14217->14220 14218->14182 14221 3eecf6 14219->14221 14222 3eece5 14219->14222 14225 3eed4a 14220->14225 14224 3ef503 _unexpected 6 API calls 14221->14224 14223 3ef503 _unexpected 6 API calls 14222->14223 14226 3eecf3 14223->14226 14227 3eed02 14224->14227 14231 3eefd8 ___free_lconv_mon 14 API calls 14226->14231 14228 3eed1d 14227->14228 14229 3eed06 14227->14229 14232 3eeabe _unexpected 14 API calls 14228->14232 14230 3ef503 _unexpected 6 API calls 14229->14230 14230->14226 14231->14214 14233 3eed28 14232->14233 14234 3eefd8 ___free_lconv_mon 14 API calls 14233->14234 14234->14214 14236 3f3132 14235->14236 14237 3f3161 14235->14237 14236->14180 14236->14184 14236->14186 14261 3ea8fd LeaveCriticalSection 14237->14261 14239->14174 14241 3e9060 _Fputc 14240->14241 14246 3e9085 14241->14246 14247 3e9095 14246->14247 14249 3e909c 14246->14249 14248 3e8ea0 _Fputc 16 API calls 14247->14248 14248->14249 14250 3e8e77 _Fputc GetLastError SetLastError 14249->14250 14254 3e9078 14249->14254 14251 3e90d1 14250->14251 14252 3e912f _Deallocate 11 API calls 14251->14252 14251->14254 14253 3e9101 14252->14253 14255 3e8e3b 14254->14255 14256 3e8e47 14255->14256 14257 3e8e5e 14256->14257 14258 3e8ee6 _Fputc 41 API calls 14256->14258 14259 3e8ee6 _Fputc 41 API calls 14257->14259 14260 3e8e71 14257->14260 14258->14257 14259->14260 14260->14186 14261->14236 14263 3e495e 14262->14263 14264 3e495f IsProcessorFeaturePresent 14262->14264 14263->14191 14266 3e5274 14264->14266 14269 3e5237 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14266->14269 14268 3e5357 14268->14191 14269->14268 14271 3f4e50 ___scrt_is_nonwritable_in_current_image 14270->14271 14272 3f4e6a 14271->14272 14316 3ea8b5 EnterCriticalSection 14271->14316 14274 3f4d19 14272->14274 14277 3eb237 __purecall 41 API calls 14272->14277 14281 3f4a6f 14274->14281 14275 3f4ea6 14317 3f4ec3 14275->14317 14278 3f4ee3 14277->14278 14279 3f4e7a 14279->14275 14280 3eefd8 ___free_lconv_mon 14 API calls 14279->14280 14280->14275 14321 3eb32b 14281->14321 14284 3f4aa2 14286 3f4aa7 GetACP 14284->14286 14287 3f4ab9 14284->14287 14285 3f4a90 GetOEMCP 14285->14287 14286->14287 14287->13955 14288 3f2001 14287->14288 14289 3f203f 14288->14289 14290 3f200f 14288->14290 14291 3eb318 __strnicoll 14 API calls 14289->14291 14292 3f202a HeapAlloc 14290->14292 14295 3f2013 _unexpected 14290->14295 14294 3f2044 14291->14294 14293 3f203d 14292->14293 14292->14295 14293->14294 14294->13951 14294->13952 14295->14289 14295->14292 14296 3edc55 codecvt 2 API calls 14295->14296 14296->14295 14298 3f4a6f 43 API calls 14297->14298 14299 3f4f5f 14298->14299 14301 3f4f9c IsValidCodePage 14299->14301 14302 3f4fd8 __fread_nolock 14299->14302 14300 3e4956 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14303 3f4d86 14300->14303 14301->14302 14304 3f4fae 14301->14304 14302->14300 14303->13957 14303->13961 14305 3f4fdd GetCPInfo 14304->14305 14307 3f4fb7 __fread_nolock 14304->14307 14305->14302 14305->14307 14363 3f4b43 14307->14363 14309 3f496d ___scrt_is_nonwritable_in_current_image 14308->14309 14444 3ea8b5 EnterCriticalSection 14309->14444 14311 3f4977 14445 3f49ae 14311->14445 14316->14279 14320 3ea8fd LeaveCriticalSection 14317->14320 14319 3f4eca 14319->14272 14320->14319 14322 3eb349 14321->14322 14328 3eb342 14321->14328 14323 3eec90 _unexpected 41 API calls 14322->14323 14322->14328 14324 3eb36a 14323->14324 14329 3f26fa 14324->14329 14328->14284 14328->14285 14330 3f270d 14329->14330 14331 3eb380 14329->14331 14330->14331 14337 3f687a 14330->14337 14333 3f2758 14331->14333 14334 3f276b 14333->14334 14336 3f2780 14333->14336 14334->14336 14358 3f4f2c 14334->14358 14336->14328 14338 3f6886 ___scrt_is_nonwritable_in_current_image 14337->14338 14339 3eec90 _unexpected 41 API calls 14338->14339 14340 3f688f 14339->14340 14341 3f68d5 14340->14341 14350 3ea8b5 EnterCriticalSection 14340->14350 14341->14331 14343 3f68ad 14351 3f68fb 14343->14351 14348 3eb237 __purecall 41 API calls 14349 3f68fa 14348->14349 14350->14343 14352 3f6909 __Getctype 14351->14352 14354 3f68be 14351->14354 14353 3f662e __Getctype 14 API calls 14352->14353 14352->14354 14353->14354 14355 3f68da 14354->14355 14356 3ea8fd std::_Lockit::~_Lockit LeaveCriticalSection 14355->14356 14357 3f68d1 14356->14357 14357->14341 14357->14348 14359 3eec90 _unexpected 41 API calls 14358->14359 14360 3f4f31 14359->14360 14361 3f4e44 __strnicoll 41 API calls 14360->14361 14362 3f4f3c 14361->14362 14362->14336 14364 3f4c34 14363->14364 14365 3f4b6b GetCPInfo 14363->14365 14368 3e4956 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14364->14368 14365->14364 14366 3f4b83 14365->14366 14374 3f2b18 14366->14374 14370 3f4ced 14368->14370 14370->14302 14373 3f2e0f 46 API calls 14373->14364 14375 3eb32b __strnicoll 41 API calls 14374->14375 14376 3f2b38 14375->14376 14394 3f3db8 14376->14394 14378 3f2bfc 14381 3e4956 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14378->14381 14379 3f2bf4 14397 3e46a9 14379->14397 14380 3f2b65 14380->14378 14380->14379 14383 3f2001 __strnicoll 15 API calls 14380->14383 14385 3f2b8a __fread_nolock __alloca_probe_16 14380->14385 14384 3f2c1f 14381->14384 14383->14385 14389 3f2e0f 14384->14389 14385->14379 14386 3f3db8 __strnicoll MultiByteToWideChar 14385->14386 14387 3f2bd5 14386->14387 14387->14379 14388 3f2be0 GetStringTypeW 14387->14388 14388->14379 14390 3eb32b __strnicoll 41 API calls 14389->14390 14391 3f2e22 14390->14391 14404 3f2c21 14391->14404 14395 3f3dc9 MultiByteToWideChar 14394->14395 14395->14380 14398 3e46c4 14397->14398 14399 3e46b3 14397->14399 14398->14378 14399->14398 14401 3ea859 14399->14401 14402 3eefd8 ___free_lconv_mon 14 API calls 14401->14402 14403 3ea871 14402->14403 14403->14398 14405 3f2c3c ctype 14404->14405 14406 3f3db8 __strnicoll MultiByteToWideChar 14405->14406 14408 3f2c82 14406->14408 14407 3e4956 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14409 3f2e0d 14407->14409 14410 3f2001 __strnicoll 15 API calls 14408->14410 14412 3f2ca8 __alloca_probe_16 14408->14412 14413 3f2dfa 14408->14413 14424 3f2d2e 14408->14424 14409->14373 14410->14412 14411 3e46a9 __freea 14 API calls 14411->14413 14414 3f3db8 __strnicoll MultiByteToWideChar 14412->14414 14412->14424 14413->14407 14415 3f2ced 14414->14415 14415->14424 14432 3ef682 14415->14432 14418 3f2d1f 14423 3ef682 std::_Locinfo::_Locinfo_ctor 7 API calls 14418->14423 14418->14424 14419 3f2d57 14420 3f2de2 14419->14420 14421 3f2001 __strnicoll 15 API calls 14419->14421 14425 3f2d69 __alloca_probe_16 14419->14425 14422 3e46a9 __freea 14 API calls 14420->14422 14421->14425 14422->14424 14423->14424 14424->14411 14425->14420 14426 3ef682 std::_Locinfo::_Locinfo_ctor 7 API calls 14425->14426 14427 3f2dac 14426->14427 14427->14420 14441 3f3e34 14427->14441 14429 3f2dc6 14429->14420 14430 3f2dcf 14429->14430 14431 3e46a9 __freea 14 API calls 14430->14431 14431->14424 14433 3ef1b4 std::_Locinfo::_Locinfo_ctor 5 API calls 14432->14433 14434 3ef68d 14433->14434 14435 3ef6ba 14434->14435 14436 3ef693 LCMapStringEx 14434->14436 14437 3ef6df __strnicoll 5 API calls 14435->14437 14440 3ef6da 14436->14440 14439 3ef6d3 LCMapStringW 14437->14439 14439->14440 14440->14418 14440->14419 14440->14424 14442 3f3e4b WideCharToMultiByte 14441->14442 14442->14429 14444->14311 14455 3e9e1c 14445->14455 14447 3f49d0 14448 3e9e1c __fread_nolock 41 API calls 14447->14448 14449 3f49ef 14448->14449 14450 3f4984 14449->14450 14451 3eefd8 ___free_lconv_mon 14 API calls 14449->14451 14452 3f49a2 14450->14452 14451->14450 14469 3ea8fd LeaveCriticalSection 14452->14469 14454 3f4990 14454->13962 14456 3e9e2d 14455->14456 14462 3e9e29 _Yarn 14455->14462 14457 3e9e34 14456->14457 14461 3e9e47 __fread_nolock 14456->14461 14458 3eb318 __strnicoll 14 API calls 14457->14458 14459 3e9e39 14458->14459 14460 3e9102 __strnicoll 41 API calls 14459->14460 14460->14462 14461->14462 14463 3e9e7e 14461->14463 14464 3e9e75 14461->14464 14462->14447 14463->14462 14467 3eb318 __strnicoll 14 API calls 14463->14467 14465 3eb318 __strnicoll 14 API calls 14464->14465 14466 3e9e7a 14465->14466 14468 3e9102 __strnicoll 41 API calls 14466->14468 14467->14466 14468->14462 14469->14454 14471 3ee206 14470->14471 14472 3ee214 14470->14472 14471->14472 14477 3ee22c 14471->14477 14473 3eb318 __strnicoll 14 API calls 14472->14473 14474 3ee21c 14473->14474 14475 3e9102 __strnicoll 41 API calls 14474->14475 14476 3ee226 14475->14476 14476->13907 14477->14476 14478 3eb318 __strnicoll 14 API calls 14477->14478 14478->14474 14480 3ebf77 14479->14480 14484 3ebf48 14479->14484 14481 3ebf8e 14480->14481 14482 3eefd8 ___free_lconv_mon 14 API calls 14480->14482 14483 3eefd8 ___free_lconv_mon 14 API calls 14481->14483 14482->14480 14483->14484 14484->13908 14486 3e913b 14485->14486 14487 3e8f06 _unexpected 8 API calls 14486->14487 14488 3e9150 GetCurrentProcess TerminateProcess 14487->14488 14488->13914 14491 3e117b __EH_prolog3_catch _strlen 14489->14491 14514 3e1a71 14491->14514 14495 3e130c codecvt 14495->13719 14496 3e11d4 14518 3e1eb1 14496->14518 14498 3e186f _strlen 14497->14498 14672 3e137d 14498->14672 14500 3e187c 14500->13721 14502 3e1e98 14501->14502 14504 3e1e6e std::ios_base::_Init 14501->14504 14679 3e1746 14502->14679 14504->13723 14699 3fc168 14505->14699 14507 3fc236 _Yarn 14705 3fc14e 14507->14705 14511 3e1e09 14510->14511 14512 3e1e12 14510->14512 14513 3e1478 _Deallocate 41 API calls 14511->14513 14512->13731 14513->14512 14516 3e1a80 14514->14516 14515 3e1a9e 14515->14496 14516->14515 14530 3e1f9c 14516->14530 14519 3e1304 14518->14519 14521 3e1ec8 std::ios_base::_Init 14518->14521 14525 3e1b4b 14519->14525 14524 3e1f01 14521->14524 14538 3e1a17 14521->14538 14522 3e1f1a 14541 3e5a72 14524->14541 14654 3e21e9 14525->14654 14527 3e1b53 14529 3e1b25 14527->14529 14658 3e1d61 14527->14658 14529->14495 14531 3e1fa8 __EH_prolog3_catch 14530->14531 14532 3e204d codecvt 14531->14532 14533 3e1a71 51 API calls 14531->14533 14532->14515 14536 3e1fc7 14533->14536 14534 3e2045 14535 3e1b4b 51 API calls 14534->14535 14535->14532 14536->14534 14537 3e1eb1 std::ios_base::_Init 43 API calls 14536->14537 14537->14534 14544 3e1ad1 14538->14544 14542 3e5a8c 14541->14542 14543 3e5ab9 RaiseException 14541->14543 14542->14543 14543->14522 14545 3e1852 std::ios_base::_Init 43 API calls 14544->14545 14546 3e1af0 14545->14546 14553 3e18cc 14546->14553 14549 3e1dfe std::ios_base::_Init 41 API calls 14550 3e1b09 14549->14550 14551 3e4956 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14550->14551 14552 3e1a2c 14551->14552 14552->14524 14564 3e181e 14553->14564 14560 3e1dfe std::ios_base::_Init 41 API calls 14561 3e190f 14560->14561 14562 3e4956 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14561->14562 14563 3e192e 14562->14563 14563->14549 14565 3e183e 14564->14565 14584 3e13ee 14565->14584 14567 3e184b 14568 3e1cdf 14567->14568 14569 3e1cf9 _strlen 14568->14569 14570 3e1d10 14568->14570 14572 3e1e58 std::ios_base::_Init 43 API calls 14569->14572 14571 3e1e58 std::ios_base::_Init 43 API calls 14570->14571 14573 3e1d37 14571->14573 14572->14570 14574 3e1dfe std::ios_base::_Init 41 API calls 14573->14574 14575 3e1d3f std::ios_base::_Init 14574->14575 14576 3e1dfe std::ios_base::_Init 41 API calls 14575->14576 14577 3e1d52 14576->14577 14578 3e4956 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14577->14578 14579 3e18fc 14578->14579 14580 3e1a50 14579->14580 14581 3e1a5d 14580->14581 14636 3e19ca 14581->14636 14585 3e1450 14584->14585 14588 3e13ff std::ios_base::_Init 14584->14588 14599 3e1e24 14585->14599 14590 3e1406 _Yarn std::ios_base::_Init 14588->14590 14591 3e1319 14588->14591 14590->14567 14592 3e132c 14591->14592 14593 3e1324 14591->14593 14595 3e1338 14592->14595 14617 3e4918 14592->14617 14602 3e133b 14593->14602 14595->14590 14596 3e132a 14596->14590 14598 3e1336 14598->14590 14631 3e21a9 14599->14631 14603 3e134a 14602->14603 14604 3e1de1 Concurrency::cancel_current_task 14602->14604 14605 3e4918 codecvt 43 API calls 14603->14605 14606 3e5a72 std::_Xinvalid_argument RaiseException 14604->14606 14608 3e1350 14605->14608 14609 3e1dfd 14606->14609 14607 3e1357 14607->14596 14608->14604 14608->14607 14610 3e9112 14608->14610 14612 3e1e12 14609->14612 14614 3e1478 _Deallocate 41 API calls 14609->14614 14611 3e904e _Deallocate 41 API calls 14610->14611 14613 3e9121 14611->14613 14612->14596 14615 3e912f _Deallocate 11 API calls 14613->14615 14614->14612 14616 3e912e 14615->14616 14619 3e491d 14617->14619 14618 3ea92b _Yarn 15 API calls 14618->14619 14619->14618 14620 3e4937 14619->14620 14621 3edc55 codecvt EnterCriticalSection LeaveCriticalSection 14619->14621 14622 3e4939 14619->14622 14620->14598 14621->14619 14623 3e1de1 Concurrency::cancel_current_task 14622->14623 14625 3e4943 codecvt 14622->14625 14624 3e5a72 std::_Xinvalid_argument RaiseException 14623->14624 14627 3e1dfd 14624->14627 14626 3e5a72 std::_Xinvalid_argument RaiseException 14625->14626 14628 3e5231 14626->14628 14629 3e1e12 14627->14629 14630 3e1478 _Deallocate 41 API calls 14627->14630 14629->14598 14630->14629 14632 3e2123 std::invalid_argument::invalid_argument 42 API calls 14631->14632 14633 3e21ba 14632->14633 14634 3e5a72 std::_Xinvalid_argument RaiseException 14633->14634 14635 3e21c8 14634->14635 14639 3e59f0 14636->14639 14640 3e59fd 14639->14640 14646 3e1907 14639->14646 14640->14646 14647 3ea92b 14640->14647 14643 3ea859 _Yarn 14 API calls 14643->14646 14644 3ee1f8 ___std_exception_copy 41 API calls 14645 3e5a2a 14644->14645 14645->14643 14646->14560 14652 3f2001 _unexpected 14647->14652 14648 3f203f 14649 3eb318 __strnicoll 14 API calls 14648->14649 14651 3e5a1a 14649->14651 14650 3f202a HeapAlloc 14650->14651 14650->14652 14651->14644 14651->14645 14652->14648 14652->14650 14653 3edc55 codecvt EnterCriticalSection LeaveCriticalSection 14652->14653 14653->14652 14654->14527 14655 3e5e8d 14654->14655 14662 3e7b3c 14655->14662 14657 3e5e92 14657->14527 14659 3e1d6d __EH_prolog3_catch 14658->14659 14660 3e1da9 codecvt 14659->14660 14661 3e1eb1 std::ios_base::_Init 43 API calls 14659->14661 14660->14529 14661->14660 14663 3e7b48 GetLastError 14662->14663 14664 3e7b45 14662->14664 14667 3e8cb3 14663->14667 14664->14657 14668 3e8b52 ___vcrt_FlsFree 5 API calls 14667->14668 14669 3e8ccd 14668->14669 14670 3e8ce5 TlsGetValue 14669->14670 14671 3e7b5d SetLastError 14669->14671 14670->14671 14671->14657 14673 3e13e8 14672->14673 14676 3e138e std::ios_base::_Init 14672->14676 14674 3e1e24 std::ios_base::_Init 43 API calls 14673->14674 14675 3e13ed 14674->14675 14677 3e1319 std::ios_base::_Init 43 API calls 14676->14677 14678 3e1395 std::ios_base::_Init 14676->14678 14677->14678 14678->14500 14680 3e17cf 14679->14680 14681 3e175f std::ios_base::_Init 14679->14681 14682 3e1e24 std::ios_base::_Init 43 API calls 14680->14682 14684 3e1319 std::ios_base::_Init 43 API calls 14681->14684 14683 3e17d4 14682->14683 14685 3e177e std::ios_base::_Init 14684->14685 14686 3e17b4 std::ios_base::_Init 14685->14686 14688 3e1478 14685->14688 14686->14504 14689 3e1492 std::ios_base::_Ios_base_dtor 14688->14689 14690 3e1485 14688->14690 14689->14686 14692 3e1c2a 14690->14692 14693 3e1c47 14692->14693 14694 3e1c44 14692->14694 14695 3e904e _Deallocate 41 API calls 14693->14695 14694->14689 14696 3e9121 14695->14696 14697 3e912f _Deallocate 11 API calls 14696->14697 14698 3e912e 14697->14698 14700 3fc18c 14699->14700 14702 3fc1f4 14699->14702 14700->14702 14708 3e14a4 14700->14708 14701 3e1478 _Deallocate 41 API calls 14703 3fc208 14701->14703 14702->14701 14702->14703 14703->14507 14738 3fc000 14705->14738 14709 3e14b0 __EH_prolog3_catch 14708->14709 14710 3e155c 14709->14710 14711 3e14d0 14709->14711 14729 3e1e2f 14710->14729 14718 3e1e3a 14711->14718 14715 3e14e5 14725 3e1ca7 14715->14725 14717 3e153b codecvt 14717->14700 14719 3e1e45 14718->14719 14720 3e1e52 14718->14720 14721 3e1319 std::ios_base::_Init 43 API calls 14719->14721 14732 3e1de1 14720->14732 14723 3e1e4e 14721->14723 14723->14715 14726 3e1caf 14725->14726 14727 3e1cbf 14725->14727 14728 3e1478 _Deallocate 41 API calls 14726->14728 14727->14717 14728->14727 14730 3e21a9 std::_Xinvalid_argument 43 API calls 14729->14730 14731 3e1e39 14730->14731 14733 3e1def Concurrency::cancel_current_task 14732->14733 14734 3e5a72 std::_Xinvalid_argument RaiseException 14733->14734 14735 3e1dfd 14734->14735 14736 3e1e12 14735->14736 14737 3e1478 _Deallocate 41 API calls 14735->14737 14737->14736 14749 3e1366 14738->14749 14740 3fc129 14752 3e1567 14740->14752 14742 3fc135 14743 3e4956 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 14742->14743 14745 3fc147 CreateThread WaitForSingleObjectEx CloseHandle 14743->14745 14744 3e1852 std::ios_base::_Init 43 API calls 14746 3fc037 14744->14746 14745->13728 14746->14740 14746->14744 14748 3e1dfe std::ios_base::_Init 41 API calls 14746->14748 14755 3e1150 14746->14755 14748->14746 14750 3e4918 codecvt 43 API calls 14749->14750 14751 3e136d 14750->14751 14751->14746 14759 3e1587 14752->14759 14754 3e1578 std::ios_base::_Ios_base_dtor 14754->14742 14756 3e115c 14755->14756 14767 3e15d1 14756->14767 14758 3e116b 14758->14746 14761 3e1591 14759->14761 14760 3e15b3 14760->14754 14761->14760 14762 3e1587 41 API calls 14761->14762 14764 3e15b8 14761->14764 14762->14761 14765 3e1dfe std::ios_base::_Init 41 API calls 14764->14765 14766 3e15c5 std::ios_base::_Ios_base_dtor 14765->14766 14766->14761 14768 3e15dd __EH_prolog3_catch 14767->14768 14769 3e1a71 51 API calls 14768->14769 14774 3e161a 14769->14774 14770 3e1eb1 std::ios_base::_Init 43 API calls 14771 3e1731 14770->14771 14772 3e1b4b 51 API calls 14771->14772 14773 3e1739 codecvt 14772->14773 14773->14758 14774->14770 14776 3ec27f 14775->14776 14777 3ec291 14775->14777 14802 3ec31a GetModuleHandleW 14776->14802 14787 3ec11a 14777->14787 14780 3ec2ce 14780->13686 14785 3ec2e3 14788 3ec126 ___scrt_is_nonwritable_in_current_image 14787->14788 14810 3ea8b5 EnterCriticalSection 14788->14810 14790 3ec130 14811 3ec167 14790->14811 14792 3ec13d 14815 3ec15b 14792->14815 14795 3ec2e9 14840 3ec35d 14795->14840 14798 3ec307 14800 3ec37f _unexpected 3 API calls 14798->14800 14799 3ec2f7 GetCurrentProcess TerminateProcess 14799->14798 14801 3ec30f ExitProcess 14800->14801 14803 3ec284 14802->14803 14803->14777 14804 3ec37f GetModuleHandleExW 14803->14804 14805 3ec3be GetProcAddress 14804->14805 14806 3ec3df 14804->14806 14805->14806 14807 3ec3d2 14805->14807 14808 3ec290 14806->14808 14809 3ec3e5 FreeLibrary 14806->14809 14807->14806 14808->14777 14809->14808 14810->14790 14812 3ec173 ___scrt_is_nonwritable_in_current_image 14811->14812 14814 3ec1da _unexpected 14812->14814 14818 3edf86 14812->14818 14814->14792 14839 3ea8fd LeaveCriticalSection 14815->14839 14817 3ec149 14817->14780 14817->14795 14819 3edf92 __EH_prolog3 14818->14819 14822 3edcde 14819->14822 14821 3edfb9 codecvt 14821->14814 14823 3edcea ___scrt_is_nonwritable_in_current_image 14822->14823 14830 3ea8b5 EnterCriticalSection 14823->14830 14825 3edcf8 14831 3ede96 14825->14831 14830->14825 14832 3edeb5 14831->14832 14833 3edd05 14831->14833 14832->14833 14834 3eefd8 ___free_lconv_mon 14 API calls 14832->14834 14835 3edd2d 14833->14835 14834->14833 14838 3ea8fd LeaveCriticalSection 14835->14838 14837 3edd16 14837->14821 14838->14837 14839->14817 14845 3f560e GetPEB 14840->14845 14843 3ec2f3 14843->14798 14843->14799 14844 3ec367 GetPEB 14844->14843 14846 3f5628 14845->14846 14847 3ec362 14845->14847 14849 3ef336 14846->14849 14847->14843 14847->14844 14850 3ef2b3 std::_Locinfo::_Locinfo_ctor 5 API calls 14849->14850 14851 3ef352 14850->14851 14851->14847 14853 3ee14a ___scrt_uninitialize_crt 14852->14853 14854 3ee138 14852->14854 14853->13751 14855 3ee146 14854->14855 14857 3e97ed 14854->14857 14855->13751 14860 3e967a 14857->14860 14863 3e956e 14860->14863 14864 3e957a ___scrt_is_nonwritable_in_current_image 14863->14864 14871 3ea8b5 EnterCriticalSection 14864->14871 14866 3e95f0 14880 3e960e 14866->14880 14868 3e9584 ___scrt_uninitialize_crt 14868->14866 14872 3e94e2 14868->14872 14871->14868 14873 3e94ee ___scrt_is_nonwritable_in_current_image 14872->14873 14883 3e9365 EnterCriticalSection 14873->14883 14875 3e9531 14897 3e9562 14875->14897 14876 3e94f8 ___scrt_uninitialize_crt 14876->14875 14884 3e9788 14876->14884 14999 3ea8fd LeaveCriticalSection 14880->14999 14882 3e95fc 14882->14855 14883->14876 14885 3e979d _Fputc 14884->14885 14886 3e97af 14885->14886 14887 3e97a4 14885->14887 14900 3e971f 14886->14900 14888 3e967a ___scrt_uninitialize_crt 70 API calls 14887->14888 14890 3e97aa 14888->14890 14892 3e8e3b _Fputc 41 API calls 14890->14892 14893 3e97e7 14892->14893 14893->14875 14895 3e97d0 14913 3efd51 14895->14913 14998 3e9379 LeaveCriticalSection 14897->14998 14899 3e9550 14899->14868 14901 3e9738 14900->14901 14905 3e975f 14900->14905 14902 3efa79 __fread_nolock 41 API calls 14901->14902 14901->14905 14903 3e9754 14902->14903 14924 3f057c 14903->14924 14905->14890 14906 3efa79 14905->14906 14907 3efa9a 14906->14907 14908 3efa85 14906->14908 14907->14895 14909 3eb318 __strnicoll 14 API calls 14908->14909 14910 3efa8a 14909->14910 14911 3e9102 __strnicoll 41 API calls 14910->14911 14912 3efa95 14911->14912 14912->14895 14914 3efd6f 14913->14914 14915 3efd62 14913->14915 14916 3efdb8 14914->14916 14919 3efd96 14914->14919 14917 3eb318 __strnicoll 14 API calls 14915->14917 14918 3eb318 __strnicoll 14 API calls 14916->14918 14921 3efd67 14917->14921 14920 3efdbd 14918->14920 14965 3efcaf 14919->14965 14923 3e9102 __strnicoll 41 API calls 14920->14923 14921->14890 14923->14921 14927 3f0588 ___scrt_is_nonwritable_in_current_image 14924->14927 14925 3f0590 14925->14905 14926 3f064c 14928 3e9085 _Fputc 29 API calls 14926->14928 14927->14925 14927->14926 14929 3f05dd 14927->14929 14928->14925 14935 3f578d EnterCriticalSection 14929->14935 14931 3f05e3 14932 3f0600 14931->14932 14936 3f0684 14931->14936 14962 3f0644 14932->14962 14935->14931 14937 3f06a9 14936->14937 14959 3f06cc __fread_nolock 14936->14959 14938 3f06ad 14937->14938 14940 3f070b 14937->14940 14939 3e9085 _Fputc 29 API calls 14938->14939 14939->14959 14941 3f1e62 ___scrt_uninitialize_crt 43 API calls 14940->14941 14943 3f0722 14940->14943 14941->14943 14942 3f0208 ___scrt_uninitialize_crt 42 API calls 14944 3f072c 14942->14944 14943->14942 14945 3f0772 14944->14945 14946 3f0732 14944->14946 14947 3f0786 14945->14947 14948 3f07d5 WriteFile 14945->14948 14949 3f075c 14946->14949 14950 3f0739 14946->14950 14953 3f078e 14947->14953 14954 3f07c3 14947->14954 14951 3f07f7 GetLastError 14948->14951 14948->14959 14952 3efdce ___scrt_uninitialize_crt 47 API calls 14949->14952 14958 3f01a0 ___scrt_uninitialize_crt 6 API calls 14950->14958 14950->14959 14951->14959 14952->14959 14956 3f0793 14953->14956 14957 3f07b1 14953->14957 14955 3f0286 ___scrt_uninitialize_crt 7 API calls 14954->14955 14955->14959 14956->14959 14961 3f0361 ___scrt_uninitialize_crt 7 API calls 14956->14961 14960 3f044a ___scrt_uninitialize_crt 8 API calls 14957->14960 14958->14959 14959->14932 14960->14959 14961->14959 14963 3f57b0 ___scrt_uninitialize_crt LeaveCriticalSection 14962->14963 14964 3f064a 14963->14964 14964->14925 14966 3efcbb ___scrt_is_nonwritable_in_current_image 14965->14966 14978 3f578d EnterCriticalSection 14966->14978 14968 3efcca 14976 3efd0f 14968->14976 14979 3f5864 14968->14979 14970 3eb318 __strnicoll 14 API calls 14972 3efd16 14970->14972 14971 3efcf6 FlushFileBuffers 14971->14972 14973 3efd02 GetLastError 14971->14973 14995 3efd45 14972->14995 14992 3eb305 14973->14992 14976->14970 14978->14968 14980 3f5886 14979->14980 14981 3f5871 14979->14981 14983 3eb305 __dosmaperr 14 API calls 14980->14983 14986 3f58ab 14980->14986 14982 3eb305 __dosmaperr 14 API calls 14981->14982 14984 3f5876 14982->14984 14987 3f58b6 14983->14987 14985 3eb318 __strnicoll 14 API calls 14984->14985 14988 3f587e 14985->14988 14986->14971 14989 3eb318 __strnicoll 14 API calls 14987->14989 14988->14971 14990 3f58be 14989->14990 14991 3e9102 __strnicoll 41 API calls 14990->14991 14991->14988 14993 3eede1 __strnicoll 14 API calls 14992->14993 14994 3eb30a 14993->14994 14994->14976 14996 3f57b0 ___scrt_uninitialize_crt LeaveCriticalSection 14995->14996 14997 3efd2e 14996->14997 14997->14921 14998->14899 14999->14882 18058 3ef9ed 18059 3ef9f9 ___scrt_is_nonwritable_in_current_image 18058->18059 18070 3ea8b5 EnterCriticalSection 18059->18070 18061 3efa00 18071 3f56ef 18061->18071 18064 3efa1e 18095 3efa44 18064->18095 18070->18061 18072 3f56fb ___scrt_is_nonwritable_in_current_image 18071->18072 18073 3f5725 18072->18073 18074 3f5704 18072->18074 18098 3ea8b5 EnterCriticalSection 18073->18098 18075 3eb318 __strnicoll 14 API calls 18074->18075 18077 3f5709 18075->18077 18078 3e9102 __strnicoll 41 API calls 18077->18078 18079 3efa0f 18078->18079 18079->18064 18084 3ef887 GetStartupInfoW 18079->18084 18080 3f575d 18106 3f5784 18080->18106 18083 3f5731 18083->18080 18099 3f563f 18083->18099 18085 3ef8a4 18084->18085 18087 3ef938 18084->18087 18086 3f56ef 42 API calls 18085->18086 18085->18087 18088 3ef8cc 18086->18088 18090 3ef93d 18087->18090 18088->18087 18089 3ef8fc GetFileType 18088->18089 18089->18088 18091 3ef944 18090->18091 18092 3ef987 GetStdHandle 18091->18092 18093 3ef9e9 18091->18093 18094 3ef99a GetFileType 18091->18094 18092->18091 18093->18064 18094->18091 18110 3ea8fd LeaveCriticalSection 18095->18110 18097 3efa2f 18098->18083 18100 3eef7b _unexpected 14 API calls 18099->18100 18102 3f5651 18100->18102 18101 3f565e 18103 3eefd8 ___free_lconv_mon 14 API calls 18101->18103 18102->18101 18104 3ef5c0 6 API calls 18102->18104 18105 3f56b3 18103->18105 18104->18102 18105->18083 18109 3ea8fd LeaveCriticalSection 18106->18109 18108 3f578b 18108->18079 18109->18108 18110->18097 15007 3f4ee4 15008 3f4eed 15007->15008 15009 3f4f1f 15007->15009 15010 3eed4b 41 API calls 15008->15010 15011 3f4f10 15010->15011 15012 3f4cef 52 API calls 15011->15012 15012->15009 16844 3e92d3 16845 3e97ed ___scrt_uninitialize_crt 70 API calls 16844->16845 16846 3e92db 16845->16846 16854 3ef79c 16846->16854 16848 3e92e0 16864 3ef847 16848->16864 16851 3e930a 16852 3eefd8 ___free_lconv_mon 14 API calls 16851->16852 16853 3e9315 16852->16853 16855 3ef7a8 ___scrt_is_nonwritable_in_current_image 16854->16855 16868 3ea8b5 EnterCriticalSection 16855->16868 16857 3ef81f 16875 3ef83e 16857->16875 16859 3ef7b3 16859->16857 16861 3ef7f3 DeleteCriticalSection 16859->16861 16869 3e94b2 16859->16869 16863 3eefd8 ___free_lconv_mon 14 API calls 16861->16863 16863->16859 16865 3ef85e 16864->16865 16866 3e92ef DeleteCriticalSection 16864->16866 16865->16866 16867 3eefd8 ___free_lconv_mon 14 API calls 16865->16867 16866->16848 16866->16851 16867->16866 16868->16859 16870 3e94c5 _Fputc 16869->16870 16878 3e938d 16870->16878 16872 3e94d1 16873 3e8e3b _Fputc 41 API calls 16872->16873 16874 3e94dd 16873->16874 16874->16859 16950 3ea8fd LeaveCriticalSection 16875->16950 16877 3ef82b 16877->16848 16879 3e9399 ___scrt_is_nonwritable_in_current_image 16878->16879 16880 3e93c6 16879->16880 16881 3e93a3 16879->16881 16888 3e93be 16880->16888 16889 3e9365 EnterCriticalSection 16880->16889 16882 3e9085 _Fputc 29 API calls 16881->16882 16882->16888 16884 3e93e4 16890 3e9424 16884->16890 16886 3e93f1 16904 3e941c 16886->16904 16888->16872 16889->16884 16891 3e9454 16890->16891 16892 3e9431 16890->16892 16894 3e971f ___scrt_uninitialize_crt 66 API calls 16891->16894 16902 3e944c 16891->16902 16893 3e9085 _Fputc 29 API calls 16892->16893 16893->16902 16895 3e946c 16894->16895 16896 3ef847 14 API calls 16895->16896 16897 3e9474 16896->16897 16898 3efa79 __fread_nolock 41 API calls 16897->16898 16899 3e9480 16898->16899 16907 3efb31 16899->16907 16902->16886 16903 3eefd8 ___free_lconv_mon 14 API calls 16903->16902 16949 3e9379 LeaveCriticalSection 16904->16949 16906 3e9422 16906->16888 16908 3efb5a 16907->16908 16909 3e9487 16907->16909 16910 3efba9 16908->16910 16912 3efb81 16908->16912 16909->16902 16909->16903 16911 3e9085 _Fputc 29 API calls 16910->16911 16911->16909 16914 3efaa0 16912->16914 16915 3efaac ___scrt_is_nonwritable_in_current_image 16914->16915 16922 3f578d EnterCriticalSection 16915->16922 16917 3efaba 16918 3efaeb 16917->16918 16923 3efbd4 16917->16923 16936 3efb25 16918->16936 16922->16917 16924 3f5864 __fread_nolock 41 API calls 16923->16924 16926 3efbe4 16924->16926 16925 3efbea 16939 3f57d3 16925->16939 16926->16925 16927 3efc1c 16926->16927 16929 3f5864 __fread_nolock 41 API calls 16926->16929 16927->16925 16930 3f5864 __fread_nolock 41 API calls 16927->16930 16931 3efc13 16929->16931 16932 3efc28 CloseHandle 16930->16932 16933 3f5864 __fread_nolock 41 API calls 16931->16933 16932->16925 16934 3efc34 GetLastError 16932->16934 16933->16927 16934->16925 16935 3efc42 __fread_nolock 16935->16918 16948 3f57b0 LeaveCriticalSection 16936->16948 16938 3efb0e 16938->16909 16940 3f5849 16939->16940 16941 3f57e2 16939->16941 16942 3eb318 __strnicoll 14 API calls 16940->16942 16941->16940 16947 3f580c 16941->16947 16943 3f584e 16942->16943 16944 3eb305 __dosmaperr 14 API calls 16943->16944 16945 3f5839 16944->16945 16945->16935 16946 3f5833 SetStdHandle 16946->16945 16947->16945 16947->16946 16948->16938 16949->16906 16950->16877

