Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FkJbps6Srrl6lOQ9M_l8dpw2.exe

Overview

General Information

Sample name:FkJbps6Srrl6lOQ9M_l8dpw2.exe
Analysis ID:1483175
MD5:b8e1a18940a4b5f002bbf04f334ee02a
SHA1:85c3076aad3bed20ecdf94d50d4937132b7788e6
SHA256:3a46d11a2fe4b8e7e91c0771bbd86de9c22d634ae09278f7739e57ff9725f896
Tags:exe
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • FkJbps6Srrl6lOQ9M_l8dpw2.exe (PID: 7500 cmdline: "C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exe" MD5: B8E1A18940A4B5F002BBF04F334EE02A)
    • conhost.exe (PID: 7508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 7568 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 7576 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "51.195.145.80:14640", "Bot Id": "LogsDiller Cloud (TG: @logsdillabot)", "Authorization Header": "3a050df92d0cf082b2cdaf87863616be"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000003.00000002.1877716871.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: FkJbps6Srrl6lOQ9M_l8dpw2.exe PID: 7500JoeSecurity_RedLineYara detected RedLine StealerJoe Security
                Click to see the 2 entries
                SourceRuleDescriptionAuthorStrings
                3.2.RegAsm.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.2.FkJbps6Srrl6lOQ9M_l8dpw2.exe.4f0000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    No Sigma rule has matched
                    No Snort rule has matched
                    Timestamp:2024-07-26T19:12:16.450766+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:17.612406+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:15.561966+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:14.647518+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:14.083330+0200
                    SID:2046056
                    Source Port:14640
                    Destination Port:49730
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:14.468647+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:15.263507+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:17.618191+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:16.470779+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49731
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:08.511418+0200
                    SID:2046045
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:14.076214+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:18.967700+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:17.178429+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:13.739811+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:14.266111+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:16.274594+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:16.993990+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:16.111175+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:18.617808+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:18.431340+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:15.799653+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:19.143850+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:16.641500+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:54.830118+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49737
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:17.353117+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:08.705205+0200
                    SID:2043234
                    Source Port:14640
                    Destination Port:49730
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:18.794183+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:19.351668+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-26T19:12:16.819493+0200
                    SID:2043231
                    Source Port:49730
                    Destination Port:14640
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exeAvira: detected
                    Source: 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "51.195.145.80:14640", "Bot Id": "LogsDiller Cloud (TG: @logsdillabot)", "Authorization Header": "3a050df92d0cf082b2cdaf87863616be"}
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exeReversingLabs: Detection: 79%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exeJoe Sandbox ML: detected
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_0050ACA1 FindFirstFileExW,0_2_0050ACA1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 074F0538h3_2_074F0040

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: 51.195.145.80:14640
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 51.195.145.80:14640
                    Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: unknownTCP traffic detected without corresponding DNS query: 51.195.145.80
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002C4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002AF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002CDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002AF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002AF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002AF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002AF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8ResponseD
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                    Source: RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CE6000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9ResponseD
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exe, 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1877716871.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\TmpBEFD.tmpJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\TmpBEEC.tmpJump to dropped file
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_0050A0660_2_0050A066
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_005011D00_2_005011D0
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_0050D5520_2_0050D552
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_00505D320_2_00505D32
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_0050EDCE0_2_0050EDCE
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_004FE7B40_2_004FE7B4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0270DC743_2_0270DC74
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_064467D83_2_064467D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0644A3E83_2_0644A3E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_06443F503_2_06443F50
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0644A3D83_2_0644A3D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_06446FE83_2_06446FE8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_06446FF83_2_06446FF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074FB4A03_2_074FB4A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074F00403_2_074F0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074F1F983_2_074F1F98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074FEDD83_2_074FEDD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074F7B483_2_074F7B48
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074F2BA83_2_074F2BA8
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: String function: 004F8970 appears 50 times
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exe, 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHandiworks.exe8 vs FkJbps6Srrl6lOQ9M_l8dpw2.exe
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/5@0/1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7508:120:WilError_03
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\TmpBEEC.tmpJump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCommand line argument: 2Q0_2_00513240
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Program Files (x86)\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exeReversingLabs: Detection: 79%
                    Source: unknownProcess created: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exe "C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exe"
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: esdsip.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: linkinfo.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
                    Source: Google Chrome.lnk.3.drLNK file: ..\..\..\Program Files\Google\Chrome\Application\chrome.exe
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: FkJbps6Srrl6lOQ9M_l8dpw2.exeStatic PE information: section name: .zzZ
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_004F8115 push ecx; ret 0_2_004F8128
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0644E060 push es; ret 3_2_0644E070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0644ECF2 push eax; ret 3_2_0644ED01
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_06443B4F push dword ptr [esp+ecx*2-75h]; ret 3_2_06443B53
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_064449A6 push FFFFFF8Bh; retf 3_2_064449AD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074FB360 push FFFFFF8Bh; iretd 3_2_074FB363
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074FB371 push FFFFFF8Bh; iretd 3_2_074FB402
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074FB31B push FFFFFF8Bh; iretd 3_2_074FB31E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074FB3FF push FFFFFF8Bh; iretd 3_2_074FB402
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074F2B68 push ds; ret 3_2_074F2BF9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_074F0BE0 push eax; retf 3_2_074F0BE1

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 BlobJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 26E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 29C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 49C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1130Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 5696Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7832Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7596Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_0050ACA1 FindFirstFileExW,0_2_0050ACA1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RegAsm.exe, 00000003.00000002.1886318047.0000000005F72000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_004FC783 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004FC783
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_0050203F mov ecx, dword ptr fs:[00000030h]0_2_0050203F
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_00506B75 mov eax, dword ptr fs:[00000030h]0_2_00506B75
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_0050BE89 GetProcessHeap,0_2_0050BE89
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_004F88FE SetUnhandledExceptionFilter,0_2_004F88FE
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_004F89B5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004F89B5
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_004FC783 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004FC783
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_004F87A2 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004F87A2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_00B1018D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_00B1018D
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 432000Jump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000Jump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 9C9008Jump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_004F8565 cpuid 0_2_004F8565
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: GetLocaleInfoW,0_2_0050E107
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: EnumSystemLocalesW,0_2_00505185
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0050E230
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_0050DAA1
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: GetLocaleInfoW,0_2_0050E336
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0050E405
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: GetLocaleInfoW,0_2_0050DC9C
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: EnumSystemLocalesW,0_2_0050DD43
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: EnumSystemLocalesW,0_2_0050DD8E
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: EnumSystemLocalesW,0_2_0050DE29
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0050DEB4
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: GetLocaleInfoW,0_2_005056AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exeCode function: 0_2_004F8BB2 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004F8BB2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FkJbps6Srrl6lOQ9M_l8dpw2.exe.4f0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1877716871.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: FkJbps6Srrl6lOQ9M_l8dpw2.exe PID: 7500, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7576, type: MEMORYSTR
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum\walletsLR^q
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q1C:\Users\user\AppData\Roaming\Electrum\wallets\*
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: cjelfplplebdjjenllpjcblmjkfcffne|JaxxxLiberty
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.walletLR^q
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum\walletsLR^q
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.walletLR^q
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `,^qdC:\Users\user\AppData\Roaming`,^qdC:\Users\user\AppData\Roaming\Binance
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum\walletsLR^q
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q&%localappdata%\Coinomi\Coinomi\walletsLR^q(
                    Source: RegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $^q5C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                    Source: Yara matchFile source: 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7576, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.FkJbps6Srrl6lOQ9M_l8dpw2.exe.4f0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1877716871.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: FkJbps6Srrl6lOQ9M_l8dpw2.exe PID: 7500, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7576, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    411
                    Process Injection
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts2
                    Command and Scripting Interpreter
                    Boot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    LSASS Memory241
                    Security Software Discovery
                    Remote Desktop Protocol3
                    Data from Local System
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)241
                    Virtualization/Sandbox Evasion
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
                    Process Injection
                    NTDS241
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                    Obfuscated Files or Information
                    Cached Domain Credentials2
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Install Root Certificate
                    DCSync134
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    FkJbps6Srrl6lOQ9M_l8dpw2.exe79%ReversingLabsWin32.Spyware.Metastealer
                    FkJbps6Srrl6lOQ9M_l8dpw2.exe100%AviraHEUR/AGEN.1317026
                    FkJbps6Srrl6lOQ9M_l8dpw2.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%URL Reputationsafe
                    http://tempuri.org/Entity/Id14ResponseD0%URL Reputationsafe
                    http://tempuri.org/Entity/Id23ResponseD0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%URL Reputationsafe
                    http://tempuri.org/Entity/Id12Response0%URL Reputationsafe
                    http://tempuri.org/0%URL Reputationsafe
                    http://tempuri.org/Entity/Id2Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%URL Reputationsafe
                    http://tempuri.org/Entity/Id21Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%URL Reputationsafe
                    http://tempuri.org/Entity/Id90%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%URL Reputationsafe
                    http://tempuri.org/Entity/Id80%URL Reputationsafe
                    http://tempuri.org/Entity/Id6ResponseD0%URL Reputationsafe
                    http://tempuri.org/Entity/Id50%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%URL Reputationsafe
                    http://tempuri.org/Entity/Id40%URL Reputationsafe
                    http://tempuri.org/Entity/Id70%URL Reputationsafe
                    http://tempuri.org/Entity/Id60%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%URL Reputationsafe
                    http://tempuri.org/Entity/Id19Response0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%URL Reputationsafe
                    http://tempuri.org/Entity/Id13ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%URL Reputationsafe
                    http://tempuri.org/Entity/Id15Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id5ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%URL Reputationsafe
                    http://tempuri.org/Entity/Id6Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%URL Reputationsafe
                    https://api.ip.sb/ip0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/sc0%URL Reputationsafe
                    http://tempuri.org/Entity/Id1ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%URL Reputationsafe
                    http://tempuri.org/Entity/Id9Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id200%URL Reputationsafe
                    http://tempuri.org/Entity/Id210%URL Reputationsafe
                    http://tempuri.org/Entity/Id220%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%URL Reputationsafe
                    http://tempuri.org/Entity/Id230%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%URL Reputationsafe
                    http://tempuri.org/Entity/Id240%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%URL Reputationsafe
                    http://tempuri.org/Entity/Id24Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id1Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey0%URL Reputationsafe
                    http://tempuri.org/Entity/Id21ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust0%URL Reputationsafe
                    http://tempuri.org/Entity/Id100%URL Reputationsafe
                    http://tempuri.org/Entity/Id110%URL Reputationsafe
                    http://tempuri.org/Entity/Id10ResponseD0%URL Reputationsafe
                    http://tempuri.org/Entity/Id120%URL Reputationsafe
                    http://tempuri.org/Entity/Id16Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel0%URL Reputationsafe
                    http://tempuri.org/Entity/Id130%URL Reputationsafe
                    http://tempuri.org/Entity/Id140%URL Reputationsafe
                    http://tempuri.org/Entity/Id150%URL Reputationsafe
                    http://tempuri.org/Entity/Id160%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce0%URL Reputationsafe
                    http://tempuri.org/Entity/Id170%URL Reputationsafe
                    http://tempuri.org/Entity/Id180%URL Reputationsafe
                    http://tempuri.org/Entity/Id5Response0%URL Reputationsafe
                    http://tempuri.org/Entity/Id190%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%URL Reputationsafe
                    http://tempuri.org/Entity/Id15ResponseD0%URL Reputationsafe
                    http://tempuri.org/Entity/Id10Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Renew0%URL Reputationsafe
                    http://tempuri.org/Entity/Id11ResponseD0%URL Reputationsafe
                    http://tempuri.org/Entity/Id8Response0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.00%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentity0%URL Reputationsafe
                    http://tempuri.org/Entity/Id17ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                    http://tempuri.org/Entity/Id8ResponseD0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey0%URL Reputationsafe
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA10%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp90%Avira URL Cloudsafe