                      Control-flow Graph

                      APIs
                      • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00BB02FC
                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00BB030F
                      • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00BB032D
                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00BB0351
                      • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 00BB037C
                      • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 00BB03D4
                      • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 00BB041F
                      • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00BB045D
                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 00BB0499
                      • ResumeThread.KERNELBASE(?), ref: 00BB04A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622771583.0000000000BB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BB0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_bb0000_file.jbxd
                      Similarity
                      • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                      • String ID: GetP$Load$aryA$ress
                      • API String ID: 2687962208-977067982
                      • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                      • Instruction ID: 703787a027bc7e031c0ea5087f489b5d519ee728bcd9b767fa7a999b3e18d142
                      • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                      • Instruction Fuzzy Hash: 03B1E67664024AAFDB60CF68CC80BEA77E5FF88714F158564EA0CAB341D774FA418B94
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d3a586ec2da16d7fd3ee7ee03ae3402aab8ac5a3c6cbba84838bbe677f8115f
                      • Instruction ID: 4a8786e5b9fdbf7e8fc458f9f03c35bb8d7d080b62654e6ccc57edfee49179ec
                      • Opcode Fuzzy Hash: 6d3a586ec2da16d7fd3ee7ee03ae3402aab8ac5a3c6cbba84838bbe677f8115f
                      • Instruction Fuzzy Hash: C7E08C32912278EBCB26DB89C904D9AF3ECEB44B00B5500AAF611D3200C2B0DE00DBD0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4c992419eee8842309e7582ba631cfc6caef1f6ffe052a819ae54955aa5ef9da
                      • Instruction ID: 1c5742d41ce44d51f816b6f66da8cc527e96286b5d446590ddae939047a5eb02
                      • Opcode Fuzzy Hash: 4c992419eee8842309e7582ba631cfc6caef1f6ffe052a819ae54955aa5ef9da
                      • Instruction Fuzzy Hash: 2DC08C380109A047CE2B891892713BE3354A3977C2F80258CC6034BAA2CA1E9C83DE00

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 23 3ef1e8-3ef1f4 24 3ef286-3ef289 23->24 25 3ef28f 24->25 26 3ef1f9-3ef20a 24->26 27 3ef291-3ef295 25->27 28 3ef20c-3ef20f 26->28 29 3ef217-3ef230 LoadLibraryExW 26->29 30 3ef2af-3ef2b1 28->30 31 3ef215 28->31 32 3ef296-3ef2a6 29->32 33 3ef232-3ef23b GetLastError 29->33 30->27 35 3ef283 31->35 32->30 34 3ef2a8-3ef2a9 FreeLibrary 32->34 36 3ef23d-3ef24f call 3ee918 33->36 37 3ef274-3ef281 33->37 34->30 35->24 36->37 40 3ef251-3ef263 call 3ee918 36->40 37->35 40->37 43 3ef265-3ef272 LoadLibraryExW 40->43 43->32 43->37
                      APIs
                      • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,04B05F4C,?,003EF2F5,?,?,00000000,00000000), ref: 003EF2A9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: FreeLibrary
                      • String ID: api-ms-$ext-ms-
                      • API String ID: 3664257935-537541572
                      • Opcode ID: 2fb4a96eb1ce9b4c6ccd8ad87139896841ddaafeb56da497c2df5dfdbed70f65
                      • Instruction ID: 763db451c62e50090423a505538f7092b1ce2cca6fa344304a0660861fca5b12
                      • Opcode Fuzzy Hash: 2fb4a96eb1ce9b4c6ccd8ad87139896841ddaafeb56da497c2df5dfdbed70f65
                      • Instruction Fuzzy Hash: 57213D3DA00271AFCB239722EC45AAA376D9F41764F260730FA05A72D1EBB0ED01C6D0

                      Control-flow Graph

                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,ole,00000000,?,?,003FC2FD), ref: 003FC222
                        • Part of subcall function 003FC168: _Deallocate.LIBCONCRT ref: 003FC203
                      • CreateThread.KERNELBASE(00000000,00000000,00000188,00407018,00000000,00000000), ref: 003FC256
                      • WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,?,003FC2FD), ref: 003FC262
                      • CloseHandle.KERNEL32(00000000,?,?,003FC2FD), ref: 003FC269
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocCloseCreateDeallocateHandleObjectSingleThreadVirtualWait
                      • String ID: ole
                      • API String ID: 440434604-1213916275
                      • Opcode ID: 388cf06e6824535b4362e7df02519d3883116eddcbc4eb0dc5800b2351d9c9af
                      • Instruction ID: d97a8070d0929c1dbb7da288e7ba6aa47fd964dac08dbab48bcd3f102d70f017
                      • Opcode Fuzzy Hash: 388cf06e6824535b4362e7df02519d3883116eddcbc4eb0dc5800b2351d9c9af
                      • Instruction Fuzzy Hash: B1F0A77224111C7FD1122766AC4DEBB3A1CDB877EAF410121FB05950D2CE162D0697B9