                    51.195.145.80:146400%Avira URL Cloudsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    51.195.145.80:14640true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sctRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id14ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id23ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002AF5000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id12ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id2ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id21ResponseRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id9RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id8RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id6ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id5RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/PrepareRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id4RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id7RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id6RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id19ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licenseRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/IssueRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/AbortedRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id13ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/faultRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsatRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id15ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id5ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/RenewRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id6ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ip.sb/ipFkJbps6Srrl6lOQ9M_l8dpw2.exe, 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1877716871.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/scRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id1ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/CancelRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id9ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id20RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id21RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id22RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id23RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AF5000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id24RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/IssueRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id24ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id1ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReplayRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64BinaryRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id21ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002AF5000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressingRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/IssueRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/CompletionRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trustRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id10RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id11RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id10ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002C4E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id12RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id16ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/CancelRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id13RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002CDE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id14RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id15RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id16RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/NonceRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id17RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id18RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id5ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id19RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id15ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id10ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RenewRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id11ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id8ResponseRegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentityRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id17ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/soap/envelope/RegAsm.exe, 00000003.00000002.1880460942.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://tempuri.org/Entity/Id8ResponseDRegAsm.exe, 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1880460942.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKeyRegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1RegAsm.exe, 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    51.195.145.80
                    unknownFrance
                    16276OVHFRtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1483175
                    Start date and time:2024-07-26 19:11:07 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 2s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:FkJbps6Srrl6lOQ9M_l8dpw2.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@6/5@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 108
                    • Number of non-executed functions: 62
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • VT rate limit hit for: FkJbps6Srrl6lOQ9M_l8dpw2.exe
                    TimeTypeDescription
                    13:12:14API Interceptor35x Sleep call for process: RegAsm.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    51.195.145.80file.exeGet hashmaliciousRedLineBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      OVHFRVvlYJBzLuW.elfGet hashmaliciousMiraiBrowse
                      • 37.59.105.215
                      7Y18r(169).exeGet hashmaliciousCryptOneBrowse
                      • 51.81.194.202
                      Endermanch@Antivirus.exeGet hashmaliciousBdaejecBrowse
                      • 54.39.157.64
                      Endermanch@Antivirus.exeGet hashmaliciousBdaejecBrowse
                      • 54.39.157.64
                      file.exeGet hashmaliciousSystemBCBrowse
                      • 144.217.158.194
                      file.exeGet hashmaliciousSmokeLoaderBrowse
                      • 51.77.140.74
                      file.exeGet hashmaliciousSystemBCBrowse
                      • 192.99.8.97
                      LisectAVT_2403002A_126.EXE.exeGet hashmaliciousWannacry, ContiBrowse
                      • 167.114.35.28
                      https://erratic-mellow-comte.glitch.me/public/nfcu703553.HTMLGet hashmaliciousHTMLPhisherBrowse
                      • 54.36.150.187
                      LisectAVT_2403002A_212.exeGet hashmaliciousUnknownBrowse
                      • 51.38.37.194
                      No context
                      No context
                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:31 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                      Category:dropped
                      Size (bytes):2104
                      Entropy (8bit):3.453088564969748
                      Encrypted:false
                      SSDEEP:48:8SUEdATkoGRYrnvPdAKRkdAGdAKRFdAKR/U:8SU3t
                      MD5:303F26E8901B19E5C3A6EF0A630CCDE4
                      SHA1:6C0ABAE28D0648A00B167F6A450FABF9BAD649EA
                      SHA-256:3B1D09E942CDA11DB9E240E5C16B5E970756C2AAA1750559ACBE92EE3386A789
                      SHA-512:FE04F79802E1DB68C88D70320113B9B2B449934B0250C3EC40DE262AF2F8DF6132312F7ECD44FAE66D306E61E74259BBCA4840A93D06BF5415F8C3547B79A348
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.@.. ......,.....nN........q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.IDW5`....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWP`....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWP`....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWP`..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDWI`..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.!.-.-.p.r.o.x.y.-.s.e.r.v.e.r
                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):3274
                      Entropy (8bit):5.3318368586986695
                      Encrypted:false
                      SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymRLKTqdqlq7qqjqcEZ5D:Pq5qHwCYqh3qtI6eqzxP0at9KTqdqlqY
                      MD5:0B2E58EF6402AD69025B36C36D16B67F
                      SHA1:5ECC642327EF5E6A54B7918A4BD7B46A512BF926
                      SHA-256:4B0FB8EECEAD6C835CED9E06F47D9021C2BCDB196F2D60A96FEE09391752C2D7
                      SHA-512:1464106CEC5E264F8CEA7B7FF03C887DA5192A976FBC9369FC60A480A7B9DB0ED1956EFCE6FFAD2E40A790BD51FD27BB037256964BC7B4B2DA6D4D5C6B267FA1
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2662
                      Entropy (8bit):7.8230547059446645
                      Encrypted:false
                      SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                      MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                      SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                      SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                      SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2662
                      Entropy (8bit):7.8230547059446645
                      Encrypted:false
                      SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                      MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                      SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                      SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                      SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2251
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3::
                      MD5:0158FE9CEAD91D1B027B795984737614
                      SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                      SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                      SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (console) Intel 80386, for MS Windows
                      Entropy (8bit):7.640847153729353
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:FkJbps6Srrl6lOQ9M_l8dpw2.exe
                      File size:521'216 bytes
                      MD5:b8e1a18940a4b5f002bbf04f334ee02a
                      SHA1:85c3076aad3bed20ecdf94d50d4937132b7788e6
                      SHA256:3a46d11a2fe4b8e7e91c0771bbd86de9c22d634ae09278f7739e57ff9725f896
                      SHA512:1f3e237b9b9228cabd5a1469d29b5bbc934928502cb5c0427a002d9846c8582574c8d7a4441e321e696732b8b2bf79b779b2f050037c02a53aa8c155fa434d86
                      SSDEEP:12288:q88sCGxeImxxbTuylGHljSEqFT/fYUA3BVyt0I4ZCdf:q9rGxDmxxbToHljoffA3BVGmkf
                      TLSH:6FB4F12275C08073E62715320AF4D6B56A7EF8714E764E8FA7980BBE4F30283D625667
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........g.X.............t.......t.......t.......t..............n.......n.......n......._......._......._.......Rich...................