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 51 3f2c21-3f2c3a 52 3f2c3c-3f2c4c call 3eb4db 51->52 53 3f2c50-3f2c55 51->53 52->53 60 3f2c4e 52->60 55 3f2c57-3f2c61 53->55 56 3f2c64-3f2c8a call 3f3db8 53->56 55->56 61 3f2dfd-3f2e0e call 3e4956 56->61 62 3f2c90-3f2c9b 56->62 60->53 63 3f2ca1-3f2ca6 62->63 64 3f2df0 62->64 66 3f2cbb-3f2cc6 call 3f2001 63->66 67 3f2ca8-3f2cb1 call 3e4ca0 63->67 68 3f2df2 64->68 77 3f2cd1-3f2cd5 66->77 78 3f2cc8 66->78 76 3f2cb3-3f2cb9 67->76 67->77 72 3f2df4-3f2dfb call 3e46a9 68->72 72->61 80 3f2cce 76->80 77->68 81 3f2cdb-3f2cf2 call 3f3db8 77->81 78->80 80->77 81->68 84 3f2cf8-3f2d0a call 3ef682 81->84 86 3f2d0f-3f2d13 84->86 87 3f2d2e-3f2d30 86->87 88 3f2d15-3f2d1d 86->88 87->68 89 3f2d1f-3f2d24 88->89 90 3f2d57-3f2d63 88->90 91 3f2d2a-3f2d2c 89->91 92 3f2dd6-3f2dd8 89->92 93 3f2d65-3f2d67 90->93 94 3f2de2 90->94 91->87 96 3f2d35-3f2d4f call 3ef682 91->96 92->72 97 3f2d7c-3f2d87 call 3f2001 93->97 98 3f2d69-3f2d72 call 3e4ca0 93->98 95 3f2de4-3f2deb call 3e46a9 94->95 95->87 96->92 109 3f2d55 96->109 97->95 108 3f2d89 97->108 98->95 107 3f2d74-3f2d7a 98->107 110 3f2d8f-3f2d94 107->110 108->110 109->87 110->95 111 3f2d96-3f2dae call 3ef682 110->111 111->95 114 3f2db0-3f2db7 111->114 115 3f2dda-3f2de0 114->115 116 3f2db9-3f2dba 114->116 117 3f2dbb-3f2dcd call 3f3e34 115->117 116->117 117->95 120 3f2dcf-3f2dd5 call 3e46a9 117->120 120->92
                      APIs
                      • __alloca_probe_16.LIBCMT ref: 003F2CA8
                      • __alloca_probe_16.LIBCMT ref: 003F2D69
                      • __freea.LIBCMT ref: 003F2DD0
                        • Part of subcall function 003F2001: HeapAlloc.KERNEL32(00000000,003E21BA,?,?,003E5A1A,?,?,?,00000000,?,003E19F6,003E21BA,?,?,?,?), ref: 003F2033
                      • __freea.LIBCMT ref: 003F2DE5
                      • __freea.LIBCMT ref: 003F2DF5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: __freea$__alloca_probe_16$AllocHeap
                      • String ID:
                      • API String ID: 1096550386-0
                      • Opcode ID: 8470fec4c76af44910d0860821ab33e7aaa9767f6f3b835b1daa4c03c117dde2
                      • Instruction ID: c3f244d4a18619a65e61a419265f20eb59ed80e55e2bb043777293179444aeed
                      • Opcode Fuzzy Hash: 8470fec4c76af44910d0860821ab33e7aaa9767f6f3b835b1daa4c03c117dde2
                      • Instruction Fuzzy Hash: 5151B07260025EEFEF279F65CC41EBB7AA9EF48350B160129FE14DA250EB31CC5097A0

                      Control-flow Graph

                      APIs
                      • GetCurrentProcess.KERNEL32(?,?,003EC2E3,00000000,003E8F02,?,?,04B05F4C,003E8F02,?), ref: 003EC2FA
                      • TerminateProcess.KERNEL32(00000000,?,003EC2E3,00000000,003E8F02,?,?,04B05F4C,003E8F02,?), ref: 003EC301
                      • ExitProcess.KERNEL32 ref: 003EC313
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$CurrentExitTerminate
                      • String ID:
                      • API String ID: 1703294689-0
                      • Opcode ID: 0fc937b8146f12d6a1bcde26dabe5a7e5d5fa71e388417b5741b0c708917f839
                      • Instruction ID: 81905b2dd1da848d905303faa98c6ac9d1d82e1b6a68659bb10502c761194405
                      • Opcode Fuzzy Hash: 0fc937b8146f12d6a1bcde26dabe5a7e5d5fa71e388417b5741b0c708917f839
                      • Instruction Fuzzy Hash: C6D06775010559ABCF032F61ED0D96D3F2AAA45345F049110B94989171CF36D953DA80

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 130 3f4f3f-3f4f67 call 3f4a6f 133 3f512f-3f5130 call 3f4ae0 130->133 134 3f4f6d-3f4f73 130->134 137 3f5135-3f5137 133->137 136 3f4f76-3f4f7c 134->136 138 3f507e-3f509d call 3e6090 136->138 139 3f4f82-3f4f8e 136->139 141 3f5138-3f5146 call 3e4956 137->141 147 3f50a0-3f50a5 138->147 139->136 142 3f4f90-3f4f96 139->142 145 3f4f9c-3f4fa8 IsValidCodePage 142->145 146 3f5076-3f5079 142->146 145->146 149 3f4fae-3f4fb5 145->149 146->141 150 3f50a7-3f50ac 147->150 151 3f50e2-3f50ec 147->151 152 3f4fdd-3f4fea GetCPInfo 149->152 153 3f4fb7-3f4fc3 149->153 156 3f50df 150->156 157 3f50ae-3f50b6 150->157 151->147 158 3f50ee-3f5118 call 3f4a31 151->158 154 3f4fec-3f500b call 3e6090 152->154 155 3f506a-3f5070 152->155 159 3f4fc7-3f4fd3 call 3f4b43 153->159 154->159 170 3f500d-3f5014 154->170 155->133 155->146 156->151 161 3f50b8-3f50bb 157->161 162 3f50d7-3f50dd 157->162 169 3f5119-3f5128 158->169 166 3f4fd8 159->166 168 3f50bd-3f50c3 161->168 162->150 162->156 166->137 168->162 171 3f50c5-3f50d5 168->171 169->169 172 3f512a 169->172 173 3f5016-3f501b 170->173 174 3f5040-3f5043 170->174 171->162 171->168 172->133 173->174 175 3f501d-3f5025 173->175 176 3f5048-3f504f 174->176 177 3f5038-3f503e 175->177 178 3f5027-3f502e 175->178 176->176 179 3f5051-3f5065 call 3f4a31 176->179 177->173 177->174 180 3f502f-3f5036 178->180 179->159 180->177 180->180
                      APIs
                        • Part of subcall function 003F4A6F: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 003F4A9A
                      • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,003F4D86,?,00000000,?,00000000,?), ref: 003F4FA0
                      • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,003F4D86,?,00000000,?,00000000,?), ref: 003F4FE2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CodeInfoPageValid
                      • String ID:
                      • API String ID: 546120528-0
                      • Opcode ID: e4b6421db404eb045acd942e92c2903c30a9fc340bd15b90c43e90aa30fa1cdf
                      • Instruction ID: a791dc443d5c0b273b938014f471507182df7fabe6e0dc5a070ca3e146fbc5db
                      • Opcode Fuzzy Hash: e4b6421db404eb045acd942e92c2903c30a9fc340bd15b90c43e90aa30fa1cdf
                      • Instruction Fuzzy Hash: D3513870A0074A5EDB22CF35C841ABBFBF5EF51304F15416ED3868B252EB759945CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 183 3ef682-3ef691 call 3ef1b4 186 3ef6ba-3ef6d4 call 3ef6df LCMapStringW 183->186 187 3ef693-3ef6b8 LCMapStringEx 183->187 191 3ef6da-3ef6dc 186->191 187->191
                      APIs
                      • LCMapStringEx.KERNELBASE(?,003F2D0F,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 003EF6B6
                      • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,003F2D0F,?,?,00000000,?,00000000), ref: 003EF6D4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: String
                      • String ID:
                      • API String ID: 2568140703-0
                      • Opcode ID: 20d22a6f3bf9e1d8af44e557bd82e86be42acd2e0bd2a9ba7d2118e6e6a5ac7e
                      • Instruction ID: d092157bc3e84a384dc5513b85b348d4677aac2bf88490a7c2a48298394871da
                      • Opcode Fuzzy Hash: 20d22a6f3bf9e1d8af44e557bd82e86be42acd2e0bd2a9ba7d2118e6e6a5ac7e
                      • Instruction Fuzzy Hash: 41F0683200016AFBCF136F91DC09DDE3E2ABF483A0F058120FA1925170CA72C831EB94

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 192 3f4b43-3f4b65 193 3f4c7e-3f4ca4 192->193 194 3f4b6b-3f4b7d GetCPInfo 192->194 195 3f4ca9-3f4cae 193->195 194->193 196 3f4b83-3f4b8a 194->196 197 3f4cb8-3f4cbe 195->197 198 3f4cb0-3f4cb6 195->198 199 3f4b8c-3f4b96 196->199 201 3f4cca 197->201 202 3f4cc0-3f4cc3 197->202 200 3f4cc6-3f4cc8 198->200 199->199 203 3f4b98-3f4bab 199->203 204 3f4ccc-3f4cde 200->204 201->204 202->200 205 3f4bcc-3f4bce 203->205 204->195 208 3f4ce0-3f4cee call 3e4956 204->208 206 3f4bad-3f4bb4 205->206 207 3f4bd0-3f4c07 call 3f2b18 call 3f2e0f 205->207 209 3f4bc3-3f4bc5 206->209 218 3f4c0c-3f4c41 call 3f2e0f 207->218 212 3f4bc7-3f4bca 209->212 213 3f4bb6-3f4bb8 209->213 212->205 213->212 216 3f4bba-3f4bc2 213->216 216->209 221 3f4c43-3f4c4d 218->221 222 3f4c4f-3f4c59 221->222 223 3f4c5b-3f4c5d 221->223 224 3f4c6d-3f4c7a 222->224 225 3f4c5f-3f4c69 223->225 226 3f4c6b 223->226 224->221 227 3f4c7c 224->227 225->224 226->224 227->208
                      APIs
                      • GetCPInfo.KERNEL32(E8458D00,?,003F4D92,003F4D86,00000000), ref: 003F4B75
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Info
                      • String ID:
                      • API String ID: 1807457897-0
                      • Opcode ID: 80ab904d840afe9f226b18d3aac90102c8d3c2b36519366db4b7a285e62fa9ad
                      • Instruction ID: 16275b5c5fd506d73ef08672dd00f30b32fdc6702322fa45075d32f3f4b69e8b
                      • Opcode Fuzzy Hash: 80ab904d840afe9f226b18d3aac90102c8d3c2b36519366db4b7a285e62fa9ad
                      • Instruction Fuzzy Hash: 815147B150425CAADB238F28CD84BF77BBCEB55304F2445A9E69AD7182D3359E46CB20

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 228 3ef2b3-3ef2db 229 3ef2dd-3ef2df 228->229 230 3ef2e1-3ef2e3 228->230 231 3ef332-3ef335 229->231 232 3ef2e9-3ef2f0 call 3ef1e8 230->232 233 3ef2e5-3ef2e7 230->233 235 3ef2f5-3ef2f9 232->235 233->231 236 3ef2fb-3ef309 GetProcAddress 235->236 237 3ef318-3ef32f 235->237 236->237 238 3ef30b-3ef316 call 3eba6a 236->238 239 3ef331 237->239 238->239 239->231
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 95cafbff44b9013544a653d022d504debc53a8a05d5e551ae07eea4ee01ea8a8
                      • Instruction ID: 514bf4f5724ce0ef188b6844d0a3c5e39c3ac3b4622018fb581ecd3a5b152f51
                      • Opcode Fuzzy Hash: 95cafbff44b9013544a653d022d504debc53a8a05d5e551ae07eea4ee01ea8a8
                      • Instruction Fuzzy Hash: 2401413B200269AF9B23CE6BEC0095A379AABC43217298230FA10CB4D5EB30D9018390
                      APIs
                        • Part of subcall function 003EEC90: GetLastError.KERNEL32(?,00000008,003F3196,00000000,003E9083), ref: 003EEC94
                        • Part of subcall function 003EEC90: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 003EED36
                      • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 003F7AB7
                      • IsValidCodePage.KERNEL32(00000000), ref: 003F7B00
                      • IsValidLocale.KERNEL32(?,00000001), ref: 003F7B0F
                      • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 003F7B57
                      • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 003F7B76
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                      • String ID: 0@
                      • API String ID: 415426439-1461294488
                      • Opcode ID: 450aa2becccaf4794d8e8433e6ed24c69a4efcd6bf58848b17bd92b47094f5e6
                      • Instruction ID: fd5c9fb852134c998c61249f39e7c8549351149a0dfc38e4583c51663d4bc128
                      • Opcode Fuzzy Hash: 450aa2becccaf4794d8e8433e6ed24c69a4efcd6bf58848b17bd92b47094f5e6
                      • Instruction Fuzzy Hash: 8E517371A0421EAFDF12DFA5CC45EBE77B9AF44700F1A4429E614EB290EB71DA00CB61
                      APIs
                        • Part of subcall function 003EEC90: GetLastError.KERNEL32(?,00000008,003F3196,00000000,003E9083), ref: 003EEC94
                        • Part of subcall function 003EEC90: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 003EED36
                      • GetACP.KERNEL32(?,?,?,?,?,?,003ECC9C,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 003F7108
                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,003ECC9C,?,?,?,00000055,?,-00000050,?,?), ref: 003F7133
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 003F7296
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$CodeInfoLocalePageValid
                      • String ID: 0@$utf8
                      • API String ID: 607553120-1799009391
                      • Opcode ID: b1a402e6b370926f058a016807eb69b77f5ca608ec4c2c26593321bf86fb6036
                      • Instruction ID: 33b9ec3e553e9a13eeaaf6ee193f8368d8b548c5ff4028e947a6ad215052e69f
                      • Opcode Fuzzy Hash: b1a402e6b370926f058a016807eb69b77f5ca608ec4c2c26593321bf86fb6036
                      • Instruction Fuzzy Hash: 0471D671A0420EBAEB26AB75DC46B7773ACEF45710F25482AFB05DB181EB74E940C760
                      APIs
                      • GetLocaleInfoW.KERNEL32(?,2000000B,003F7AF4,00000002,00000000,?,?,?,003F7AF4,?,00000000), ref: 003F786F
                      • GetLocaleInfoW.KERNEL32(?,20001004,003F7AF4,00000002,00000000,?,?,?,003F7AF4,?,00000000), ref: 003F7898
                      • GetACP.KERNEL32(?,?,003F7AF4,?,00000000), ref: 003F78AD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID: ACP$OCP
                      • API String ID: 2299586839-711371036
                      • Opcode ID: 6e3620f37653cfa3a07fe8603e72aca4646765f94880d6834c0d686e70647940
                      • Instruction ID: 78b81eefae434d4b6969552830d4f8ba961b94fd4a5ec868af30a6fa6bccb281
                      • Opcode Fuzzy Hash: 6e3620f37653cfa3a07fe8603e72aca4646765f94880d6834c0d686e70647940
                      • Instruction Fuzzy Hash: DD21BB31B08109A6E7368B54DA0EAB7776BEF54BE0B578038EB0AD7510E731DD41C390
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 003E4FB2
                      • IsDebuggerPresent.KERNEL32 ref: 003E507E
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003E5097
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 003E50A1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                      • String ID:
                      • API String ID: 254469556-0
                      • Opcode ID: 71f9cf099cc2e388ea5e3d68ad1fd192eb309619660ab925a05b5b0d0e801070
                      • Instruction ID: 42a1cc8367311572f8608bd1d24ffa8a77e8a83784a743d13264e6b49ee1c77b
                      • Opcode Fuzzy Hash: 71f9cf099cc2e388ea5e3d68ad1fd192eb309619660ab925a05b5b0d0e801070
                      • Instruction Fuzzy Hash: 72312975D05329DBDF21DF65D9897CDBBB8AF08304F1041AAE40CAB290EB709A85CF45
                      APIs
                        • Part of subcall function 003EEC90: GetLastError.KERNEL32(?,00000008,003F3196,00000000,003E9083), ref: 003EEC94
                        • Part of subcall function 003EEC90: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 003EED36
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 003F74AE
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 003F74F8
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 003F75BE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale$ErrorLast
                      • String ID:
                      • API String ID: 661929714-0
                      • Opcode ID: 4b6770595ce1955ddbc5125c2c29930e48405ba0f79fdb39d679535fb0ea2d41
                      • Instruction ID: 37ca406eaa9a26f99f870286adefde81e1aacf7fa7da32eaee3721221a7e0e71
                      • Opcode Fuzzy Hash: 4b6770595ce1955ddbc5125c2c29930e48405ba0f79fdb39d679535fb0ea2d41
                      • Instruction Fuzzy Hash: 5561807191861B9FDB2A9F28CD82BBA77B8EF08300F114179EA19CA585E734D945CB50
                      APIs
                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 003E8FFE
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 003E9008
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 003E9015
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: 115f1500fa36e598fc1dd2d975908756edb252ea66a10ac69d58b20cfad96934
                      • Instruction ID: fb17317b89133a2992605e4d01cae2a56390feaebef2835f4f21aed7e0b41065
                      • Opcode Fuzzy Hash: 115f1500fa36e598fc1dd2d975908756edb252ea66a10ac69d58b20cfad96934
                      • Instruction Fuzzy Hash: 5331C87590122D9BCB21DF65D88979DBBB8BF08350F5042DAE41CA7291E7709F818F44
                      APIs
                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,?,?,?,003F355B,?,?,?,?,?,?,00000000), ref: 003F378D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionRaise
                      • String ID:
                      • API String ID: 3997070919-0
                      • Opcode ID: d60cb5d6cff4e4e85e964eabfef3f1a5bb215f04de9963ca385ae57c144f989c
                      • Instruction ID: 429883229d88c585e23de4029ef9e8e5c36fb3f5482e198d5c117ea95ee065cb
                      • Opcode Fuzzy Hash: d60cb5d6cff4e4e85e964eabfef3f1a5bb215f04de9963ca385ae57c144f989c
                      • Instruction Fuzzy Hash: D1B16C71210608DFDB16CF28C486B657BE0FF45364F268658E99ACF3A1C335EA85CB40
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 003E4CE2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID:
                      • API String ID: 2325560087-0
                      • Opcode ID: 1a967da8b9c5a08c2c67b1363a30d6496318c61f9229f1e25eea4b26254f3368
                      • Instruction ID: daecda8054913d9f11d4e88ad15ce45ec5b076b917487ff319e4c1438cacd13c
                      • Opcode Fuzzy Hash: 1a967da8b9c5a08c2c67b1363a30d6496318c61f9229f1e25eea4b26254f3368
                      • Instruction Fuzzy Hash: A4518AB1A003599BDB15CF9AD8817AABBF4FB8C316F25857AD400EB392E374D940CB54
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1cc922789b4ca077627c6851aea2845801a19545944a171086393bd7e78a6fdc
                      • Instruction ID: 67c1bcea64727d5b9a8d78e622de7cf9f909814b8a4a389cdf093b3ca78687db
                      • Opcode Fuzzy Hash: 1cc922789b4ca077627c6851aea2845801a19545944a171086393bd7e78a6fdc
                      • Instruction Fuzzy Hash: 3641A2B580421DAFDF21DF79CC89ABABBB9AF45304F1442D9E51CE7201EA359E858F10
                      APIs
                        • Part of subcall function 003EEC90: GetLastError.KERNEL32(?,00000008,003F3196,00000000,003E9083), ref: 003EEC94
                        • Part of subcall function 003EEC90: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 003EED36
                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 003F7701
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$InfoLocale
                      • String ID:
                      • API String ID: 3736152602-0
                      • Opcode ID: 7c77fe13cf21f29eab672b889b4bac4f91e6c157667d87353b051a82627d295d
                      • Instruction ID: bee4c665b8448f6df0ec09ea2761c5a4f2baa74eec6ea073eb2b3d613bb02e07
                      • Opcode Fuzzy Hash: 7c77fe13cf21f29eab672b889b4bac4f91e6c157667d87353b051a82627d295d
                      • Instruction Fuzzy Hash: 1421FC3151420A6BDF29AF15DD52A7A37ACEF44355F100079FE01CB245EB35DD04C750
                      APIs
                        • Part of subcall function 003EEC90: GetLastError.KERNEL32(?,00000008,003F3196,00000000,003E9083), ref: 003EEC94
                        • Part of subcall function 003EEC90: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 003EED36
                      • EnumSystemLocalesW.KERNEL32(003F745A,00000001,00000000,?,-00000050,?,003F7A8B,00000000,?,?,?,00000055,?), ref: 003F73A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem
                      • String ID:
                      • API String ID: 2417226690-0
                      • Opcode ID: 8ed3dfdb86b092a6bbaf3166c334918caf48fdb4bbb9c07c7a90180fa16daeb1
                      • Instruction ID: 36bd58e2d9cdde647b6b1d3ca2ce91fe5360fabaa2a39888494b1d70c672ae28
                      • Opcode Fuzzy Hash: 8ed3dfdb86b092a6bbaf3166c334918caf48fdb4bbb9c07c7a90180fa16daeb1
                      • Instruction Fuzzy Hash: 3F11E93A2047055FDB199F39C8915BABBA2FF80358B15882DEA4647B40E771B943D740
                      APIs
                        • Part of subcall function 003EEC90: GetLastError.KERNEL32(?,00000008,003F3196,00000000,003E9083), ref: 003EEC94
                        • Part of subcall function 003EEC90: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 003EED36
                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,003F7676,00000000,00000000,?), ref: 003F7908
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$InfoLocale
                      • String ID:
                      • API String ID: 3736152602-0
                      • Opcode ID: ffcd40e91e410476752a7039410a48e5d327fd2193541345f32cb2174695f140
                      • Instruction ID: 2d4bfb59f63c072c63c19592fa9f71315a455903a1f28cea135c86f635a1f723
                      • Opcode Fuzzy Hash: ffcd40e91e410476752a7039410a48e5d327fd2193541345f32cb2174695f140
                      • Instruction Fuzzy Hash: 1AF02D336041197BDB255B25CC05BBB775DEB40364F164468EE06A3184DFB0FD01C6D0
                      APIs
                        • Part of subcall function 003EEC90: GetLastError.KERNEL32(?,00000008,003F3196,00000000,003E9083), ref: 003EEC94
                        • Part of subcall function 003EEC90: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 003EED36
                      • EnumSystemLocalesW.KERNEL32(003F76AD,00000001,00000000,?,-00000050,?,003F7A4F,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 003F7419
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem
                      • String ID:
                      • API String ID: 2417226690-0
                      • Opcode ID: 626e1039ce5b5913b3b75496f63477469eeecbadd2290df62c11b8e85a171d6a
                      • Instruction ID: a000b8d97749c5e735c921bbd54a5bfaf39282bf80186090fb8ea17de2832aa3
                      • Opcode Fuzzy Hash: 626e1039ce5b5913b3b75496f63477469eeecbadd2290df62c11b8e85a171d6a
                      • Instruction Fuzzy Hash: C8F0F6363043095FDB265F3AD885A7A7F95FF80368F16842DFA058B690D6719C02D750
                      APIs
                        • Part of subcall function 003EA8B5: EnterCriticalSection.KERNEL32(?,?,003EE968,?,00405700,00000008,003EEB2C,?,?,?), ref: 003EA8C4
                      • EnumSystemLocalesW.KERNEL32(003EF012,00000001,00405780,0000000C,003EF441,00000000), ref: 003EF057
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CriticalEnterEnumLocalesSectionSystem
                      • String ID:
                      • API String ID: 1272433827-0
                      • Opcode ID: a489375fb4ac36bd4af11b31e444891ee4746a78b8fa7b4c668670be485bea93
                      • Instruction ID: d771446e16edc6b017aec24e355c1b000e257493343336c353a1e930251259b8
                      • Opcode Fuzzy Hash: a489375fb4ac36bd4af11b31e444891ee4746a78b8fa7b4c668670be485bea93
                      • Instruction Fuzzy Hash: B5F03C72A00354EFDB01EF99E842B9977B0FB44726F10413AE4119B2E1D7B599409B44
                      APIs
                        • Part of subcall function 003EEC90: GetLastError.KERNEL32(?,00000008,003F3196,00000000,003E9083), ref: 003EEC94
                        • Part of subcall function 003EEC90: SetLastError.KERNEL32(00000000,00000002,000000FF), ref: 003EED36
                      • EnumSystemLocalesW.KERNEL32(003F7242,00000001,00000000,?,?,003F7AAD,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 003F7320
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast$EnumLocalesSystem
                      • String ID:
                      • API String ID: 2417226690-0
                      • Opcode ID: 136b7a746430800f0d4a2617ba167cc25bdaf35eb42268c60d6dcfe18ea7134f
                      • Instruction ID: a49191e9d54b6d8c9cfb7d7e57ce49284c50abba4af320516db9a8979f235671
                      • Opcode Fuzzy Hash: 136b7a746430800f0d4a2617ba167cc25bdaf35eb42268c60d6dcfe18ea7134f
                      • Instruction Fuzzy Hash: 20F0553A30020967CB069F36C805ABA7F94EFC1710F0B4459FF068B280C6329843C790
                      APIs
                      • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,003ED804,?,20001004,00000000,00000002,?,?,003ECE04), ref: 003EF579
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoLocale
                      • String ID:
                      • API String ID: 2299586839-0
                      • Opcode ID: 1a3e779a026bb4f2567e2067d9dc20a2c29209ac56d906c931c8d42de5cf6a5c
                      • Instruction ID: d81858e01b9e1b6c8d7ea1798d04c28eb237e6ca01368ce13504623a4874ade5
                      • Opcode Fuzzy Hash: 1a3e779a026bb4f2567e2067d9dc20a2c29209ac56d906c931c8d42de5cf6a5c
                      • Instruction Fuzzy Hash: CEE04F3150116CBFCF136F62DC08EAE7E1AEF55750F014121FD05661A0CBB28D21AAD5
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_0000510E,003E477F), ref: 003E5107
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: b382629eb152f63548fa5167cdb49d4193bc3edd61db702217bafac7eafc229c
                      • Instruction ID: 49a3bcad03f9f15be93314ff118c8eb947c0367e69c87c7b1bfd906dee41384c
                      • Opcode Fuzzy Hash: b382629eb152f63548fa5167cdb49d4193bc3edd61db702217bafac7eafc229c
                      • Instruction Fuzzy Hash:
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: HeapProcess
                      • String ID:
                      • API String ID: 54951025-0
                      • Opcode ID: 851fbaeba42a3077030722f41c2b3a0b327a1e82c134d5afa346a7684481253a
                      • Instruction ID: 35199c6b42aa9f4a172788974fdd838ff141fa0a73b6eb6aacb33a4f65589d81
                      • Opcode Fuzzy Hash: 851fbaeba42a3077030722f41c2b3a0b327a1e82c134d5afa346a7684481253a
                      • Instruction Fuzzy Hash: 1DA00170A12A018B97818F35AB193693FEAAA45692B05807AA405CA561EA648550AA05
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                      • String ID:
                      • API String ID: 3471368781-0
                      • Opcode ID: cbaaabec83de36a4657d4e2579ea6f5932f932e3b3ad0a8d3ceb8f4902958bd6
                      • Instruction ID: 49517c692fc342b87c47ac6f55e08129d477654046c97309e1b4deedebc824c2
                      • Opcode Fuzzy Hash: cbaaabec83de36a4657d4e2579ea6f5932f932e3b3ad0a8d3ceb8f4902958bd6
                      • Instruction Fuzzy Hash: 8CB1287560074A9BDB35AF29CC93AB7B3E9EF44308F14456DEB83CA680EA71A945C710
                      APIs
                        • Part of subcall function 003E116F: __EH_prolog3_catch.LIBCMT ref: 003E1176
                        • Part of subcall function 003E116F: _strlen.LIBCMT ref: 003E1188
                      • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 003FC29C
                        • Part of subcall function 003E1852: _strlen.LIBCMT ref: 003E186A
                      • _strlen.LIBCMT ref: 003FC2B7
                      • _strlen.LIBCMT ref: 003FC2CD
                      • GetProcAddress.KERNEL32(00000000,?), ref: 003FC2EA
                        • Part of subcall function 003FC20E: VirtualAlloc.KERNELBASE(00000000,000004AC,00001000,00000040,ole,00000000,?,?,003FC2FD), ref: 003FC222
                        • Part of subcall function 003FC20E: CreateThread.KERNELBASE(00000000,00000000,00000188,00407018,00000000,00000000), ref: 003FC256
                        • Part of subcall function 003FC20E: WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,?,003FC2FD), ref: 003FC262
                        • Part of subcall function 003FC20E: CloseHandle.KERNEL32(00000000,?,?,003FC2FD), ref: 003FC269
                        • Part of subcall function 003E1DFE: _Deallocate.LIBCONCRT ref: 003E1E0D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: _strlen$Handle$AddressAllocCloseCreateDeallocateH_prolog3_catchModuleObjectProcSingleThreadVirtualWait
                      • String ID: Cons$Free$Madino Mino$kernel32.dll$ole
                      • API String ID: 4115190924-2348686229
                      • Opcode ID: 86ec85611bd1f9744c081a93ad930fcd65e5cc07abfa0ce9c3aa6462245a19f7
                      • Instruction ID: 637480126dc59b2ca47fbcb80c5300730a00286226a51dd8cff3ac0a02585bb2
                      • Opcode Fuzzy Hash: 86ec85611bd1f9744c081a93ad930fcd65e5cc07abfa0ce9c3aa6462245a19f7
                      • Instruction Fuzzy Hash: 2201A175E00259AA8B06FBA5EC4ACFF77B9EE84700B10012AF911AA1D2EF349941C665
                      APIs
                      • __EH_prolog3.LIBCMT ref: 003E230E
                      • std::_Lockit::_Lockit.LIBCPMT ref: 003E2318
                      • int.LIBCPMT ref: 003E232F
                        • Part of subcall function 003E2867: std::_Lockit::_Lockit.LIBCPMT ref: 003E2878
                        • Part of subcall function 003E2867: std::_Lockit::~_Lockit.LIBCPMT ref: 003E2892
                      • codecvt.LIBCPMT ref: 003E2352
                      • std::_Facet_Register.LIBCPMT ref: 003E2369
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003E2389
                      • Concurrency::cancel_current_task.LIBCPMT ref: 003E2396
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                      • String ID: @DE
                      • API String ID: 2133458128-494431180
                      • Opcode ID: d095ab4308fb13eb951c7ecd00a0889b01133d8447d791df249de77f3f40108d
                      • Instruction ID: 424fc042b9c0b99be741e08a316153889d5185d5d74998cb609131cd1eb9cc77
                      • Opcode Fuzzy Hash: d095ab4308fb13eb951c7ecd00a0889b01133d8447d791df249de77f3f40108d
                      • Instruction Fuzzy Hash: 9D01AD359002A98BCB07AB66D805ABFB769BF85314F240608E8116F2D2CF349A01CB90
                      APIs
                      • __EH_prolog3.LIBCMT ref: 003E23A3
                      • std::_Lockit::_Lockit.LIBCPMT ref: 003E23AD
                      • int.LIBCPMT ref: 003E23C4
                        • Part of subcall function 003E2867: std::_Lockit::_Lockit.LIBCPMT ref: 003E2878
                        • Part of subcall function 003E2867: std::_Lockit::~_Lockit.LIBCPMT ref: 003E2892
                      • ctype.LIBCPMT ref: 003E23E7
                      • std::_Facet_Register.LIBCPMT ref: 003E23FE
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003E241E
                      • Concurrency::cancel_current_task.LIBCPMT ref: 003E242B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registerctype
                      • String ID: EE
                      • API String ID: 2958136301-1871289027
                      • Opcode ID: 62107c48e9a74e14450bd39f879eaea0ad0ae7f85abe8ce00b4b64098eb5ad6e
                      • Instruction ID: 5a22407f55d8a2609579d57d5bf535986dc54e9a0a60554d47795a1d86d5aeba
                      • Opcode Fuzzy Hash: 62107c48e9a74e14450bd39f879eaea0ad0ae7f85abe8ce00b4b64098eb5ad6e
                      • Instruction Fuzzy Hash: E401A1359002A99BCB07EBA7C805ABFB779AF84314F250619F4117F2D2CF349A05CB81
                      APIs
                      • type_info::operator==.LIBVCRUNTIME ref: 003E7F37
                      • ___TypeMatch.LIBVCRUNTIME ref: 003E8045
                      • _UnwindNestedFrames.LIBCMT ref: 003E8197
                      • CallUnexpected.LIBVCRUNTIME ref: 003E81B2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                      • String ID: csm$csm$csm
                      • API String ID: 2751267872-393685449
                      • Opcode ID: 81963402f4fab54f33ae0eb27ce13f6f06785d362c30da0a18e35a5252e174ff
                      • Instruction ID: 50df605bf512775b076e58128dca865a2ed4095ea62c7b2184f5e071fc4753d4
                      • Opcode Fuzzy Hash: 81963402f4fab54f33ae0eb27ce13f6f06785d362c30da0a18e35a5252e174ff
                      • Instruction Fuzzy Hash: A3B17E31C002A9EFCF26DFA6D84199EB7B5FF14310F154659E8086B292DB31DE52CB91
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3907804496
                      • Opcode ID: 4071042b04620517d798ba530602c46240a32d601b22b7e47952336956ef504c
                      • Instruction ID: 0768f032cc2ba6f2c7ff873079173e4e00360dd578dcd711463434d0da2f47f3
                      • Opcode Fuzzy Hash: 4071042b04620517d798ba530602c46240a32d601b22b7e47952336956ef504c
                      • Instruction Fuzzy Hash: 61B1C174A0424DDFDB13DF99E881BBEBBB6BF85304F154159E600AB292DB709D41CB60
                      APIs
                      • GetCPInfo.KERNEL32(00E00520,00E00520,?,7FFFFFFF,?,003F9DC9,00E00520,00E00520,?,00E00520,?,?,?,?,00E00520,?), ref: 003F9B9F
                      • __alloca_probe_16.LIBCMT ref: 003F9C5A
                      • __alloca_probe_16.LIBCMT ref: 003F9CE9
                      • __freea.LIBCMT ref: 003F9D34
                      • __freea.LIBCMT ref: 003F9D3A
                      • __freea.LIBCMT ref: 003F9D70
                      • __freea.LIBCMT ref: 003F9D76
                      • __freea.LIBCMT ref: 003F9D86
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: __freea$__alloca_probe_16$Info
                      • String ID:
                      • API String ID: 127012223-0
                      • Opcode ID: ff2cba1944c11ae9d04063962d96122e7b688a931fc5047c0a953668b5c19bcd
                      • Instruction ID: 9d6cb61d4b24493a79649a9cd4f3e4801bf6557d1c9dc74b75b931f5ef820dad
                      • Opcode Fuzzy Hash: ff2cba1944c11ae9d04063962d96122e7b688a931fc5047c0a953668b5c19bcd
                      • Instruction Fuzzy Hash: 4C71D47290024DABDF239F649C41FBEB7A99F89310F360156FA04AB292E635DD44C7A4
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 003E4526
                      • __alloca_probe_16.LIBCMT ref: 003E4552
                      • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 003E4591
                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003E45AE
                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 003E45ED
                      • __alloca_probe_16.LIBCMT ref: 003E460A
                      • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003E464C
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 003E466F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ByteCharMultiStringWide$__alloca_probe_16
                      • String ID:
                      • API String ID: 2040435927-0
                      • Opcode ID: 7ed89cd3c015ae5a689cd6bfd91a0b55c679cdab6a6c1e6fc2a3a1336b42efef
                      • Instruction ID: d3aa254b52fa7d95c0ff7e28d5104e6c9f182681ad7c0c280b7aa108a6cfe072
                      • Opcode Fuzzy Hash: 7ed89cd3c015ae5a689cd6bfd91a0b55c679cdab6a6c1e6fc2a3a1336b42efef
                      • Instruction Fuzzy Hash: 1251B1725002AAABEF229F62CC45FAB7BBDEB49780F164624F9059A1D0D731DC11CB60
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 003E78E7
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 003E78EF
                      • _ValidateLocalCookies.LIBCMT ref: 003E7978
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 003E79A3
                      • _ValidateLocalCookies.LIBCMT ref: 003E79F8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: csm
                      • API String ID: 1170836740-1018135373
                      • Opcode ID: 46a7ceb20652e8452d2a06dedaced7973380c52aa5ddc519d658994b56d2c1ac
                      • Instruction ID: 063654be5394a66e79bcffbdbdfa4c9cd8dbbb89dff101b723a60bd31e356dfe
                      • Opcode Fuzzy Hash: 46a7ceb20652e8452d2a06dedaced7973380c52aa5ddc519d658994b56d2c1ac
                      • Instruction Fuzzy Hash: 5D41E730E042699BCF02DF6AC885AAEBBB5EF05314F148255F8199B3D3D731DA11CB91
                      APIs
                      • GetLastError.KERNEL32(?,?,003E7AA1,003E6070,003E5152), ref: 003E7AB8
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 003E7AC6
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003E7ADF
                      • SetLastError.KERNEL32(00000000,003E7AA1,003E6070,003E5152), ref: 003E7B31
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 4ed96f5a1c07d3f95a4665175e4916a3f6e1c9f3a3ef4ad1f167fd2188b11837
                      • Instruction ID: 78a1d987d39fda740813e9fc87824be07fd07298189308c05d89ea5c29bf93b3
                      • Opcode Fuzzy Hash: 4ed96f5a1c07d3f95a4665175e4916a3f6e1c9f3a3ef4ad1f167fd2188b11837
                      • Instruction Fuzzy Hash: 66012832A1D7B26EA6171BB67D4592F2688EF013F2730033AF014DA1E1FF518C029198
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,04B05F4C,?,?,00000000,003FB356,000000FF,?,003EC30F,?,?,003EC2E3,00000000), ref: 003EC3B4
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 003EC3C6
                      • FreeLibrary.KERNEL32(00000000,?,00000000,003FB356,000000FF,?,003EC30F,?,?,003EC2E3,00000000), ref: 003EC3E8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: 0aad73b5b9bf12646fe43b545bdfc8f23805eee49e024f7eebf52300a033a93c
                      • Instruction ID: a919dd2636b8fbfe4b052044181478ba6e78f10c4f5d941696733b2ebbe3f7ae
                      • Opcode Fuzzy Hash: 0aad73b5b9bf12646fe43b545bdfc8f23805eee49e024f7eebf52300a033a93c
                      • Instruction Fuzzy Hash: 2D01A27595066AEFCB138F54DC49FBEBBB9FB04B15F004225E811E22E0EBB89900CA54
                      APIs
                      • LoadLibraryExW.KERNEL32(HP@,00000000,00000800,?,003E8BA3,00000000,?,00000000,?,?,?,003E8CCD,00000002,FlsGetValue,003FEC80,FlsGetValue), ref: 003E8BFF
                      • GetLastError.KERNEL32(?,003E8BA3,00000000,?,00000000,?,?,?,003E8CCD,00000002,FlsGetValue,003FEC80,FlsGetValue,00000000,?,003E7B5D), ref: 003E8C09
                      • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,00405048,?,?,?,003E18ED,?,003E18ED,?), ref: 003E8C31
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID: HP@$api-ms-
                      • API String ID: 3177248105-4243433177
                      • Opcode ID: 03edf54ad62cd3f632b97a0379119d692b2731b28a7859e91970eb252e35f6c1
                      • Instruction ID: ce174d5897d1a64d970ebe1ebea6008ed9c8319611b72558a4c3f424e306c41a
                      • Opcode Fuzzy Hash: 03edf54ad62cd3f632b97a0379119d692b2731b28a7859e91970eb252e35f6c1
                      • Instruction Fuzzy Hash: 24E04834640249BBEF222F61DD4AF693E5A9F11B80F210060FB0CE80E1DF66E916D595
                      APIs
                      • __EH_prolog3.LIBCMT ref: 003E3E19
                      • std::_Lockit::_Lockit.LIBCPMT ref: 003E3E24
                      • std::_Lockit::~_Lockit.LIBCPMT ref: 003E3E92
                        • Part of subcall function 003E3F75: std::locale::_Locimp::_Locimp.LIBCPMT ref: 003E3F8D
                      • std::locale::_Setgloballocale.LIBCPMT ref: 003E3E3F
                      • _Yarn.LIBCPMT ref: 003E3E55
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                      • String ID:
                      • API String ID: 1088826258-0
                      • Opcode ID: fa102ee6358648c60f985dc040dbb90ac137992fb0aa725272beb2f96d528e07
                      • Instruction ID: 53ba9eb481e979d1361e89040ef7c1459de6f0b93bfb6e7431d61c7646011c50
                      • Opcode Fuzzy Hash: fa102ee6358648c60f985dc040dbb90ac137992fb0aa725272beb2f96d528e07
                      • Instruction Fuzzy Hash: C501B1B5A00264ABCB07AB22D80997D7775FFC5300B180118E9016B3D2DF34AB42DBC5
                      APIs
                      • FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,003E8CCD,00000002,FlsGetValue,003FEC80,FlsGetValue,00000000,?,003E7B5D,?,003E5E92), ref: 003E8BD5
                      • GetProcAddress.KERNEL32(00000000,?), ref: 003E8BDF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressFreeLibraryProc
                      • String ID: HP@$HP@
                      • API String ID: 3013587201-592137227
                      • Opcode ID: 857c515617367cd2b84c6b36daaeb4e61d5b2e77295c58df3b02eacf3ba83995
                      • Instruction ID: d2d0105e4cffcabcb2ed38ee0010645fd00187f205a36adbb57b0058bcc5dda5
                      • Opcode Fuzzy Hash: 857c515617367cd2b84c6b36daaeb4e61d5b2e77295c58df3b02eacf3ba83995
                      • Instruction Fuzzy Hash: 501181B1A00266AFDF23CF5ADC809AA73A9FB453507150265E909DB290EB30DD02CB94
                      APIs
                      • __EH_prolog3.LIBCMT ref: 003E25AC
                      • std::_Lockit::_Lockit.LIBCPMT ref: 003E25B9
                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 003E25F6
                        • Part of subcall function 003E3F10: _Yarn.LIBCPMT ref: 003E3F2F
                        • Part of subcall function 003E3F10: _Yarn.LIBCPMT ref: 003E3F53
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Yarnstd::_$H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_
                      • String ID: bad locale name
                      • API String ID: 482894088-1405518554
                      • Opcode ID: 1897ebd39738e165ca4f8e94bf11b2a762f5ed952242de4e63082d3263ab19ef
                      • Instruction ID: d2ce686a44df2cc59f70084d8ee2c8798a2f4cdec16c8442fe49cc6533426317
                      • Opcode Fuzzy Hash: 1897ebd39738e165ca4f8e94bf11b2a762f5ed952242de4e63082d3263ab19ef
                      • Instruction Fuzzy Hash: 6701D6715057989EC7329F6B844144BFFE0BF28310B404A6FF18D8BA42C770D604CB99
                      APIs
                      • GetConsoleOutputCP.KERNEL32(04B05F4C,00000000,00000000,00000000), ref: 003EFE31
                        • Part of subcall function 003F3E34: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,003F2DC6,?,00000000,-00000008), ref: 003F3EE0
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 003F008C
                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 003F00D4
                      • GetLastError.KERNEL32 ref: 003F0177
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                      • String ID:
                      • API String ID: 2112829910-0
                      • Opcode ID: e0fe0cc5ce684a7e5853561727a2a791bdb7150acc5670e2ff44be52aa2deff8
                      • Instruction ID: 1dee5b1d6d8cbf40677e12356c0aadd694374d7fc8cec24c149db5aafb5c2687
                      • Opcode Fuzzy Hash: e0fe0cc5ce684a7e5853561727a2a791bdb7150acc5670e2ff44be52aa2deff8
                      • Instruction Fuzzy Hash: 58D15CB5E002589FCF16CFA8D8809EEBBB5FF49304F18452AE955EB352D730A942CB50
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AdjustPointer
                      • String ID:
                      • API String ID: 1740715915-0
                      • Opcode ID: c6d9ad4154814a40a0843c149357160cd22240b640f1207b9ee52fecfecad488
                      • Instruction ID: 817178af394274fcfce8cdbb6fd405b8f12300f5f423c23b91d9fcb32c46fa69
                      • Opcode Fuzzy Hash: c6d9ad4154814a40a0843c149357160cd22240b640f1207b9ee52fecfecad488
                      • Instruction Fuzzy Hash: CE51B1715086A6DFDB2B8F16D841BBA73A9EF04304F25472DED059A5D1D731AC82CB90
                      APIs
                        • Part of subcall function 003F3E34: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,003F2DC6,?,00000000,-00000008), ref: 003F3EE0
                      • GetLastError.KERNEL32 ref: 003F42B4
                      • __dosmaperr.LIBCMT ref: 003F42BB
                      • GetLastError.KERNEL32(?,?,?,?), ref: 003F42F5
                      • __dosmaperr.LIBCMT ref: 003F42FC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                      • String ID:
                      • API String ID: 1913693674-0
                      • Opcode ID: c41f8591c37d49e37149faf2c14b3964c3d1ab085430b6b4ee12d183e541fb3b
                      • Instruction ID: 2580d1a66d4579bf02cd1dea1c044a8729c93350de2b015fd9fcc42b9a1916f2
                      • Opcode Fuzzy Hash: c41f8591c37d49e37149faf2c14b3964c3d1ab085430b6b4ee12d183e541fb3b
                      • Instruction Fuzzy Hash: BE21C231600219BFDB23AF668C8197BB7ADEF44364B018929FB25DB651DB30EC109B90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ab010ceaa375fec84fadab8e72518773cac52055a46c53f31a6228bd00b78b5b
                      • Instruction ID: 4810e10d092072092fc6b6bda4caefec8580c17e09b34faaa953aa1678584ac3
                      • Opcode Fuzzy Hash: ab010ceaa375fec84fadab8e72518773cac52055a46c53f31a6228bd00b78b5b
                      • Instruction Fuzzy Hash: B721A4716002A9AFCB23AF639C81C6BF76DAF51364B114B15F915DB5E0DB31EC008B90
                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 003F51EE
                        • Part of subcall function 003F3E34: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,003F2DC6,?,00000000,-00000008), ref: 003F3EE0
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 003F5226
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 003F5246
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                      • String ID:
                      • API String ID: 158306478-0
                      • Opcode ID: 8121ec72228269552bbd952502b1d5514afc05e86873e4bb42711bee6618a0b4
                      • Instruction ID: 6f31549789c995ba6f24588736d36e9a5039eee1a93a0018da184114ac755cc6
                      • Opcode Fuzzy Hash: 8121ec72228269552bbd952502b1d5514afc05e86873e4bb42711bee6618a0b4
                      • Instruction Fuzzy Hash: 121145B2901A2DBFBB1327B29C8DD7F7DACCEA9395B110624FB01D5140EA20DE0186B1
                      APIs
                      • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,003F8411,00000000,00000001,00000000,00000000,?,003F01CB,00000000,00000000,00000000), ref: 003F962C
                      • GetLastError.KERNEL32(?,003F8411,00000000,00000001,00000000,00000000,?,003F01CB,00000000,00000000,00000000,00000000,00000000,?,003F0752,00000000), ref: 003F9638
                        • Part of subcall function 003F95FE: CloseHandle.KERNEL32(FFFFFFFE,003F9648,?,003F8411,00000000,00000001,00000000,00000000,?,003F01CB,00000000,00000000,00000000,00000000,00000000), ref: 003F960E
                      • ___initconout.LIBCMT ref: 003F9648
                        • Part of subcall function 003F95C0: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,003F95EF,003F83FE,00000000,?,003F01CB,00000000,00000000,00000000,00000000), ref: 003F95D3
                      • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,003F8411,00000000,00000001,00000000,00000000,?,003F01CB,00000000,00000000,00000000,00000000), ref: 003F965D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                      • String ID:
                      • API String ID: 2744216297-0
                      • Opcode ID: 591d925a04d5b61243b13e750753ca653b5108fe8b99bc80d1fdb53e3c89c5cc
                      • Instruction ID: d7bf100e525b7a47f7bc5c53ddc6c160f3b7b5796ec990727251390146b80113
                      • Opcode Fuzzy Hash: 591d925a04d5b61243b13e750753ca653b5108fe8b99bc80d1fdb53e3c89c5cc
                      • Instruction Fuzzy Hash: 44F0AC36501259BBCF231FA5DC09BAD3F2AEF493B1F054025FB1899121D632C960DB94
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: P6E$P6E
                      • API String ID: 0-818886643
                      • Opcode ID: a97dc185cd2da926a48d796d73479e88cce993b8d985dde3fa5bfe9702d6fabd
                      • Instruction ID: 07df9c617275eb03966b090e93ef422a741d2dff48e05d00ca9f62e2198de204
                      • Opcode Fuzzy Hash: a97dc185cd2da926a48d796d73479e88cce993b8d985dde3fa5bfe9702d6fabd
                      • Instruction Fuzzy Hash: F1C12372D40609EBEB21DBA8CC82FEF7BF8AB48700F154165FB05FB282D67499558760
                      APIs
                        • Part of subcall function 003EEFD8: HeapFree.KERNEL32(00000000,00000000,?,003F602B,?,00000000,?,?,003F62CC,?,00000007,?,?,003F67C5,?,?), ref: 003EEFEE
                        • Part of subcall function 003EEFD8: GetLastError.KERNEL32(?,?,003F602B,?,00000000,?,?,003F62CC,?,00000007,?,?,003F67C5,?,?), ref: 003EEFF9
                      • ___free_lconv_mon.LIBCMT ref: 003F6672
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorFreeHeapLast___free_lconv_mon
                      • String ID: P6E$x7E
                      • API String ID: 4068849827-529142250
                      • Opcode ID: 066f80d8febb35b5f67107de870dd90c3712171670b019bb681f463ca84e7d18
                      • Instruction ID: a8685bda2d926795a42ce6b48db44df1279b15d2a387c901e934ea14a823c01f
                      • Opcode Fuzzy Hash: 066f80d8febb35b5f67107de870dd90c3712171670b019bb681f463ca84e7d18
                      • Instruction Fuzzy Hash: 4C316D31604789DFEB22AE79D846B6A77E8AF40310F164529F659DB2D1DF34EC448B10
                      APIs
                      • EncodePointer.KERNEL32(00000000,?), ref: 003E81E2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: EncodePointer
                      • String ID: MOC$RCC
                      • API String ID: 2118026453-2084237596
                      • Opcode ID: b0e61d713213283e3dec6c76a43508ef89508443e98531fc4f4cb7187de4f1fa
                      • Instruction ID: 75852eb0714f25b3f48781c98c72810bf2d5d75de6c85f612d4114bc189b1fa8
                      • Opcode Fuzzy Hash: b0e61d713213283e3dec6c76a43508ef89508443e98531fc4f4cb7187de4f1fa
                      • Instruction Fuzzy Hash: 59418731D00659EFCF16CF99CC81AAEBBB5FF08304F158658FA086A2A1D7359950DB50
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 003E526A
                      • ___raise_securityfailure.LIBCMT ref: 003E5352
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor___raise_securityfailure
                      • String ID: XGE
                      • API String ID: 3761405300-610323143
                      • Opcode ID: 80999e536e308cac4ac3ed8543a7e536ba551503d2ad562d785664f73e79cd39
                      • Instruction ID: 90cc8dda824f2973ca62fc849cbea19af4a7681a93841351d45c44d0afc1a057
                      • Opcode Fuzzy Hash: 80999e536e308cac4ac3ed8543a7e536ba551503d2ad562d785664f73e79cd39
                      • Instruction Fuzzy Hash: 2121CEB8500384ABD750EF56F9856443BE4FB9971AF11553AE6098F3A2E3B0D5C0CF08
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 003E5370
                      • ___raise_securityfailure.LIBCMT ref: 003E542D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1622170553.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                      • Associated: 00000000.00000002.1622110422.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622216576.00000000003FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.0000000000407000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622246450.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1622310917.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3e0000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor___raise_securityfailure
                      • String ID: XGE
                      • API String ID: 3761405300-610323143
                      • Opcode ID: e811ff2a4f4123e08e87dc38798ce60ff7aaf44b15e1e41df69e8860df882487
                      • Instruction ID: 067d892eeeda7076ba7d4d2c77eb00ea85b1728718ef00b35bcc39c5da100212
                      • Opcode Fuzzy Hash: e811ff2a4f4123e08e87dc38798ce60ff7aaf44b15e1e41df69e8860df882487
                      • Instruction Fuzzy Hash: 5311BDB85113889BD750EF56F9816843BF4FB9A30AB01513AE8088F362E370D581CF09