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x408441
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x66A28656 [Thu Jul 25 17:07:34 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:6addd02d82538c2ca23958c8c292883b
                      Instruction
                      call 00007F5B006AAD9Eh
                      jmp 00007F5B006AA459h
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ecx
                      lea ecx, dword ptr [esp+08h]
                      sub ecx, eax
                      and ecx, 0Fh
                      add eax, ecx
                      sbb ecx, ecx
                      or eax, ecx
                      pop ecx
                      jmp 00007F5B006AAE8Fh
                      push ecx
                      lea ecx, dword ptr [esp+08h]
                      sub ecx, eax
                      and ecx, 07h
                      add eax, ecx
                      sbb ecx, ecx
                      or eax, ecx
                      pop ecx
                      jmp 00007F5B006AAE79h
                      int3
                      int3
                      int3
                      int3
                      push ebx
                      push esi
                      mov eax, dword ptr [esp+18h]
                      or eax, eax
                      jne 00007F5B006AA5FAh
                      mov ecx, dword ptr [esp+14h]
                      mov eax, dword ptr [esp+10h]
                      xor edx, edx
                      div ecx
                      mov ebx, eax
                      mov eax, dword ptr [esp+0Ch]
                      div ecx
                      mov edx, ebx
                      jmp 00007F5B006AA623h
                      mov ecx, eax
                      mov ebx, dword ptr [esp+14h]
                      mov edx, dword ptr [esp+10h]
                      mov eax, dword ptr [esp+0Ch]
                      shr ecx, 1
                      rcr ebx, 1
                      shr edx, 1
                      rcr eax, 1
                      or ecx, ecx
                      jne 00007F5B006AA5D6h
                      div ebx
                      mov esi, eax
                      mul dword ptr [esp+18h]
                      mov ecx, eax
                      mov eax, dword ptr [esp+14h]
                      mul esi
                      add edx, ecx
                      jc 00007F5B006AA5F0h
                      cmp edx, dword ptr [esp+10h]
                      jnbe 00007F5B006AA5EAh
                      jc 00007F5B006AA5E9h
                      cmp eax, dword ptr [esp+0Ch]
                      jbe 00007F5B006AA5E3h
                      dec esi
                      xor edx, edx
                      mov eax, esi
                      pop esi
                      pop ebx
                      retn 0010h
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ebx
                      mov eax, dword ptr [esp+14h]
                      or eax, eax
                      jne 00007F5B006AA5FAh
                      mov ecx, dword ptr [esp+10h]
                      mov eax, dword ptr [esp+0Ch]
                      xor edx, edx
                      div ecx
                      mov eax, dword ptr [esp+08h]
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x309c00xb8.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x30a780x28.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x810000x205c.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x2df480x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x2df800x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2de880x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x260000x16c.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x231470x232000b0b57e0ce9a423636e86ab68d22d4c2False0.5813431383451957data6.630273197897779IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .zzZ0x250000x7200x8009a7794508ff1d41f86a95c6eab08a54bFalse0.66796875data6.14904307986081IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x260000xb2f20xb40010aa0234a4d25732d9e0c491c2c1fab9False0.42233072916666664data4.896205233219445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x320000x4eebc0x4e00090632f44191988318a330a51a653f0f5False0.981864733573718data7.9871661512615555IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .reloc0x810000x205c0x2200d54c3d32de6655445e95ecba5e9b2d65False0.7157628676470589data6.397411674681506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      DLLImport
                      KERNEL32.dllWaitForSingleObject, CreateThread, VirtualAllocEx, FreeConsole, RaiseException, InitOnceBeginInitialize, InitOnceComplete, CloseHandle, GetCurrentThreadId, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, GetLastError, FreeLibraryWhenCallbackReturns, CreateThreadpoolWork, SubmitThreadpoolWork, CloseThreadpoolWork, GetModuleHandleExW, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceCounter, EncodePointer, DecodePointer, MultiByteToWideChar, WideCharToMultiByte, LCMapStringEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, GetStringTypeW, GetCPInfo, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess, GetCurrentProcessId, InitializeSListHead, CreateFileW, RtlUnwind, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleFileNameW, GetStdHandle, WriteFile, GetCommandLineA, GetCommandLineW, HeapFree, HeapAlloc, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, GetFileSizeEx, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetProcessHeap, SetStdHandle, HeapSize, WriteConsoleW
                      NameOrdinalAddress
                      QuitMessageStr10x42570f
                      _QuitMessageStr20x42570f
                      _QuitMessageStr230x42570f
                      _QuitMessageStr340x42570f
                      _QuitMessageStr450x42570f
                      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                      2024-07-26T19:12:16.450766+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:17.612406+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:15.561966+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:14.647518+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:14.083330+0200TCP2046056ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)146404973051.195.145.80192.168.2.4
                      2024-07-26T19:12:14.468647+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:15.263507+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:17.618191+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:16.470779+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973152.165.165.26192.168.2.4
                      2024-07-26T19:12:08.511418+0200TCP2046045ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:14.076214+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:18.967700+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:17.178429+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:13.739811+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:14.266111+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:16.274594+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:16.993990+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:16.111175+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:18.617808+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:18.431340+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:15.799653+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:19.143850+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:16.641500+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:54.830118+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973752.165.165.26192.168.2.4
                      2024-07-26T19:12:17.353117+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:08.705205+0200TCP2043234ET MALWARE Redline Stealer TCP CnC - Id1Response146404973051.195.145.80192.168.2.4
                      2024-07-26T19:12:18.794183+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:19.351668+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      2024-07-26T19:12:16.819493+0200TCP2043231ET MALWARE Redline Stealer TCP CnC Activity4973014640192.168.2.451.195.145.80
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 26, 2024 19:11:58.463174105 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:11:58.851711035 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:11:58.851804018 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:11:58.859029055 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:11:58.866660118 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:08.487121105 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:08.511418104 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:08.516580105 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:08.705204964 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:08.751910925 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:13.739810944 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:13.746704102 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:13.957674026 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:13.957698107 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:13.957714081 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:13.957849026 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:13.957876921 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:13.957895041 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:13.957931995 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:14.001903057 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:14.076214075 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:14.083329916 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.255369902 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.266110897 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:14.271460056 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.438594103 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.468647003 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:14.473778963 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.640705109 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.647517920 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:14.652625084 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.652640104 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.652652979 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.652880907 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.652894020 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.653265953 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.896280050 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:14.939393997 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:15.263506889 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:15.268640041 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.268662930 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.268872976 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.534457922 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.561965942 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:15.567198038 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.734452009 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.783068895 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:15.799653053 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:15.804851055 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.804864883 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.804888010 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.804898977 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.804909945 