                      Execution Graph

                      Execution Coverage:6.5%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:52
                      Total number of Limit Nodes:9
                      execution_graph 30007 e3d300 DuplicateHandle 30008 e3d396 30007->30008 29944 e34668 29945 e34684 29944->29945 29946 e34696 29945->29946 29948 e347a0 29945->29948 29949 e347c5 29948->29949 29953 e348b0 29949->29953 29957 e348a1 29949->29957 29955 e348d7 29953->29955 29954 e349b4 29954->29954 29955->29954 29961 e34248 29955->29961 29958 e348d7 29957->29958 29959 e34248 CreateActCtxA 29958->29959 29960 e349b4 29958->29960 29959->29960 29962 e35940 CreateActCtxA 29961->29962 29964 e35a03 29962->29964 29964->29964 29965 e3d0b8 29966 e3d0fe GetCurrentProcess 29965->29966 29968 e3d150 GetCurrentThread 29966->29968 29969 e3d149 29966->29969 29970 e3d186 29968->29970 29971 e3d18d GetCurrentProcess 29968->29971 29969->29968 29970->29971 29974 e3d1c3 29971->29974 29972 e3d1eb GetCurrentThreadId 29973 e3d21c 29972->29973 29974->29972 29975 e3ad38 29976 e3ad47 29975->29976 29979 e3ae20 29975->29979 29987 e3ae30 29975->29987 29980 e3ae41 29979->29980 29981 e3ae64 29979->29981 29980->29981 29995 e3b0c8 29980->29995 29999 e3b0b8 29980->29999 29981->29976 29982 e3ae5c 29982->29981 29983 e3b068 GetModuleHandleW 29982->29983 29984 e3b095 29983->29984 29984->29976 29988 e3ae41 29987->29988 29989 e3ae64 29987->29989 29988->29989 29993 e3b0c8 LoadLibraryExW 29988->29993 29994 e3b0b8 LoadLibraryExW 29988->29994 29989->29976 29990 e3ae5c 29990->29989 29991 e3b068 GetModuleHandleW 29990->29991 29992 e3b095 29991->29992 29992->29976 29993->29990 29994->29990 29996 e3b0dc 29995->29996 29997 e3b101 29996->29997 30003 e3a870 29996->30003 29997->29982 30000 e3b0dc 29999->30000 30001 e3b101 30000->30001 30002 e3a870 LoadLibraryExW 30000->30002 30001->29982 30002->30001 30004 e3b2a8 LoadLibraryExW 30003->30004 30006 e3b321 30004->30006 30006->29997

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 670 6453f50-6453f84 673 6453f86-6453f8f 670->673 674 6453f92-6453fa5 670->674 673->674 675 6454215-6454219 674->675 676 6453fab-6453fae 674->676 678 645422e-6454238 675->678 679 645421b-645422b 675->679 680 6453fb0-6453fb5 676->680 681 6453fbd-6453fc9 676->681 679->678 680->681 682 6454253-6454299 681->682 683 6453fcf-6453fe1 681->683 690 64542a8-64542d0 682->690 691 645429b-64542a5 682->691 687 6453fe7-645403a 683->687 688 645414d-645415b 683->688 719 645403c-6454048 call 6453c88 687->719 720 645404a 687->720 694 6454161-645416f 688->694 695 64541e0-64541e2 688->695 712 6454425-6454443 690->712 713 64542d6-64542ef 690->713 691->690 698 6454171-6454176 694->698 699 645417e-645418a 694->699 700 64541e4-64541ea 695->700 701 64541f0-64541fc 695->701 698->699 699->682 705 6454190-64541bf 699->705 703 64541ec 700->703 704 64541ee 700->704 710 64541fe-645420f 701->710 703->701 704->701 722 64541c1-64541ce 705->722 723 64541d0-64541de 705->723 710->675 710->676 728 6454445-6454467 712->728 729 64544ae-64544b8 712->729 731 64542f5-645430b 713->731 732 6454406-645441f 713->732 726 645404c-645405c 719->726 720->726 722->723 723->675 737 6454077-6454079 726->737 738 645405e-6454075 726->738 749 64544b9-645450a 728->749 750 6454469-6454485 728->750 731->732 751 6454311-645435f 731->751 732->712 732->713 741 64540c2-64540c4 737->741 742 645407b-6454089 737->742 738->737 746 64540c6-64540d0 741->746 747 64540d2-64540e2 741->747 742->741 753 645408b-645409d 742->753 746->747 762 645411b-6454127 746->762 757 64540e4-64540f2 747->757 758 645410d-6454113 call 6454aff 747->758 786 645450c-6454528 749->786 787 645452a-6454568 749->787 765 64544a9-64544ac 750->765 798 6454361-6454387 751->798 799 6454389-64543ad 751->799 767 64540a3-64540a7 753->767 768 645409f-64540a1 753->768 774 6454105-6454108 757->774 775 64540f4-6454103 757->775 769 6454119 758->769 762->710 777 645412d-6454148 762->777 765->729 770 6454493-6454496 765->770 776 64540ad-64540bc 767->776 768->776 769->762 770->749 778 6454498-64544a8 770->778 774->675 775->762 776->741 788 6454239-645424c 776->788 777->675 778->765 786->787 788->682 798->799 808 64543df-64543f8 799->808 809 64543af-64543c6 799->809 811 6454403-6454404 808->811 812 64543fa 808->812 816 64543d2-64543dd 809->816 817 64543c8-64543cb 809->817 811->732 812->811 816->808 816->809 817->816
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: $^q
                      • API String ID: 0-388095546
                      • Opcode ID: ad376091b9f11f0bf1997a2afec367f91ecb1d6124dd305922b2cd4dd678bace
                      • Instruction ID: d7d21a38560552e04e603d181f4b5446ee588935355a64767bc8071837a264b0
                      • Opcode Fuzzy Hash: ad376091b9f11f0bf1997a2afec367f91ecb1d6124dd305922b2cd4dd678bace
                      • Instruction Fuzzy Hash: 67127234B102158FCB55DF79C584A6EBBF2BF89710B15816AE806EB365DB31DC42CBA0
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e5108e14b1412fdd198b0749a1b75a319e4d47812c6b6cc56db2aa993b2704e7
                      • Instruction ID: f69a2ade39a819c5febe5aff3c3089b1cc903bbe6cf56a457b2b7c23dc2c07d6
                      • Opcode Fuzzy Hash: e5108e14b1412fdd198b0749a1b75a319e4d47812c6b6cc56db2aa993b2704e7
                      • Instruction Fuzzy Hash: 5FF1A431A002099FDB15DF68D884B9EBBF2EF84300F56856AE905DB362DB71DD45CBA0
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fcce6137f97b30c7cfddc0e50f62aa817f134738eccfecbd5349f01d0076648b
                      • Instruction ID: 04ea2a55f2fcdda1d07c28fd7696dbf9c2d17e4f1a7174643119dbe00a96ce56
                      • Opcode Fuzzy Hash: fcce6137f97b30c7cfddc0e50f62aa817f134738eccfecbd5349f01d0076648b
                      • Instruction Fuzzy Hash: C9D1D574900218CFCB18EFB4D854A9DBBB2FF8A305F1085A9D55AA7394DB31998ACF11

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 295 6430d80-6430dcb 301 6430dd1-6430dd3 295->301 302 6430efd-6430f10 295->302 303 6430dd6-6430de5 301->303 305 6431006-6431011 302->305 306 6430f16-6430f25 302->306 309 6430deb-6430e1d 303->309 310 6430e9d-6430ea1 303->310 308 6431019-6431022 305->308 315 6430fd1-6430fd5 306->315 316 6430f2b-6430f51 306->316 345 6430e26-6430e2d 309->345 346 6430e1f-6430e24 309->346 311 6430ea3-6430eae 310->311 312 6430eb0 310->312 314 6430eb5-6430eb8 311->314 312->314 314->308 321 6430ebe-6430ec2 314->321 318 6430fd7-6430fe2 315->318 319 6430fe4 315->319 343 6430f53-6430f58 316->343 344 6430f5a-6430f61 316->344 322 6430fe6-6430fe8 318->322 319->322 323 6430ed1 321->323 324 6430ec4-6430ecf 321->324 329 6430fea-6430ff4 322->329 330 6431039-6431050 322->330 327 6430ed3-6430ed5 323->327 324->327 332 6431025-6431032 327->332 333 6430edb-6430ee5 327->333 342 6430ff7-6431000 329->342 356 6431052-6431068 330->356 357 6431095-64310b5 330->357 332->330 347 6430ee8-6430ef2 333->347 342->305 342->306 349 6430fc5-6430fcf 343->349 350 6430f63-6430f84 344->350 351 6430f86-6430faa 344->351 352 6430e52-6430e76 345->352 353 6430e2f-6430e50 345->353 354 6430e91-6430e9b 346->354 347->303 355 6430ef8 347->355 349->342 350->349 378 6430fc2 351->378 379 6430fac-6430fb2 351->379 380 6430e78-6430e7e 352->380 381 6430e8e 352->381 353->354 354->347 355->308 358 64310da-64310fe 356->358 359 643106a-6431093 356->359 376 64310bb-64310bd 357->376 377 6431189-643119c 357->377 374 6431104-6431106 358->374 359->357 382 6431108-643110e 374->382 383 643111e-6431127 374->383 384 64310c0-64310cf 376->384 394 64311a2-64311b1 377->394 395 6431234-643123f 377->395 378->349 385 6430fb6-6430fb8 379->385 386 6430fb4 379->386 387 6430e82-6430e84 380->387 388 6430e80 380->388 381->354 389 6431112-6431114 382->389 390 6431110 382->390 396 6431174-643117e 383->396 397 64310d1-64310d3 384->397 398 6431129-643112d 384->398 385->378 386->378 387->381 388->381 389->383 390->383 404 64311b3-64311dc 394->404 405 64311ff-6431203 394->405 399 6431247-6431250 395->399 396->384 400 6431184 396->400 397->358 401 643112f-643113a 398->401 402 643113c 398->402 400->399 406 6431141-6431144 401->406 402->406 424 64311f4-64311fd 404->424 425 64311de-64311e4 404->425 408 6431212 405->408 409 6431205-6431210 405->409 406->399 410 643114a-643114e 406->410 413 6431214-6431216 408->413 409->413 411 6431150-643115b 410->411 412 643115d 410->412 417 643115f-6431161 411->417 412->417 415 6431267-643127c 413->415 416 6431218-6431222 413->416 434 64312c1 415->434 435 643127e-6431284 415->435 427 6431225-643122e 416->427 421 6431253-6431260 417->421 422 6431167-6431171 417->422 421->415 422->396 424->427 428 64311e6 425->428 429 64311e8-64311ea 425->429 427->394 427->395 428->424 429->424 438 64312c7-64312e9 434->438 436 6431286-6431293 435->436 437 6431298-64312af 435->437 436->437 437->438 440 64312b1-64312b7 437->440 445 64312ec-64312f0 438->445 442 64312bb-64312bd 440->442 443 64312b9 440->443 442->434 443->438 446 64312f2-64312f7 445->446 447 64312f9-64312fe 445->447 448 6431304-6431307 446->448 447->448 449 64314f8-6431500 448->449 450 643130d-6431322 448->450 450->445 452 6431324 450->452 453 64313e0-6431405 452->453 454 643132b-6431350 452->454 455 6431498-64314b9 452->455 467 6431407-6431409 453->467 468 643140b-643140f 453->468 465 6431352-6431354 454->465 466 6431356-643135a 454->466 459 64314bf-64314f3 455->459 459->445 471 64313b8-64313db 465->471 472 643137b-643139e 466->472 473 643135c-6431379 466->473 475 643146d-6431493 467->475 469 6431411-643142e 468->469 470 6431430-6431453 468->470 469->475 489 6431455-643145b 470->489 490 643146b 470->490 471->445 491 64313a0-64313a6 472->491 492 64313b6 472->492 473->471 475->445 493 643145f-6431461 489->493 494 643145d 489->494 490->475 495 64313aa-64313ac 491->495 496 64313a8 491->496 492->471 493->490 494->490 495->492 496->492
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                      • API String ID: 0-2449488485
                      • Opcode ID: 4ffc1309b57dc4a2ea4d69befa505e37b84b71ed0587df6cebf5dbfc34bfa06d
                      • Instruction ID: e5fc03c381b58f3ab4f7aef0d009a4f5c11705d801143b6ec172f6af0cefc6ad
                      • Opcode Fuzzy Hash: 4ffc1309b57dc4a2ea4d69befa505e37b84b71ed0587df6cebf5dbfc34bfa06d
                      • Instruction Fuzzy Hash: B232CE30B002149FDB959B69C944A6EBBF6FF8D700B14846AE516DB3A6CF70DC02CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 497 6431582-6431584 498 643158e 497->498 499 6431598-64315af 498->499 500 64315b5-64315b7 499->500 501 64315b9-64315bf 500->501 502 64315cf-64315f1 500->502 503 64315c3-64315c5 501->503 504 64315c1 501->504 507 6431638-643163f 502->507 503->502 504->502 508 6431571-6431580 507->508 509 6431645-6431743 507->509 508->497 512 64315f3-64315f7 508->512 519 6431744-6431747 509->519 513 6431606 512->513 514 64315f9-6431604 512->514 516 643160b-643160e 513->516 514->516 516->509 520 6431610-6431614 516->520 521 6431623 520->521 522 6431616-6431621 520->522 523 6431625-6431627 521->523 522->523 525 643174a-643177c 523->525 526 643162d-6431637 523->526 532 6431795-64317a7 525->532 533 643177e-6431788 525->533 526->507 536 64317a9-64317af 532->536 537 64317bf-64317e1 532->537 533->519 534 643178a-6431794 533->534 534->532 538 64317b3-64317b5 536->538 539 64317b1 536->539 542 64317e4-64317e8 537->542 538->537 539->537 543 64317f1-64317f6 542->543 544 64317ea-64317ef 542->544 545 64317fc-64317ff 543->545 544->545 546 6431805-643181a 545->546 547 6431abf-6431ac7 545->547 546->542 549 643181c 546->549 550 6431823-64318d3 549->550 551 6431990-64319bd 549->551 552 6431a07-6431a2c 549->552 553 64318d8-643198b 549->553 550->542 571 64319c3-64319cd 551->571 572 6431b36-6431b71 551->572 567 6431a32-6431a36 552->567 568 6431a2e-6431a30 552->568 553->542 574 6431a57-6431a7a 567->574 575 6431a38-6431a55 567->575 573 6431a94-6431aba 568->573 578 64319d3-6431a02 571->578 579 6431b00-6431b2f 571->579 573->542 596 6431a92 574->596 597 6431a7c-6431a82 574->597 575->573 578->542 579->572 596->573 599 6431a86-6431a88 597->599 600 6431a84 597->600 599->596 600->596
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                      • API String ID: 0-2392861976
                      • Opcode ID: 16a0de1c302d1853011085dd4bf7dccbfc3315bfb0c91928e2e55019b8e15f63
                      • Instruction ID: 3435085782243660e4717e6c94f069b1a83db143c32efee6a3cbaf2484c6567c
                      • Opcode Fuzzy Hash: 16a0de1c302d1853011085dd4bf7dccbfc3315bfb0c91928e2e55019b8e15f63
                      • Instruction Fuzzy Hash: 47C1D434B006248FDB95ABA8C854A3EB7E6FF89705F14446AD602CB3A2DF75DC06C791

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 604 e3d0a8-e3d147 GetCurrentProcess 608 e3d150-e3d184 GetCurrentThread 604->608 609 e3d149-e3d14f 604->609 610 e3d186-e3d18c 608->610 611 e3d18d-e3d1c1 GetCurrentProcess 608->611 609->608 610->611 612 e3d1c3-e3d1c9 611->612 613 e3d1ca-e3d1e5 call e3d289 611->613 612->613 617 e3d1eb-e3d21a GetCurrentThreadId 613->617 618 e3d223-e3d285 617->618 619 e3d21c-e3d222 617->619 619->618
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 00E3D136
                      • GetCurrentThread.KERNEL32 ref: 00E3D173
                      • GetCurrentProcess.KERNEL32 ref: 00E3D1B0
                      • GetCurrentThreadId.KERNEL32 ref: 00E3D209
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756689435.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e30000_RegAsm.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 97fd21020664cdc6bb788fa9b5c19815f901254ebab0e1d6cc7a4d7af414859d
                      • Instruction ID: 47821073768809791634b8100e974578a37d644aa49c3e3f032c3d8d6fbf3d2e
                      • Opcode Fuzzy Hash: 97fd21020664cdc6bb788fa9b5c19815f901254ebab0e1d6cc7a4d7af414859d
                      • Instruction Fuzzy Hash: A25157B09013498FDB14CFA9D948BAEBFF1EF88314F208459E059A7360DB749989CF65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 626 e3d0b8-e3d147 GetCurrentProcess 630 e3d150-e3d184 GetCurrentThread 626->630 631 e3d149-e3d14f 626->631 632 e3d186-e3d18c 630->632 633 e3d18d-e3d1c1 GetCurrentProcess 630->633 631->630 632->633 634 e3d1c3-e3d1c9 633->634 635 e3d1ca-e3d1e5 call e3d289 633->635 634->635 639 e3d1eb-e3d21a GetCurrentThreadId 635->639 640 e3d223-e3d285 639->640 641 e3d21c-e3d222 639->641 641->640
                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 00E3D136
                      • GetCurrentThread.KERNEL32 ref: 00E3D173
                      • GetCurrentProcess.KERNEL32 ref: 00E3D1B0
                      • GetCurrentThreadId.KERNEL32 ref: 00E3D209
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756689435.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e30000_RegAsm.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 2c0c2aab011d3299660b09e1e48e61f36e8693789c3a137fbbfc877a0371c4c9
                      • Instruction ID: 36246457be505ecdce7ce3c8b61cd4ce87fb65b7bbf05dcadcc46cda185a665c
                      • Opcode Fuzzy Hash: 2c0c2aab011d3299660b09e1e48e61f36e8693789c3a137fbbfc877a0371c4c9
                      • Instruction Fuzzy Hash: B15147B09013498FDB14CFA9D948B9EBBF1EF88314F208459E419A7360DB749988CF65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 820 6430598-64305c7 822 6430ad7-6430d2e 820->822 823 64305cd-64305fd 820->823 831 6430138-6430145 823->831 834 643014b-6430160 831->834 835 643076a-6430774 831->835 834->831 839 6430162 834->839 840 6430422-6430445 839->840 841 6430512-6430535 839->841 842 6430251-643027f 839->842 843 6430337 839->843 844 64302c4-64302f2 839->844 845 64303aa-64303cd 839->845 846 643049a-64304bd 839->846 847 6430169-643018c 839->847 848 64301de 839->848 893 64308bb-64308ea 840->893 894 643044b-643044f 840->894 895 643053b-643053f 841->895 896 64309ff-6430a2e 841->896 870 6430281-6430287 842->870 871 6430297-64302bf 842->871 858 6430341-643035d 843->858 876 64302f4-64302fa 844->876 877 643030a-6430332 844->877 900 64303d3-64303d7 845->900 901 6430819-6430848 845->901 902 64304c3-64304c7 846->902 903 643095d-643098c 846->903 904 6430192-6430196 847->904 905 6430777-64307a6 847->905 856 64301e8-6430204 848->856 866 643020a-643020c 856->866 868 6430363-6430365 858->868 872 6430224-643024c 866->872 873 643020e-6430214 866->873 874 6430367-643036d 868->874 875 643037d-64303a5 868->875 887 643028b-643028d 870->887 888 6430289 870->888 871->831 872->831 882 6430216 873->882 883 6430218-643021a 873->883 885 6430371-6430373 874->885 886 643036f 874->886 875->831 878 64302fe-6430300 876->878 879 64302fc 876->879 877->831 878->877 879->877 882->872 883->872 885->875 886->875 887->871 888->871 920 64308f1-6430920 893->920 906 6430927-6430956 894->906 907 6430455-643045f 894->907 908 6430545-643054f 895->908 909 6430a6b-6430ad0 895->909 922 6430a35-6430a64 896->922 911 6430885-64308b4 900->911 912 64303dd-64303e7 900->912 930 643084f-643087e 901->930 913 64309c9-64309f8 902->913 914 64304cd-64304d7 902->914 932 6430993-64309c2 903->932 915 64307e3-6430812 904->915 916 643019c-64301a6 904->916 934 64307ad-64307dc 905->934 906->903 907->920 921 6430465-6430495 907->921 908->922 923 6430555-6430585 908->923 909->822 911->893 912->930 931 64303ed-643041d 912->931 913->896 914->932 933 64304dd-643050d 914->933 915->901 916->934 935 64301ac-64301d9 916->935 920->906 921->831 922->909 923->831 930->911 931->831 932->913 933->831 934->915 935->831
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: ilPj
                      • API String ID: 0-830177475
                      • Opcode ID: b3b7443a131d003fec3871dd901cff03ec95b9275fcbe6ead63709dc450609f9
                      • Instruction ID: adc517663230359818c1e2aec4cc84bb5c980d25936e4cba9d18041d400faaf1
                      • Opcode Fuzzy Hash: b3b7443a131d003fec3871dd901cff03ec95b9275fcbe6ead63709dc450609f9
                      • Instruction Fuzzy Hash: 580290307402248FDB659F68D954A2EB7E2FFC9704F004959D5029F3A2CFB6ED468B91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1028 e3ae30-e3ae3f 1029 e3ae41-e3ae4e call e39838 1028->1029 1030 e3ae6b-e3ae6f 1028->1030 1036 e3ae50 1029->1036 1037 e3ae64 1029->1037 1032 e3ae83-e3aec4 1030->1032 1033 e3ae71-e3ae7b 1030->1033 1039 e3aed1-e3aedf 1032->1039 1040 e3aec6-e3aece 1032->1040 1033->1032 1085 e3ae56 call e3b0c8 1036->1085 1086 e3ae56 call e3b0b8 1036->1086 1037->1030 1041 e3af03-e3af05 1039->1041 1042 e3aee1-e3aee6 1039->1042 1040->1039 1044 e3af08-e3af0f 1041->1044 1045 e3aef1 1042->1045 1046 e3aee8-e3aeef call e3a814 1042->1046 1043 e3ae5c-e3ae5e 1043->1037 1047 e3afa0-e3afb7 1043->1047 1049 e3af11-e3af19 1044->1049 1050 e3af1c-e3af23 1044->1050 1051 e3aef3-e3af01 1045->1051 1046->1051 1061 e3afb9-e3b018 1047->1061 1049->1050 1054 e3af30-e3af39 call e3a824 1050->1054 1055 e3af25-e3af2d 1050->1055 1051->1044 1059 e3af46-e3af4b 1054->1059 1060 e3af3b-e3af43 1054->1060 1055->1054 1062 e3af69-e3af76 1059->1062 1063 e3af4d-e3af54 1059->1063 1060->1059 1079 e3b01a-e3b060 1061->1079 1070 e3af99-e3af9f 1062->1070 1071 e3af78-e3af96 1062->1071 1063->1062 1064 e3af56-e3af66 call e3a834 call e3a844 1063->1064 1064->1062 1071->1070 1080 e3b062-e3b065 1079->1080 1081 e3b068-e3b093 GetModuleHandleW 1079->1081 1080->1081 1082 e3b095-e3b09b 1081->1082 1083 e3b09c-e3b0b0 1081->1083 1082->1083 1085->1043 1086->1043
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00E3B086
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756689435.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e30000_RegAsm.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: c6480030789de58a04ff07010596ff4b453607228dde85773f0a5b714643e25a
                      • Instruction ID: 8531eabef199f64f03a10121b10f09701ed7313a56268059933d0a26ba1e5331
                      • Opcode Fuzzy Hash: c6480030789de58a04ff07010596ff4b453607228dde85773f0a5b714643e25a
                      • Instruction Fuzzy Hash: 997127B0A00B458FD724DF2AD14975ABBF1FF88304F04892DE48AE7A50D775E989CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1087 e34248-e35a01 CreateActCtxA 1090 e35a03-e35a09 1087->1090 1091 e35a0a-e35a64 1087->1091 1090->1091 1098 e35a73-e35a77 1091->1098 1099 e35a66-e35a69 1091->1099 1100 e35a79-e35a85 1098->1100 1101 e35a88 1098->1101 1099->1098 1100->1101 1103 e35a89 1101->1103 1103->1103
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 00E359F1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756689435.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e30000_RegAsm.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: d989e3d453ce01c9c2df912e814f465d2b1c988a6106ec6da5cb219061f20452
                      • Instruction ID: a45c990c4fdff3a2eb9e71f8b618da944e71809e4f8f7aad861d48b845c96483
                      • Opcode Fuzzy Hash: d989e3d453ce01c9c2df912e814f465d2b1c988a6106ec6da5cb219061f20452
                      • Instruction Fuzzy Hash: E541E2B1C00619CADB24DFA9C848B9DBBB5FF44314F24816AD408BB255DB756949CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1104 e35935-e35a01 CreateActCtxA 1106 e35a03-e35a09 1104->1106 1107 e35a0a-e35a64 1104->1107 1106->1107 1114 e35a73-e35a77 1107->1114 1115 e35a66-e35a69 1107->1115 1116 e35a79-e35a85 1114->1116 1117 e35a88 1114->1117 1115->1114 1116->1117 1119 e35a89 1117->1119 1119->1119
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 00E359F1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756689435.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e30000_RegAsm.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 0b49fcdeee6e0af1fa5a0dca44e5aaaf3b20ace9e03e6c8c071f262074248194
                      • Instruction ID: 7095b40669f0cd541be8de3f500f3aa74a09ecf287f9d10a242a75013b08252d
                      • Opcode Fuzzy Hash: 0b49fcdeee6e0af1fa5a0dca44e5aaaf3b20ace9e03e6c8c071f262074248194
                      • Instruction Fuzzy Hash: 334102B1C00759CEDB24CFA9C888B8DBBB5FF48304F24819AD408BB251DB755949CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1120 e3d2f9-e3d394 DuplicateHandle 1121 e3d396-e3d39c 1120->1121 1122 e3d39d-e3d3ba 1120->1122 1121->1122
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E3D387
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756689435.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e30000_RegAsm.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 090e9908a5e86b8cc622e7b5e71c7b460994616df3887cbf56bc38ad3e0e709b
                      • Instruction ID: 3a3658cf61f9ecbde4bb80ee5cdbacb17eb91e2a45534fe587724243416fe003
                      • Opcode Fuzzy Hash: 090e9908a5e86b8cc622e7b5e71c7b460994616df3887cbf56bc38ad3e0e709b
                      • Instruction Fuzzy Hash: EB2114B59002489FDB10CFAAD985AEEBFF5FB48324F14801AE858B3310C374A955CF60