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.805258989 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.805270910 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.805280924 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.805301905 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.805685043 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.809808016 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.809819937 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.809830904 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.809853077 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:15.809864044 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:16.064096928 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:16.111175060 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:16.274594069 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:16.279577017 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:16.447477102 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:16.450766087 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:16.455965996 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:16.636600018 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:16.641499996 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:16.647916079 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:16.815555096 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:16.819493055 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:16.824507952 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:16.992389917 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:16.993989944 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:16.999121904 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.176567078 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.178428888 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.183403969 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.352174044 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.353116989 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.358477116 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.539006948 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.580029964 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.612406015 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.618007898 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618068933 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618108988 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618146896 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618191004 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.618258953 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618299961 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618339062 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618386030 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.618447065 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618488073 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618520975 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.618545055 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.618575096 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618614912 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618643999 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.618664980 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.618721962 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618762970 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618784904 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.618814945 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.618844986 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618885040 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618921995 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618959904 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.618988037 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.619035006 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.619069099 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.619118929 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.619138956 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.619165897 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.622442007 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.622483969 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.622522116 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.622550964 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.622582912 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.622679949 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.622720003 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.622764111 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.622802973 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.622839928 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.622868061 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.622896910 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.622950077 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.622980118 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.623027086 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.623045921 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.623071909 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.623107910 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.623161077 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.625206947 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625273943 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.625317097 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625384092 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.625422001 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625462055 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625500917 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625561953 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.625603914 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625643969 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625680923 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625720978 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625758886 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625796080 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625833988 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625871897 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625909090 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.625967979 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626013994 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626053095 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626091003 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626128912 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626168966 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626208067 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626245022 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626336098 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.626442909 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626482964 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626519918 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626557112 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626589060 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.626622915 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.626652956 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626692057 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626718998 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.626741886 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.626770973 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626820087 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.626840115 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626887083 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.626907110 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.626951933 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.626981974 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.627027988 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.627048016 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.627084017 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.627207041 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.627245903 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.627305984 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.627345085 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.627382040 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.627424002 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.628076077 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.628119946 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.628557920 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.629725933 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.629793882 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.629833937 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.629873037 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.629933119 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.629973888 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630011082 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630050898 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630090952 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630152941 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630193949 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630233049 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630270958 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630307913 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630346060 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630383015 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630419970 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.630459070 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.631989002 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632240057 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632299900 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632359028 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632421970 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632462025 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632549047 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632610083 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632649899 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632689953 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632726908 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632766962 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632806063 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632843971 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632880926 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632917881 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.632977009 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633094072 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.633212090 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.633249044 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633289099 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633327007 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633366108 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633404016 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633443117 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633480072 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633517027 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633553982 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633593082 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633630991 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633667946 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633704901 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633744955 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633781910 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633821011 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633881092 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633919954 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.633958101 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634001970 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634041071 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634079933 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634118080 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634155989 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634195089 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634232998 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634269953 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634308100 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634345055 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634382963 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634419918 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634459972 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634499073 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.634994984 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.635056019 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.635093927 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.635153055 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.635194063 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.635230064 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.635289907 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.635329962 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.635369062 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.635406017 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.635443926 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.635483027 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.636042118 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.636333942 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.636454105 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.639574051 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639591932 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639606953 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639626026 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639652967 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639669895 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639687061 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639703989 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639724016 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639796019 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639955044 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639972925 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.639992952 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640008926 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640037060 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640055895 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640074015 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640101910 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640117884 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640134096 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640614033 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640625954 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640649080 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640669107 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640747070 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640763044 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640782118 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640798092 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640815020 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640841961 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640858889 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640875101 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640891075 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640907049 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640933990 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640949965 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640965939 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640981913 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.640997887 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641016960 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641036987 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641063929 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641079903 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641096115 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641112089 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641128063 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641144037 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641172886 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641190052 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641206026 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641223907 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641243935 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641259909 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641275883 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641422033 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641508102 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.641578913 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.641612053 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641628981 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641644001 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641661882 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641680002 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641714096 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641907930 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641937017 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641952991 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.641985893 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642004013 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642020941 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642040968 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642067909 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642091990 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642108917 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642137051 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642167091 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642184973 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642227888 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642240047 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642256975 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642272949 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642288923 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642326117 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642342091 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642357111 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642374992 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642391920 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642407894 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642433882 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642448902 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642467022 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642482996 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642502069 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642517090 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642534971 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642550945 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642565012 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642592907 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642608881 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642625093 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642641068 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642668009 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642683983 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642700911 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642716885 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642731905 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642759085 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642775059 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642791033 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642808914 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.642843008 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.643250942 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.643321037 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.646960020 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.646976948 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.646996021 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647006989 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647031069 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647135973 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647160053 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647178888 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647207022 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647224903 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647346020 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647373915 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647578955 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647655964 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647814989 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647846937 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.647936106 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648035049 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648179054 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648267031 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648448944 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648479939 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648545980 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648617983 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648745060 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648823023 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648868084 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648897886 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648926020 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648955107 