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1125 e3d300-e3d394 DuplicateHandle 1126 e3d396-e3d39c 1125->1126 1127 e3d39d-e3d3ba 1125->1127 1126->1127
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E3D387
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756689435.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e30000_RegAsm.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: eebb56df9f124713d2fd5edeea4e15e75cdf1c2fabc963be91970a70c98d13c7
                      • Instruction ID: dfa45a6375cec988fa351253adfd315cb680ec523f8d43abc65ada2e219cdc9c
                      • Opcode Fuzzy Hash: eebb56df9f124713d2fd5edeea4e15e75cdf1c2fabc963be91970a70c98d13c7
                      • Instruction Fuzzy Hash: 2C21E4B59002489FDB10CF9AD984ADEBFF4FB48324F14841AE918A3310D374A954CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1130 e3a870-e3b2e8 1132 e3b2f0-e3b31f LoadLibraryExW 1130->1132 1133 e3b2ea-e3b2ed 1130->1133 1134 e3b321-e3b327 1132->1134 1135 e3b328-e3b345 1132->1135 1133->1132 1134->1135
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E3B101,00000800,00000000,00000000), ref: 00E3B312
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756689435.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e30000_RegAsm.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 88c218dd143d00d3f9359ef1e2f6abec94b2827381e9e801b37b7c36d80c1bbc
                      • Instruction ID: 23c785fed71eaf60356b38b9863e1d83d5409e2202497cdde7725b9492017f33
                      • Opcode Fuzzy Hash: 88c218dd143d00d3f9359ef1e2f6abec94b2827381e9e801b37b7c36d80c1bbc
                      • Instruction Fuzzy Hash: 291114B6D003598FCB10CF9AC448ADEFBF4EB88314F10842AD91AB7210C7B5A945CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1138 e3b2a0-e3b2e8 1139 e3b2f0-e3b31f LoadLibraryExW 1138->1139 1140 e3b2ea-e3b2ed 1138->1140 1141 e3b321-e3b327 1139->1141 1142 e3b328-e3b345 1139->1142 1140->1139 1141->1142
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E3B101,00000800,00000000,00000000), ref: 00E3B312
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756689435.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e30000_RegAsm.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 35ccdd1064303ced2ac63f02c68ccc3ffa0e5f5792cf3001cd171fa82a5bbbf4
                      • Instruction ID: 92fac926750bd1283de49f1cd28f3cedb2ccf04332624ef4034a8c5b349f9dd2
                      • Opcode Fuzzy Hash: 35ccdd1064303ced2ac63f02c68ccc3ffa0e5f5792cf3001cd171fa82a5bbbf4
                      • Instruction Fuzzy Hash: 1911E4B69002598FDB20CFAAD449ADEFFF4EF88314F14842AD559B7210C3B5A945CFA4
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00E3B086
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756689435.0000000000E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_e30000_RegAsm.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 2c92da4f670064f7d887e956c8a6945cbd99ac78d11acc5dd4cf41ca2238019a
                      • Instruction ID: 6be39b67b536dbc853217993cd18c1839d11b19b216a8795fd9b11c687d30811
                      • Opcode Fuzzy Hash: 2c92da4f670064f7d887e956c8a6945cbd99ac78d11acc5dd4cf41ca2238019a
                      • Instruction Fuzzy Hash: A411FDB6C00749CBCB24CF9AC448A9EFBF4AB88324F10842AD569B7210C375A545CFA5
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 59f06261a6c3e59153b63c0ffa0d59e34809585e0993b5dafa0c4f767ecfd4ce
                      • Instruction ID: 0b0dbcecf4815273ad19ba3893d073d599c3c2f39d7d968c4be66aa7b6afd905
                      • Opcode Fuzzy Hash: 59f06261a6c3e59153b63c0ffa0d59e34809585e0993b5dafa0c4f767ecfd4ce
                      • Instruction Fuzzy Hash: 26C23E30B402189FDB55DB68C951A9EBBB6FF88700F104099E60AAB3A1DF71DE46CF51
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4'^q
                      • API String ID: 0-1614139903
                      • Opcode ID: 36850091c43514adf391ffa7a33c19242359dbc6ada6dc35f40eb02123c500c6
                      • Instruction ID: 3c61dc7068443ccf4db6b0e716db805d395256e97f04adbefb85f1aa889e7bd5
                      • Opcode Fuzzy Hash: 36850091c43514adf391ffa7a33c19242359dbc6ada6dc35f40eb02123c500c6
                      • Instruction Fuzzy Hash: CC3104327006104FC72AAB38A85466EB7E6DFCA360705447AE809CB791DE31EC0BC7A1
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4'^q
                      • API String ID: 0-1614139903
                      • Opcode ID: a76b2956dbe84a21f643ff2610e05a243a61c874e478001d1afd9bd33c1e8881
                      • Instruction ID: 486de67a4504463c2b99720f0583b4fff5cffaacce814148e16541731e1621a2
                      • Opcode Fuzzy Hash: a76b2956dbe84a21f643ff2610e05a243a61c874e478001d1afd9bd33c1e8881
                      • Instruction Fuzzy Hash: 2B319A31B102188BDB09FB7CA4A456F76E3EFC8210B504439D50ACB385EE75CE0687E2
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4'^q
                      • API String ID: 0-1614139903
                      • Opcode ID: ab92dc6138651bf114280304af24d6117fa886e84c8ec2b42ae3850b1e1733e7
                      • Instruction ID: 9236932829938a9b75dffbcc0037327798086e051d12e5a85f4b65cbb97ad2d9
                      • Opcode Fuzzy Hash: ab92dc6138651bf114280304af24d6117fa886e84c8ec2b42ae3850b1e1733e7
                      • Instruction Fuzzy Hash: EA218D31B102198BDB0ABB78A5A467E36E3AFC8215754083DD50BDB385EE75CD0687E2
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4'^q
                      • API String ID: 0-1614139903
                      • Opcode ID: 111da66ea064465e2c10cccebb1a2c4f8b1394e1750d375b05e5d80df496ef67
                      • Instruction ID: 20d12c9cbc90a94399c4fa069be6ea2abb069ac4fc9759448dcd90f927f28f76
                      • Opcode Fuzzy Hash: 111da66ea064465e2c10cccebb1a2c4f8b1394e1750d375b05e5d80df496ef67
                      • Instruction Fuzzy Hash: BB012430906248AFCF08EFB8E9954DDBFB1FF45200B1001AAE4059B751DF300E89CBA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4'^q
                      • API String ID: 0-1614139903
                      • Opcode ID: da25647af5f784f164330f76d43882b378f7c42827d4a28a2c3c567bea4dacba
                      • Instruction ID: c8f0bca67cb86bfab7b7cf56c11a0d8d4b00cda6c371fc1f435316f902aa9d72
                      • Opcode Fuzzy Hash: da25647af5f784f164330f76d43882b378f7c42827d4a28a2c3c567bea4dacba
                      • Instruction Fuzzy Hash: 3DF090313406054FC218EB2DE454A6EB7E7EFC9250310492DD05A8B758EF70ED4A8BA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4'^q
                      • API String ID: 0-1614139903
                      • Opcode ID: bb91ca24b5dd62d4cf67dcacdbab44c8007482b9594a4e7b3d1a211e7d2e752b
                      • Instruction ID: e21012792fbce2c5a86acc7cc81f8f0d04b510f8cd8a1386a7b5d32218c1e7d0
                      • Opcode Fuzzy Hash: bb91ca24b5dd62d4cf67dcacdbab44c8007482b9594a4e7b3d1a211e7d2e752b
                      • Instruction Fuzzy Hash: D2F03C30A01609EFCF18EFB8E99559CBBB2FB44204B1045A9D40A9B764EF705A48DF51
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: db7cf1d743f58a3c1f04d5396e5f54a8bfb9b2f084bcbd9aa8d910188f35645c
                      • Instruction ID: 6a5acb76fa3ca51426eb652d8536984e36294c342dd1e9c8293089f369725b51
                      • Opcode Fuzzy Hash: db7cf1d743f58a3c1f04d5396e5f54a8bfb9b2f084bcbd9aa8d910188f35645c
                      • Instruction Fuzzy Hash: AA428E307406288FCB69AF68D950A2EB7F2FBC9704B104A5CD5039B791CFB6ED058B95
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ca1022db7cdc279faa51a8ab41ca797ec1048d95635a5d99eddb24c0783d427a
                      • Instruction ID: 1734bd90aa6fbc647c07a9d093bd060617ab36e7b7f707990aaca368216e8bc7
                      • Opcode Fuzzy Hash: ca1022db7cdc279faa51a8ab41ca797ec1048d95635a5d99eddb24c0783d427a
                      • Instruction Fuzzy Hash: 3BE17E34B142159FCB45DB68C8549AFBBF6FF89310B15809AE616CB3A2CB71DC05CBA1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 331f6cedf5deb0455ec7d6fdba2a7f1339e60de24771706f82ee4169bc524152
                      • Instruction ID: 5520d81b10368b6cea5e1ebefca23043991653136e708eb044f9a0ef9f7176ba
                      • Opcode Fuzzy Hash: 331f6cedf5deb0455ec7d6fdba2a7f1339e60de24771706f82ee4169bc524152
                      • Instruction Fuzzy Hash: 88F11834B402149FCB45DF68C994EAEBBF6FF89704F108099E606DB3A2DA71ED418B50
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b64f80eabc66bf381065d49ee2abcb8ba8f2674083b49376e64f84c6291812a4
                      • Instruction ID: 663f91896c88ee678a193b109a741ff9b9d465c3773ad2385e5002ffa86658a1
                      • Opcode Fuzzy Hash: b64f80eabc66bf381065d49ee2abcb8ba8f2674083b49376e64f84c6291812a4
                      • Instruction Fuzzy Hash: 9CE19230B402149FDB559F68C954A2EB7A2FF8DB04F104559E9028F3A2CFB6DD46CB91
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 37b1136cd0b99e82295bb224189663c838ab80baa76f39441da24b8ff51e2d3f
                      • Instruction ID: 58b1ed0159d14cc4db095fa3d52d28b1c46cb71164e02cfab68057e1e9ef231c
                      • Opcode Fuzzy Hash: 37b1136cd0b99e82295bb224189663c838ab80baa76f39441da24b8ff51e2d3f
                      • Instruction Fuzzy Hash: 25D1A534B402149FDB559B64C964B2EB7A2FF8DB04F00455AE9028F3A2CFB6DC46CB91
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1c12f0f6deb1fd14d5843dfc10a947501f3af3dcd4bedf49ef9cd6fa4a040303
                      • Instruction ID: e25e80f5c9e6b9d7e485de41a38e25adcdd51165f2413a96715e471084758d1f
                      • Opcode Fuzzy Hash: 1c12f0f6deb1fd14d5843dfc10a947501f3af3dcd4bedf49ef9cd6fa4a040303
                      • Instruction Fuzzy Hash: 05C18434B402149FDB859B64C955B6E7BE6BF8DB04F004156E902CB3A2CFB6DC46CB91
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7b674a7adb88e305e16354eef4f8213d7c366e0aefe148c6b4f7953d2cdc1f52
                      • Instruction ID: 60b02d505028f4c54f3d18b4e0b669d90bd989f64c629ffe26196d11832203aa
                      • Opcode Fuzzy Hash: 7b674a7adb88e305e16354eef4f8213d7c366e0aefe148c6b4f7953d2cdc1f52
                      • Instruction Fuzzy Hash: 9BC1B934B402149FDB449B64C955B2E77E6FF8DB05F104156EA028B3A2CF76DC46CB91
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ca7b907622c5a5a687f3270ddb0920218c599bafb8f511611fcf8fc2c9599f73
                      • Instruction ID: cd71c2ddf61d77dce7343b21ae8681276c7bd2cbc580b83b7f6e9eed0fb2e097
                      • Opcode Fuzzy Hash: ca7b907622c5a5a687f3270ddb0920218c599bafb8f511611fcf8fc2c9599f73
                      • Instruction Fuzzy Hash: 64B1A734B402149FEB849B64C954B6E77E6FF8DB05F104156EA028B3A2CFB6DC46CB91
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8185e50b29890d7f388f75f7006741e4d8f5a84273e13a6d569724d970bcf541
                      • Instruction ID: 100071d0d9840d231d40d16bf93295c5c1b0d0624027f2b7ece6a971efc16a71
                      • Opcode Fuzzy Hash: 8185e50b29890d7f388f75f7006741e4d8f5a84273e13a6d569724d970bcf541
                      • Instruction Fuzzy Hash: 28C15C34B00605CFC755DF29D584AAABBF2FF88301B1581A9E946DB366DB30EC45CB60
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0aad67606bebec50683a3ffe37cbdcea2591d4af60503ba6d5e607e05385326e
                      • Instruction ID: 5c848f8202724b05d763630e310b1303397289f0ce074a2cd3c6164d9ec0a544
                      • Opcode Fuzzy Hash: 0aad67606bebec50683a3ffe37cbdcea2591d4af60503ba6d5e607e05385326e
                      • Instruction Fuzzy Hash: 885134B1E00358CFDB55CFA9C985BDEBBF6AF48314F14842AE815AB245DB749846CF80
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c10bcb8c8f2a293a65bcb22fb00a67b2c9efd0333778b16af3467ea7d593287f
                      • Instruction ID: 80106d278af2a2337034fbd476372f5f097111641e699c5ba64d2efd804a0a28
                      • Opcode Fuzzy Hash: c10bcb8c8f2a293a65bcb22fb00a67b2c9efd0333778b16af3467ea7d593287f
                      • Instruction Fuzzy Hash: 7D516635B102189FCB44DF68C88499ABBF2FF8D314B15806AE905EB361DB31EC45CB50
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ea40dbd0a086bf42859f41fbac97964f9aa3ee6bbb9a2d6832f35dda38001ec5
                      • Instruction ID: c20874b181757867d796280cfbbf3ea3a98e346d10a06ce9da8761e680e4b49c
                      • Opcode Fuzzy Hash: ea40dbd0a086bf42859f41fbac97964f9aa3ee6bbb9a2d6832f35dda38001ec5
                      • Instruction Fuzzy Hash: 665136B1E00358CFDB55CFA9C985BDEBBF5AF48304F14852AE815AB245DB749846CF80
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2da6e384641574fc49158aaa77bee3407c1018d3f3d7b8a1b5ac9f2c4ddae0a
                      • Instruction ID: ecf43c53af9e03da4cc4ec14c7778ba2c0925fa36d56c359aefbfb372f297b98
                      • Opcode Fuzzy Hash: c2da6e384641574fc49158aaa77bee3407c1018d3f3d7b8a1b5ac9f2c4ddae0a
                      • Instruction Fuzzy Hash: CF414A35A00606CFCB15CF59C98496ABBF2FF89310B5AC95AE9599B362D730F801CF94
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b49cdf031c4724af59f9082c3758a155e3c83a0ca9ada91a29e7014ef41803f5
                      • Instruction ID: b59c87dd10e5104c38bb54180267ccc4c92ccd3e6f700bdf5e1e2ceb0246b2ad
                      • Opcode Fuzzy Hash: b49cdf031c4724af59f9082c3758a155e3c83a0ca9ada91a29e7014ef41803f5
                      • Instruction Fuzzy Hash: DC416A35E112559FCB46CF68C88489EBBB2FF89314B1581AAE915EB362DB30EC05CB50
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bdbd99b2f4d748fa104deb5727667fdbc69b28a27134617ef3cbcb50ba6a9c9b
                      • Instruction ID: ff2d854041d4bc0d24f12b0dbcca8f1a592b1b9aa31f4d9c92c83b0591cdfcfa
                      • Opcode Fuzzy Hash: bdbd99b2f4d748fa104deb5727667fdbc69b28a27134617ef3cbcb50ba6a9c9b
                      • Instruction Fuzzy Hash: 5E314A357112149FCB05DF34E888A6EBBB2BF89201B518469E905CB365DB71ED45CB90
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 530a60bba05e8b292eed791c459796cd5751eb7f99fc81f55e3f51586746a760
                      • Instruction ID: c49aa024d42f6b5d18d9c4200b6fc365cccb19be1e83c7e54685b9d9fbae2150
                      • Opcode Fuzzy Hash: 530a60bba05e8b292eed791c459796cd5751eb7f99fc81f55e3f51586746a760
                      • Instruction Fuzzy Hash: 06316B35B112109FCB06DF38E88896EBBB2FF89301B118469E905CB3A5DB31ED45CB90
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 96fcccc5e73fc7a10826de0f5b90551a2e20203fd1f470894663bede70604a39
                      • Instruction ID: 2563ebc0ee707d243fe619a40f1ab8dc40a701fb0db8c0daa488ff746e4585d4
                      • Opcode Fuzzy Hash: 96fcccc5e73fc7a10826de0f5b90551a2e20203fd1f470894663bede70604a39
                      • Instruction Fuzzy Hash: 6841F2B1D01258DFDB54DFAAD940ADEBBF6EF88314F10802AE815B7251DB30A945CF91
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ea0a8cd54aec3cd11e8709c2fada2656825cfee96a2b01af2241281dd8867eeb
                      • Instruction ID: 7fc1acb63726808e8bea5b3203f6036dde19b8bd780847d95f66a7266eb1f40d
                      • Opcode Fuzzy Hash: ea0a8cd54aec3cd11e8709c2fada2656825cfee96a2b01af2241281dd8867eeb
                      • Instruction Fuzzy Hash: 4A3111B1D002589FDB14CFAAC985BDEBFF6AF88304F24802AD415BB250DB309945CF91
                      Memory Dump Source
                      • Source File: 00000001.00000002.1765990157.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6430000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e71fac479546a1bf2260e87bcb1252e3e0ed84edc4da3999a241da9651858960
                      • Instruction ID: 67a10b897753d4bdcd2e4f8c9452afda8450d0e662d199714594ce0f7a1d80be
                      • Opcode Fuzzy Hash: e71fac479546a1bf2260e87bcb1252e3e0ed84edc4da3999a241da9651858960
                      • Instruction Fuzzy Hash: 02215E35B50004AFCB54DF69D984EAABBB2FF88714F1180A9E9059B3A6CB31EC05CB50
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2cb7fa377dff89256d7f088877272f1cada27f4c68009e14024f0b1c1cead51b
                      • Instruction ID: 0460417e821aeb92fd132db8742411ed8767b8a4a6a8da7044ca98ab9c5e363c
                      • Opcode Fuzzy Hash: 2cb7fa377dff89256d7f088877272f1cada27f4c68009e14024f0b1c1cead51b
                      • Instruction Fuzzy Hash: 993114B1D01258DFCB14DFAAD894BDEBBF9EF48310F24842AE805B7240DB74A845CB90
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756399693.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_d4d000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 702cc2fcb148f9fcc1f91c8d31a50c6aa383858b1f44181ed9e6a9e610564568
                      • Instruction ID: ccf1846235e6d653a759cc8656275589bbfbe821257f6c7b42f484bf80296733
                      • Opcode Fuzzy Hash: 702cc2fcb148f9fcc1f91c8d31a50c6aa383858b1f44181ed9e6a9e610564568
                      • Instruction Fuzzy Hash: 4C212571500204DFDB05DF14D9C4B26BF66FB94324F28C569E94D4B25AC33AE856CAB2
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756399693.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_d4d000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b43cd5afa1ddc8169cbe8372ce9ad3031bdeca3225dacd44328de703cbe5a28b
                      • Instruction ID: 904bd74e8685ad1fe15ad147c02f093e770a059eb51e8056d2ca9dc7f4819f88
                      • Opcode Fuzzy Hash: b43cd5afa1ddc8169cbe8372ce9ad3031bdeca3225dacd44328de703cbe5a28b
                      • Instruction Fuzzy Hash: 92213471604240DFCB05DF14D9C0B2BBF66FB98318F28C669E9494B256C736D856CBB2
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756454435.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_d5d000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0d4ef6a9dfd19a1d0d25de0454a4eed53b6ddd0c93100b922a8d53e1cc3c8d51
                      • Instruction ID: e565b34d1282a997be3625e775cf5d4112bce0d9c8653dce40ebbfcd71e2ec76
                      • Opcode Fuzzy Hash: 0d4ef6a9dfd19a1d0d25de0454a4eed53b6ddd0c93100b922a8d53e1cc3c8d51
                      • Instruction Fuzzy Hash: 5221F271604240DFDF24DF18D9C4B26BBA6EB84315F24C569DC494B296C33AD84BCA71
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bd344c26e8d6173b62bd66949d9a6c3dcf97423f607db85d8a3741321121bbd9
                      • Instruction ID: 5936acb23ecafa78340b7f445da644b27910f5534ac1d35bde498a1123d63800
                      • Opcode Fuzzy Hash: bd344c26e8d6173b62bd66949d9a6c3dcf97423f607db85d8a3741321121bbd9
                      • Instruction Fuzzy Hash: 6621F0B1D00258DFDB14DFA9C995B9EBFB9AF08310F24842AE405BB241DB74A946CB94
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756454435.0000000000D5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D5D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_d5d000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9634930f929aa4eb5f5a096405298c1cedbb5c55724a8decdd17d74061ab6c32
                      • Instruction ID: 3b28b27965e9f91ebf492971c81f7ba7e6adc9a38a64897e834c1e7b812eee4a
                      • Opcode Fuzzy Hash: 9634930f929aa4eb5f5a096405298c1cedbb5c55724a8decdd17d74061ab6c32
                      • Instruction Fuzzy Hash: 71217C755093808FDB12CF24D994715BF72EB46214F28C5EADC498B6A7C33A980ACB72
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 899f642de33d802066f4538ca9b4f809380cf69ddd4ce251841bb6b894f2d3e4
                      • Instruction ID: fab659b61b22411106c929c4b65d9305e4e3bbd710b54846bdf1f20a585d0113
                      • Opcode Fuzzy Hash: 899f642de33d802066f4538ca9b4f809380cf69ddd4ce251841bb6b894f2d3e4
                      • Instruction Fuzzy Hash: A211E5312002045FCA9D6778E8549BEBBA7FEC22503440529E1078BAD0CDA0AD4A8BB5
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756399693.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_d4d000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                      • Instruction ID: 872f06c3340c8e1ad6502cdae91aa4de8cb9db53146e3f80692ac2611994591a
                      • Opcode Fuzzy Hash: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                      • Instruction Fuzzy Hash: 6F110376404280CFCB02CF10D9C4B16BF72FB94324F28C6A9D8090B616C33AE85ACBA1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756399693.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_d4d000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                      • Instruction ID: da55735c1e24fa54b24fa401f6ebd62a525e2a7aa8942d0194d4e986a7d03052
                      • Opcode Fuzzy Hash: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                      • Instruction Fuzzy Hash: 5811D376504280CFCB16CF14D9C4B16BF72FB94318F28C6A9D8494B656C336D85ACBA1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ecef6606a40b5009d241eef178b2f17b246a9c973e0a0441121a225f2b035a14
                      • Instruction ID: 3a857286a15c58068e92f1deb141cd1ebb378ec02846c72af514e042a4857201
                      • Opcode Fuzzy Hash: ecef6606a40b5009d241eef178b2f17b246a9c973e0a0441121a225f2b035a14
                      • Instruction Fuzzy Hash: F9010C302047054FD329AF35E5045AE7BE3EFC5311B108629D04A87745CFB4D90D8BE1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eaefb2ac60ef8df75e708020a87048d55bacb5af573ee898d4184df86347d29e
                      • Instruction ID: 36318f04f7f501109dd3d99be2b5a6a28032b5a38219bcb548f023757930a86e
                      • Opcode Fuzzy Hash: eaefb2ac60ef8df75e708020a87048d55bacb5af573ee898d4184df86347d29e
                      • Instruction Fuzzy Hash: A3017C32B1021D9FDF10EAA9AC45ABFBBAAEB84251F14403AE614D3240EF31991587A1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0c352c21e3836449e7d5eb48c211971d825618be58d7ea7f7cf3d447e32f767a
                      • Instruction ID: 5b645159b5b749a346eedbc892f1133c8355bccf3d6db146bf6f116329de4f7b
                      • Opcode Fuzzy Hash: 0c352c21e3836449e7d5eb48c211971d825618be58d7ea7f7cf3d447e32f767a