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.648988008 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649075031 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649106026 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649135113 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649169922 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649199963 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649245977 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649291992 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649322033 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649349928 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649394989 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649424076 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649451971 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649497032 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649525881 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649554014 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649583101 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649611950 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649656057 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649686098 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649713993 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649741888 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649770021 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649797916 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649825096 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649852991 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649882078 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.649986982 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.650088072 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.650111914 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650161028 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650191069 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650219917 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650248051 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650275946 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650305033 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650335073 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650362968 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650391102 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650419950 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650449038 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650476933 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650504112 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650532007 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650559902 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650587082 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650614977 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650644064 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650672913 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650701046 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650727987 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650755882 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650788069 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650834084 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650863886 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650892019 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650919914 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650948048 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.650975943 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651005983 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651034117 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651062012 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651091099 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651120901 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651149988 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651179075 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651207924 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651237011 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651264906 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651293039 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651324987 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651354074 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651381969 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651411057 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651437998 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651465893 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651494026 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651525974 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651559114 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.651961088 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.652053118 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.656464100 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656518936 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656563997 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656594038 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656621933 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656670094 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656698942 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656728029 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656754971 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656784058 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656830072 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656858921 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656888962 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656917095 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656944990 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.656972885 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657001972 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657031059 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657058954 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657087088 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657115936 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657143116 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657191038 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657221079 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657248974 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657277107 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657304049 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657332897 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657361031 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657388926 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657418013 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657444954 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657474041 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657502890 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657531977 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657560110 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657589912 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657618999 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657646894 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657675982 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657705069 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657736063 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657783985 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657814026 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657843113 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657871008 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657900095 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657927990 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657955885 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.657984018 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658011913 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658039093 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658066988 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658102989 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658133030 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658163071 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658191919 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658220053 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658247948 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658276081 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658303022 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658333063 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658363104 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658396959 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658425093 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658452988 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658545971 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.658655882 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.658684015 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658737898 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658768892 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658797026 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658824921 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658853054 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658880949 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658909082 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658936024 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658963919 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.658992052 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659019947 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659048080 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659075022 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659102917 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659131050 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659158945 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659188986 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659215927 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659243107 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659274101 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659302950 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659332037 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.659358978 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.705014944 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.705996990 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.708645105 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.710484028 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714113951 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714159012 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714200020 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714238882 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714277029 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714314938 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714379072 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714417934 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714454889 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714493036 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714533091 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714570045 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714607954 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714644909 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.714687109 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:17.736183882 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:17.741437912 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:18.363580942 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:18.408159018 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:18.431339979 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:18.436512947 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:18.616229057 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:18.617808104 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:18.623197079 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:18.791838884 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:18.794183016 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:18.799565077 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:18.967200994 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:18.967700005 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:18.973292112 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:19.143217087 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:19.143850088 CEST4973014640192.168.2.451.195.145.80