                      • Instruction Fuzzy Hash: D101B1312001054F8A9CAB7CE55852EBBE3FEC02503444928E1078B7D4DDF0BD9E9BA5
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 755bb3b45add12397bcdcd65493608f3bb27fc567b88747f833a8f25550cd1cd
                      • Instruction ID: 4b2069adf4367321a37e9b94ce79e1fdb764caa55ffa062e0b496409942b994f
                      • Opcode Fuzzy Hash: 755bb3b45add12397bcdcd65493608f3bb27fc567b88747f833a8f25550cd1cd
                      • Instruction Fuzzy Hash: E9012634604348AFCB06DF74DC148AA3FBEEF86200B0084E9E400CB362DA32DD05D792
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756399693.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_d4d000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: da78aa1b8ae0d7737a011ff26db1df508343bf22768de03fd5d30a5efd327a2c
                      • Instruction ID: ab8af1663ef947be7f6b35d829957f32b736bfaf91b678496a9717b2f1ffa5fb
                      • Opcode Fuzzy Hash: da78aa1b8ae0d7737a011ff26db1df508343bf22768de03fd5d30a5efd327a2c
                      • Instruction Fuzzy Hash: 0A01D67100C7409BEB108E2ACD85767FF99EF61324F1CC96AED494A256C778DC84C6B1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 28d216cdec01a5c758f6fc9300f774cdccf431e0ad704a1a7fe76a1b6c6594ee
                      • Instruction ID: 6ebc1f1acf2a501991fd06d5ba655147b2f40a05f4d5ebe6bc5b763d7829ac2a
                      • Opcode Fuzzy Hash: 28d216cdec01a5c758f6fc9300f774cdccf431e0ad704a1a7fe76a1b6c6594ee
                      • Instruction Fuzzy Hash: 01F022672040D87FCB224EAE9C10AFB3EECCB8E221B890016FE98D5281C478CD1197B0
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1e0c9bfee4765734813d0d0a30ccd5184a44fd32c24c3f57a10e51e5159d6855
                      • Instruction ID: c01137028c08f5d42f05a1704462187a37ec5ad2dd6628db7856fa245254a608
                      • Opcode Fuzzy Hash: 1e0c9bfee4765734813d0d0a30ccd5184a44fd32c24c3f57a10e51e5159d6855
                      • Instruction Fuzzy Hash: 4201B1306006058FD328AF78D50866E7BE3FFC8315B108A29D14B8B744CFB4E90E9BA5
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6982ca0ecda7ac0f33e53cbf7be844bf4ac4b41b9ed5e8a4223a185920b86987
                      • Instruction ID: d69cac94a75b85b5819bed1b3360e94e79aaf1eca34fb8dedfe469ee7c48c39b
                      • Opcode Fuzzy Hash: 6982ca0ecda7ac0f33e53cbf7be844bf4ac4b41b9ed5e8a4223a185920b86987
                      • Instruction Fuzzy Hash: 9701D630A11305CFCBAE9E35E504537B7F3BF84205755883EE8028265EDA71E481CBD0
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e86d5efcc72c9de59f7fe1d1b8a51b41258e742701dab3bed44edbead7db7e2
                      • Instruction ID: 99b01439376e0d38a5223ce5e99129ef63a1747b218173972977e51c01133e1c
                      • Opcode Fuzzy Hash: 0e86d5efcc72c9de59f7fe1d1b8a51b41258e742701dab3bed44edbead7db7e2
                      • Instruction Fuzzy Hash: 6101D131505B04AFD725EF26E8084A2BFFAFB49350700861AE48A87A14DFB0A54ECFD5
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0cc57d6e7909492c38596412cde3eb511af3be613b16689c9caa9eb68d298a29
                      • Instruction ID: e4f7d4181a8b105580f369a26f6af546c0cd1deccae7296a1cd742b7a88ca450
                      • Opcode Fuzzy Hash: 0cc57d6e7909492c38596412cde3eb511af3be613b16689c9caa9eb68d298a29
                      • Instruction Fuzzy Hash: 830156B5C0421AEFDB40CFA4D8057AEBBF1BB48301F2040AAE814A3341EB304A41CF90
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b616428d6835e63154733017a3b42cfc38d0703a7ae53c1916aaadb9e14e66c4
                      • Instruction ID: fcf284ff9b863daeb09668158dfaefdfaaa43961509485a424ecfab0a1d88b9f
                      • Opcode Fuzzy Hash: b616428d6835e63154733017a3b42cfc38d0703a7ae53c1916aaadb9e14e66c4
                      • Instruction Fuzzy Hash: 640116B4D0421AEFCB44DFA8D9446AEFBF2BB48305F1084AAE814A3351EB344A41CF91
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fa8e8cf33254a936a2b1418b98b110f04dcbff650042f92f9548f8ad6a52631c
                      • Instruction ID: aa5bffca0ac7c0fe9e9e5eb33343a4b82e97024d91f6655bded72bf89411bd43
                      • Opcode Fuzzy Hash: fa8e8cf33254a936a2b1418b98b110f04dcbff650042f92f9548f8ad6a52631c
                      • Instruction Fuzzy Hash: 29F02E312051507FC324276DAC59EEFBFDEEFC6760B040169F14AC3283CA61184887B5
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ed2c50a3c11cf439e83198b6b9f5db18228f8995f1b4ed147c7d03dea5d3149c
                      • Instruction ID: 59c9af2e507577696a1fa4dec3a916d3f177606efb47aaf99384eac068ceec10
                      • Opcode Fuzzy Hash: ed2c50a3c11cf439e83198b6b9f5db18228f8995f1b4ed147c7d03dea5d3149c
                      • Instruction Fuzzy Hash: 21F052B22092B01FC32717386C184AE7FAAE8C2A91304009BE182CB392DB44890AC3F5
                      Memory Dump Source
                      • Source File: 00000001.00000002.1756399693.0000000000D4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D4D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_d4d000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8341e4d5c4c20443696cbb78e1b4990ef7b19f8ce96deea68d5f744ad01503b2
                      • Instruction ID: 88e2c7697af2a4d44c0e0049593f660cb0fe37bd4666aaafe8ac43908d9fec34
                      • Opcode Fuzzy Hash: 8341e4d5c4c20443696cbb78e1b4990ef7b19f8ce96deea68d5f744ad01503b2
                      • Instruction Fuzzy Hash: 9EF062714087449FE7108A1ACD84B62FFA8EB61739F18C55AED485A286C3799845CAB1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6ff33b30106cc01b861051b4437c9fb724e05c4b11579174640b3b0643226e25
                      • Instruction ID: 7bb131df3f9cd81fdb7d2fbb2a3c365807113cc82354f37e4b3bf5907825b7bf
                      • Opcode Fuzzy Hash: 6ff33b30106cc01b861051b4437c9fb724e05c4b11579174640b3b0643226e25
                      • Instruction Fuzzy Hash: 83F08B312097E00FC326A33DE8086DB3FE6CF82214B04005AF142CB652CBA19908CBE1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 908f96313e3011056c73602f91dcdfbb154e2143cf8116654b23ea366fef7851
                      • Instruction ID: 76605529953266cc876911d3b263a120c8578779d2f5482d6f99b5a5a525ec8a
                      • Opcode Fuzzy Hash: 908f96313e3011056c73602f91dcdfbb154e2143cf8116654b23ea366fef7851
                      • Instruction Fuzzy Hash: 7FF012662041E87F8B554E9A5C14CFB7FEDDA8E1617084156FE98D2181C429CD21ABB0
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 46f0216151cc361f298dbf4691c1b344a29cd18270e4c3698072516134afbebf
                      • Instruction ID: b0a8ce201783b0d1f309899611879e4813d6e55f7336888b3bde122a09720b63
                      • Opcode Fuzzy Hash: 46f0216151cc361f298dbf4691c1b344a29cd18270e4c3698072516134afbebf
                      • Instruction Fuzzy Hash: CBF0F031B00300AFC7218A28AC05F567FE49F42725F068166FA50CB2F2D6B1E8049340
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6197cc3b2289b003b5d480d43fc3f65b435dbf9a7a1f326a00ef528c7471b8c2
                      • Instruction ID: 16e94547c424bfce1d5a25609ee7c3c14749ec74bbaa7ad71e38fab55231d6f6
                      • Opcode Fuzzy Hash: 6197cc3b2289b003b5d480d43fc3f65b435dbf9a7a1f326a00ef528c7471b8c2
                      • Instruction Fuzzy Hash: A5F0AFB5C08169DFDB00CBA0C4141ADBFB1EB5A301F0041D7E846E7352EA358A02DB40
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 14c0eee0f8920b16d9b1a42636808dd1147abe924a1b0797d78daf2efebaf3ad
                      • Instruction ID: 4fa6459a2a1576255a5a0bed3458e485eb6695542e72d74a94ff767e1d42ee89
                      • Opcode Fuzzy Hash: 14c0eee0f8920b16d9b1a42636808dd1147abe924a1b0797d78daf2efebaf3ad
                      • Instruction Fuzzy Hash: 6FF0A032F101295F8B11EA69AC499BFBBB9EF95261B08002BE914D3240FF30890587A1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 49114e00524b675dbe2c072107c7b462b7354494a2792693f96cbe835d3c92be
                      • Instruction ID: 37b80ff87c06656411f41d5000d91e77fc9a2e388e809081df52bf0b1165511f
                      • Opcode Fuzzy Hash: 49114e00524b675dbe2c072107c7b462b7354494a2792693f96cbe835d3c92be
                      • Instruction Fuzzy Hash: C5F024315007058FDBAACE61E50077BBBF2AF80315F4A896ED84642A2AC674E485CB40
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb316127502ba64f7d05adc11abe71be17cf8c3720ccfd0234857d415f5b92e7
                      • Instruction ID: 04dc5919f73a04188984b4ce09db8b4598cf4ad695e401ef8822a4c21a47b507
                      • Opcode Fuzzy Hash: fb316127502ba64f7d05adc11abe71be17cf8c3720ccfd0234857d415f5b92e7
                      • Instruction Fuzzy Hash: BBE048313001116FD7146B9EE449A9FBBDAEBC9B61B40453DF20FC3382DEA5580947B9
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 794e8e5ce6d8949202b5f5a35035f6a3b195e8129d4a879ad31f756fd80ac677
                      • Instruction ID: 7920a4e738a158f435917f03f479a8d3c70077c35e146a957cd8b52ba2a7f57c
                      • Opcode Fuzzy Hash: 794e8e5ce6d8949202b5f5a35035f6a3b195e8129d4a879ad31f756fd80ac677
                      • Instruction Fuzzy Hash: 29F06D35500B058FDB29DF26E408516BBF6FB88304B00C62EE48B87A14DFB0A50ACF84
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a68bfa4a1d7c7f6319426dbe96d4de4f948e8f3fc911f959cc883f1c5baead9d
                      • Instruction ID: 0eae693bdcf6b58e5b4d5c158052cd2a2bf3ca02b08cc44e552a13c7a4ac18d0
                      • Opcode Fuzzy Hash: a68bfa4a1d7c7f6319426dbe96d4de4f948e8f3fc911f959cc883f1c5baead9d
                      • Instruction Fuzzy Hash: BAE0D832602A506FCB02AA25FD025FA3B71D782626B004166E140C7E46C630094E8BF2
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a14ea8d1397261fd060dc5143b6c8e3fddb6eb6b29fca107cbf208bba429cadd
                      • Instruction ID: 0cd12f822954d0156976144626a15a359c5febcb7a4c5a128b74ea21d88b0144
                      • Opcode Fuzzy Hash: a14ea8d1397261fd060dc5143b6c8e3fddb6eb6b29fca107cbf208bba429cadd
                      • Instruction Fuzzy Hash: 6DF03975D0120CBFCF11EFB4E9488CEBFB9EB44240F1042A6E809E7240EA305B89DB91
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7ce19891e1a83fef167bb374e900471d2d0d4e90728021bb5bc7da2c5496c513
                      • Instruction ID: 8b388295037ce6f8d76200f5ab6997f5c207bddbefeabb7d1b642994ae8d55d7
                      • Opcode Fuzzy Hash: 7ce19891e1a83fef167bb374e900471d2d0d4e90728021bb5bc7da2c5496c513
                      • Instruction Fuzzy Hash: 96E0E531200B504FC724A72DE5087AF7BE6DF81304F04052DE246CB741CBB1A8098B95
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 62fc52edda1a3c8cbd9f2f6dad38b3215c6a91b5fe512a2a612c53b24bc3254e
                      • Instruction ID: c4395e9b9bc6c3b6275a3e58c6c9410fd7ff521880ff683f19f8b95d97b908cb
                      • Opcode Fuzzy Hash: 62fc52edda1a3c8cbd9f2f6dad38b3215c6a91b5fe512a2a612c53b24bc3254e
                      • Instruction Fuzzy Hash: 72E0D870405B90BFC766A624FD069F63F74DB022257010156E8418BE46C6344985C7E1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ba22ce3208b7572185fb30dbb8073193c1d7e509e395d2641054e0bec963caff
                      • Instruction ID: 21ba3a8bc7bdf8a883bd639be26a5b21ae1a914471149d6a10fe13742cceaa5d
                      • Opcode Fuzzy Hash: ba22ce3208b7572185fb30dbb8073193c1d7e509e395d2641054e0bec963caff
                      • Instruction Fuzzy Hash: 42E0DFB211D3804FE3058660B80A9C72B98EF22320F528CBEE040CA092EA39E443C655
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 93826366fff7be42d3958680d23538f75e2d49d0d9fda96991d9584a5c72117c
                      • Instruction ID: 1ca7d2606ff58c7f46b1f16a673ef8786bd7f9b737b1121e0fa08eddaacffde5
                      • Opcode Fuzzy Hash: 93826366fff7be42d3958680d23538f75e2d49d0d9fda96991d9584a5c72117c
                      • Instruction Fuzzy Hash: BAE0EC3A116244BFC7029A55DC41CE63F7DEF4A6603044086F5418F972C6229D21DBB1
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6b2449d26072be791189ed3161f163189268cebd3c738fb808992cab74547bef
                      • Instruction ID: cc3234ae83abd7f661793404ffa64a61c599b81d6abc952ff5231c3757bfee39
                      • Opcode Fuzzy Hash: 6b2449d26072be791189ed3161f163189268cebd3c738fb808992cab74547bef
                      • Instruction Fuzzy Hash: BBE02071A45304FFCF05DF68ED419EE7BF1DB81200B1041D6D405D7291D5704F148791
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d06d424729777612e1bf950e9c9344a5e127e052d410d1c2f09065452bcbf43
                      • Instruction ID: 46094cdd1fa5288cb42deaf45c69ae4fd2a516904a5fe740fa7a6fec8e407c69
                      • Opcode Fuzzy Hash: 6d06d424729777612e1bf950e9c9344a5e127e052d410d1c2f09065452bcbf43
                      • Instruction Fuzzy Hash: 26E0D830400F118FC736FB24FE47AF57BF5E745718B014119D8410BAA9C7B41A498BE5
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2dfde384aa249b5109a36a6847be3773b4dd2e884ee4a8edd15b47ad7070f91f
                      • Instruction ID: 1bfed02b96fdbf3f119147d21064429db029e88e38965de9ed10e0fa76fc67ed
                      • Opcode Fuzzy Hash: 2dfde384aa249b5109a36a6847be3773b4dd2e884ee4a8edd15b47ad7070f91f
                      • Instruction Fuzzy Hash: 89D05B71300135578615276DF4184AE779BEAC5AA13000529E607C3340DF655D0957E5
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 793fcb04f3ffedd591ccd132eea2512667c58cbc197b6d434ca448f5ba37a8d6
                      • Instruction ID: fa668146812b47af3233c2353d25088f7d0ffbcbc0adf01573b4d3b87b02971b
                      • Opcode Fuzzy Hash: 793fcb04f3ffedd591ccd132eea2512667c58cbc197b6d434ca448f5ba37a8d6
                      • Instruction Fuzzy Hash: 6DE09A75D0020CEFCF54DFE4D5448DDBBB9EB48200F1082A6D905A3200EB705B55DF80
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c8255d317aba7167f9eca3478bb8462aab5ad90870c9047558d8a43c4b156ed5
                      • Instruction ID: ffdc6fe1b65c3b2b075c6eb16cbfc6f24c680ec2e22dac7113aba7ecf2d4a2d1
                      • Opcode Fuzzy Hash: c8255d317aba7167f9eca3478bb8462aab5ad90870c9047558d8a43c4b156ed5
                      • Instruction Fuzzy Hash: 35D05BB1A0020CFFCF44DFACEA015ADB7F5EB44204B1041E9D409D7300DA715F149B90
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dcae5bb8f2e6e9be2c8c7080935ff6e3343cbd83c788ae1a757361c87b9ce73e
                      • Instruction ID: 9d0e01a9133cc6776ca537ec236323514bac94eeb9d3e3077aca12b6859c2a2a
                      • Opcode Fuzzy Hash: dcae5bb8f2e6e9be2c8c7080935ff6e3343cbd83c788ae1a757361c87b9ce73e
                      • Instruction Fuzzy Hash: 63C012327001201B0A98AA6CB0200AD7AD7D2C86E7389412BF60EC3388EDA28C4657A5
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2e958abc784deaad6cb94dc54d21a3a98bd0bb5ea3bc0aeeb8a19d6fa28bc9e5
                      • Instruction ID: 39777cdcbc6a798abb641348e5fce965e093570427709ea866819b5b7d7bbd69
                      • Opcode Fuzzy Hash: 2e958abc784deaad6cb94dc54d21a3a98bd0bb5ea3bc0aeeb8a19d6fa28bc9e5
                      • Instruction Fuzzy Hash: 97B012F3A2500043D31911009CD2FE212169BB51A8F9F522055A0D2383E578D0030068
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d825437ba68b30db26e01977aaf42e00e7eaea76dd4284980b5392c322778a3f
                      • Instruction ID: 79680abde4bd039325379431e4c96e417c9d9ea964ac769d6178ec0140165cbd
                      • Opcode Fuzzy Hash: d825437ba68b30db26e01977aaf42e00e7eaea76dd4284980b5392c322778a3f
                      • Instruction Fuzzy Hash: C3C09B7155B7D05EDF0617749C0D8C53F169F5277171640C7E3458E063D5614049CFD1
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj
                      • API String ID: 0-3760891704
                      • Opcode ID: 426df6a6552e967da3f8ddd53aa257960890cebe988d57a2d817caf306b0d032
                      • Instruction ID: 4cd224b7ca9972fbf1051ce911bdcebb0d78631509f177448d66f021ed199d6c
                      • Opcode Fuzzy Hash: 426df6a6552e967da3f8ddd53aa257960890cebe988d57a2d817caf306b0d032
                      • Instruction Fuzzy Hash: 03D1A3303006006BD6196AAD9D93EBDA753FB86304B40453CD12A4FB9AEFB1AD1947E7
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj
                      • API String ID: 0-3760891704
                      • Opcode ID: 2d372b44639bac796184dcdd6414ffa3e7f05c5ef8ccdd0102dcbb05e42ac5c5
                      • Instruction ID: 3d9f8322306ddc2c7b6d21305db2558fcad07fd83520badc85c5eff39ff1548d
                      • Opcode Fuzzy Hash: 2d372b44639bac796184dcdd6414ffa3e7f05c5ef8ccdd0102dcbb05e42ac5c5
                      • Instruction Fuzzy Hash: C9D1A3303006006BD6196AAD9D93EBDA753FB87304B40453CD12A4FB9AEFB1AD1947E7
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj
                      • API String ID: 0-2950335420
                      • Opcode ID: 9352dbdc9b96c505adbcc8c61ff0b740f7270bceed600ebb663aacaccf0bb6d6
                      • Instruction ID: 27a9a2f7168c8bf52b72e63e8c1b4cce71fd90f01c99dd51151c71a804e8fc8e
                      • Opcode Fuzzy Hash: 9352dbdc9b96c505adbcc8c61ff0b740f7270bceed600ebb663aacaccf0bb6d6
                      • Instruction Fuzzy Hash: 7641BC303006007FD6156AAD9D93EADA753FB87300B404638D12A4FB96EFB5AD4947E7
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj
                      • API String ID: 0-2950335420
                      • Opcode ID: 17ccc35c70d3bab75dea729cbc58bf917f41d17af9f436d46a0a575bd88db3bc
                      • Instruction ID: e64d26f7a4d2cf8e14ce176995b15d12dba4db9e6927d7b9f8ce799c532eb6b2
                      • Opcode Fuzzy Hash: 17ccc35c70d3bab75dea729cbc58bf917f41d17af9f436d46a0a575bd88db3bc
                      • Instruction Fuzzy Hash: 3B418A303006106BD6156AAD9D93E6DA753FB87300B40463CD22A4FB9AEFB5AD0947E7
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj
                      • API String ID: 0-4266538241
                      • Opcode ID: 6eb2e70da1a9fb7bbd7d0a4550f4bfa798e04d4e7fa2c84dd9165c97588ce056
                      • Instruction ID: d28e8f0f2e66e1cf9a2c108fa7afef6eae952d57594a148f127ba945dd7c18df
                      • Opcode Fuzzy Hash: 6eb2e70da1a9fb7bbd7d0a4550f4bfa798e04d4e7fa2c84dd9165c97588ce056
                      • Instruction Fuzzy Hash: BC31C4303002117FD6156AAD9C93EBDA756EB87300B404638E1294FB9AEFB1AD4847E7
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: DGj$DGj$DGj$DGj$DGj$DGj$DGj$DGj
                      • API String ID: 0-4266538241
                      • Opcode ID: 880b04df42c72299304d2eb0e7d75c836d191549e9091a138ff68def5a006750
                      • Instruction ID: fc0b90e5245c8427f02c48bd80310f6c20b98548fa1a341f89b5ba378b13275f
                      • Opcode Fuzzy Hash: 880b04df42c72299304d2eb0e7d75c836d191549e9091a138ff68def5a006750
                      • Instruction Fuzzy Hash: 2721CB303002016BD6056AAD9D93E7DA753FB86304B40463CD1294FB9ADFB17D4547E7
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: DGj$DGj$DGj$DGj$DGj$DGj$DGj
                      • API String ID: 0-3215742008
                      • Opcode ID: be10abb1de256257b6afc0fd70e30a76694087873951f3999c925946bd2ad6a7
                      • Instruction ID: caba7bfad9c5623755a050d26bca940ba29da1cfbe35a0a5d5269513685bf105
                      • Opcode Fuzzy Hash: be10abb1de256257b6afc0fd70e30a76694087873951f3999c925946bd2ad6a7
                      • Instruction Fuzzy Hash: 0E31D8303006826FDB152BADDD52DAD7B53FB877047004238E1169FAE5DEB19E8A8B91
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: DGj$DGj$DGj$DGj$DGj$DGj$DGj
                      • API String ID: 0-3215742008
                      • Opcode ID: a67ee98f5102adee94c287dd777fc8e26e465d16178aed77d36ec7f0c357ffa4
                      • Instruction ID: 35ef98f42a27273592cc2d7498af98d214bc0c533241775255c0db2a7dc9b58d
                      • Opcode Fuzzy Hash: a67ee98f5102adee94c287dd777fc8e26e465d16178aed77d36ec7f0c357ffa4
                      • Instruction Fuzzy Hash: C521A7303005826FDB053FADDD52CAD7753F7867007004238E1169FB99DEB09E8A8B91
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: DGj$DGj$DGj$DGj$DGj$DGj
                      • API String ID: 0-1101258311
                      • Opcode ID: 10a1b2da390fd9b690e2806c7b28f4296b3355f819a57983b05c02531be3dbc6
                      • Instruction ID: ebcc176a72aa88ee091d738882a12c961d33257b84fcd7d4f735b37d2df8b353
                      • Opcode Fuzzy Hash: 10a1b2da390fd9b690e2806c7b28f4296b3355f819a57983b05c02531be3dbc6
                      • Instruction Fuzzy Hash: 9C21E5303002007FD6056AAD9C93EADAB57EB87704B404638E1294FB96DFB26D0943F3
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: DGj$DGj$DGj$DGj$DGj$DGj
                      • API String ID: 0-1101258311
                      • Opcode ID: 9c20b1db4438e2c56c97a9488f7bab8ed35394d616510ac5cb6aad88e9602ccf
                      • Instruction ID: 38126d3b98afdabd07e21b8c5f7d55b610e9c25f19776a5e2e7388db1838cb8e
                      • Opcode Fuzzy Hash: 9c20b1db4438e2c56c97a9488f7bab8ed35394d616510ac5cb6aad88e9602ccf
                      • Instruction Fuzzy Hash: 3311F9303002007FD6056AAD9D93EADA757EB87704B40463CD1294FB9AEFB2AD1947E3
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1766034424.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_6450000_RegAsm.jbxd
                      Similarity
                      • API ID:
                      • String ID: (_^q$(_^q$(_^q$(_^q
                      • API String ID: 0-2697572114
                      • Opcode ID: 452a980f471e296e31bac33facd36305815f870e88857de6952a4779ec94d0f1
                      • Instruction ID: e7bd54ff8bff0b1f0b624dab1d26778b653e5f56fe674ce54e665410f54ad8ab
                      • Opcode Fuzzy Hash: 452a980f471e296e31bac33facd36305815f870e88857de6952a4779ec94d0f1
                      • Instruction Fuzzy Hash: EC91CE35B042049FDB09AF78C4145AE7BB6FFC5340F2485AAEC069B382DA75DE06CB91