                      Jul 26, 2024 19:12:19.150823116 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:19.320058107 CEST146404973051.195.145.80192.168.2.4
                      Jul 26, 2024 19:12:19.351667881 CEST4973014640192.168.2.451.195.145.80

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:13:11:55
                      Start date:26/07/2024
                      Path:C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\FkJbps6Srrl6lOQ9M_l8dpw2.exe"
                      Imagebase:0x4f0000
                      File size:521'216 bytes
                      MD5 hash:B8E1A18940A4B5F002BBF04F334EE02A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:13:11:56
                      Start date:26/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:13:11:56
                      Start date:26/07/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Imagebase:0x2f0000
                      File size:65'440 bytes
                      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:13:11:56
                      Start date:26/07/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Imagebase:0x720000
                      File size:65'440 bytes
                      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000003.00000002.1877716871.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.1880460942.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.1880460942.0000000002CF9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:5.5%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:1.5%
                        Total number of Nodes:1784
                        Total number of Limit Nodes:40
                        execution_graph 20527 4f7042 20528 4f7055 20527->20528 20530 4f7069 20528->20530 20531 501027 20528->20531 20532 501033 __FrameHandler3::FrameUnwindToState 20531->20532 20533 50103a 20532->20533 20534 50104f 20532->20534 20535 501137 __strnicoll 14 API calls 20533->20535 20544 4fd5f7 EnterCriticalSection 20534->20544 20537 50103f 20535->20537 20539 4fc97f __strnicoll 41 API calls 20537->20539 20538 501059 20545 500f2e 20538->20545 20541 50104a 20539->20541 20541->20530 20544->20538 20546 500f46 20545->20546 20553 500fb6 20545->20553 20547 506a14 __fread_nolock 41 API calls 20546->20547 20550 500f4c 20547->20550 20548 509c6c 14 API calls 20552 500fae 20548->20552 20549 500f9e 20551 501137 __strnicoll 14 API calls 20549->20551 20550->20549 20550->20553 20554 500fa3 20551->20554 20556 501092 20552->20556 20553->20548 20553->20552 20555 4fc97f __strnicoll 41 API calls 20554->20555 20555->20552 20559 4fd60b LeaveCriticalSection 20556->20559 20558 501098 20558->20541 20559->20558 22406 4f7253 22407 4f725f 22406->22407 22411 4f7296 22407->22411 22412 500ef4 22407->22412 22410 4f6c39 41 API calls 22410->22411 22413 500f07 _Fputc 22412->22413 22418 500e2b 22413->22418 22415 500f1c 22416 4fc6bb _Fputc 41 API calls 22415->22416 22417 4f7283 22416->22417 22417->22410 22417->22411 22419 500e60 22418->22419 22420 500e3d 22418->22420 22419->22420 22423 500e87 22419->22423 22421 4fc902 __strnicoll 41 API calls 22420->22421 22422 500e58 22421->22422 22422->22415 22426 500d30 22423->22426 22427 500d3c __FrameHandler3::FrameUnwindToState 22426->22427 22434 4fd5f7 EnterCriticalSection 22427->22434 22429 500d4a 22435 500d8b 22429->22435 22431 500d57 22444 500d7f 22431->22444 22434->22429 22436 5000ee ___scrt_uninitialize_crt 66 API calls 22435->22436 22437 500da6 22436->22437 22438 5059ad 14 API calls 22437->22438 22439 500db0 22438->22439 22440 50511b __Getctype 14 API calls 22439->22440 22443 500dcb 22439->22443 22441 500def 22440->22441 22442 504beb ___free_lconv_mon 14 API calls 22441->22442 22442->22443 22443->22431 22447 4fd60b LeaveCriticalSection 22444->22447 22446 500d68 22446->22415 22447->22446 20574 4f106d 20575 4f1079 __EH_prolog3 20574->20575 20578 4f803d 20575->20578 20577 4f10bb codecvt 20581 4f8010 20578->20581 20582 4f801f 20581->20582 20583 4f8026 20581->20583 20587 5029be 20582->20587 20590 502a3b 20583->20590 20586 4f8024 20586->20577 20588 502a3b 44 API calls 20587->20588 20589 5029d0 20588->20589 20589->20586 20593 502787 20590->20593 20594 502793 __FrameHandler3::FrameUnwindToState 20593->20594 20601 4ff268 EnterCriticalSection 20594->20601 20596 5027a1 20602 5027e2 20596->20602 20598 5027ae 20612 5027d6 20598->20612 20601->20596 20603 5027fd 20602->20603 20604 502870 _unexpected 20602->20604 20603->20604 20605 502850 20603->20605 20615 50be1c 20603->20615 20604->20598 20605->20604 20607 50be1c 44 API calls 20605->20607 20608 502866 20607->20608 20610 504beb ___free_lconv_mon 14 API calls 20608->20610 20609 502846 20611 504beb ___free_lconv_mon 14 API calls 20609->20611 20610->20604 20611->20605 20643 4ff2b0 LeaveCriticalSection 20612->20643 20614 5027bf 20614->20586 20616 50be44 20615->20616 20617 50be29 20615->20617 20619 50be53 20616->20619 20624 511559 20616->20624 20617->20616 20618 50be35 20617->20618 20620 501137 __strnicoll 14 API calls 20618->20620 20631 50a6ac 20619->20631 20622 50be3a __fread_nolock 20620->20622 20622->20609 20625 511564 20624->20625 20626 511579 HeapSize 20624->20626 20627 501137 __strnicoll 14 API calls 20625->20627 20626->20619 20628 511569 20627->20628 20629 4fc97f __strnicoll 41 API calls 20628->20629 20630 511574 20629->20630 20630->20619 20632 50a6c4 20631->20632 20633 50a6b9 20631->20633 20635 50a6cc 20632->20635 20641 50a6d5 __Getctype 20632->20641 20634 505bdf __fread_nolock 15 API calls 20633->20634 20639 50a6c1 20634->20639 20636 504beb ___free_lconv_mon 14 API calls 20635->20636 20636->20639 20637 50a6da 20640 501137 __strnicoll 14 API calls 20637->20640 20638 50a6ff HeapReAlloc 20638->20639 20638->20641 20639->20622 20640->20639 20641->20637 20641->20638 20642 501c0b codecvt 2 API calls 20641->20642 20642->20641 20643->20614 20108 51546e 20109 4f7dbe codecvt 16 API calls 20108->20109 20110 51548f 20109->20110 20111 4f217e std::_Throw_Cpp_error 43 API calls 20110->20111 20112 5154a3 20110->20112 20111->20112 20113 4f4387 std::_Throw_Cpp_error 41 API calls 20112->20113 20115 5154b5 20112->20115 20113->20115 20116 5154ff 20115->20116 20138 4f19e3 20115->20138 20125 4f222a 20116->20125 20120 51553e 20122 4f8107 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20120->20122 20121 51551e error_info_injector 20121->20120 20123 4f1800 _Deallocate 41 API calls 20121->20123 20124 51554d 20122->20124 20123->20120 20148 4f1777 20125->20148 20127 4f224d 20128 51554f 20127->20128 20134 51556a 20128->20134 20137 515624 20128->20137 20131 4f13cb 71 API calls 20131->20134 20132 4f1eb7 98 API calls 20132->20134 20133 4fd44e 44 API calls 20133->20134 20134->20131 20134->20132 20134->20133 20135 4f1920 43 API calls 20134->20135 20136 4f1800 _Deallocate 41 API calls 20134->20136 20134->20137 20135->20134 20136->20134 20159 4f433b 20137->20159 20139 4f19ef __EH_prolog3_catch 20138->20139 20140 4f1a0f 20139->20140 20141 4f1a9b 20139->20141 20144 4f454e 43 API calls 20140->20144 20142 4f4528 43 API calls 20141->20142 20143 4f1aa0 20142->20143 20145 4f1a24 20144->20145 20146 4f340b 41 API calls 20145->20146 20147 4f1a7a codecvt 20146->20147 20147->20115 20149 4f1781 20148->20149 20151 4f178a 20148->20151 20152 4f3106 20149->20152 20151->20127 20153 4f312c 20152->20153 20154 4f3116 20152->20154 20156 4f4528 43 API calls 20153->20156 20155 4f454e 43 API calls 20154->20155 20158 4f311c 20155->20158 20157 4f3131 20156->20157 20158->20151 20160 4f4353 20159->20160 20161 4f4343 20159->20161 20160->20121 20162 4f1800 _Deallocate 41 API calls 20161->20162 20162->20160 20868 4f70c4 20869 4f70d8 20868->20869 20875 4f7133 20869->20875 20876 4f6ace 20869->20876 20872 4f7120 20872->20875 20888 500362 20872->20888 20879 4f6ae8 20876->20879 20881 4f6b37 20876->20881 20877 4f8107 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20878 4f6b4e 20877->20878 20878->20872 20878->20875 20882 5009f4 20878->20882 20880 500cf6 69 API calls 20879->20880 20879->20881 20880->20881 20881->20877 20883 500a07 _Fputc 20882->20883 20902 500793 20883->20902 20886 4fc6bb _Fputc 41 API calls 20887 500a29 20886->20887 20887->20872 20889 500382 20888->20889 20890 50036d 20888->20890 20892 50038a 20889->20892 20893 50039f 20889->20893 20891 501137 __strnicoll 14 API calls 20890->20891 20894 500372 20891->20894 20895 501137 __strnicoll 14 API calls 20892->20895 20940 50904d 20893->20940 20897 4fc97f __strnicoll 41 API calls 20894->20897 20898 50038f 20895->20898 20900 50037d 20897->20900 20901 4fc97f __strnicoll 41 API calls 20898->20901 20899 50039a 20899->20875 20900->20875 20901->20899 20906 50079f __FrameHandler3::FrameUnwindToState 20902->20906 20903 5007a5 20904 4fc902 __strnicoll 41 API calls 20903->20904 20908 5007c0 20904->20908 20905 5007d9 20913 4fd5f7 EnterCriticalSection 20905->20913 20906->20903 20906->20905 20908->20886 20909 5007e5 20914 500908 20909->20914 20911 5007fc 20923 500825 20911->20923 20913->20909 20915 50091b 20914->20915 20916 50092e 20914->20916 20915->20911 20926 50082f 20916->20926 20918 500951 20919 5000ee ___scrt_uninitialize_crt 66 API calls 20918->20919 20922 5009df 20918->20922 20920 50097f 20919->20920 20930 509c4e 20920->20930 20922->20911 20939 4fd60b LeaveCriticalSection 20923->20939 20925 50082d 20925->20908 20927 500898 20926->20927 20928 500840 20926->20928 20927->20918 20928->20927 20933 509c0e 20928->20933 20931 509b2d __fread_nolock 43 API calls 20930->20931 20932 509c67 20931->20932 20932->20922 20934 509c22 _Fputc 20933->20934 20935 509b2d __fread_nolock 43 API calls 20934->20935 20936 509c37 20935->20936 20937 4fc6bb _Fputc 41 API calls 20936->20937 20938 509c46 20937->20938 20938->20927 20939->20925 20941 509061 _Fputc 20940->20941 20946 508a62 20941->20946 20944 4fc6bb _Fputc 41 API calls 20945 50907b 20944->20945 20945->20899 20947 508a6e __FrameHandler3::FrameUnwindToState 20946->20947 20948 508a75 20947->20948 20949 508a98 20947->20949 20950 4fc902 __strnicoll 41 API calls 20948->20950 20957 4fd5f7 EnterCriticalSection 20949->20957 20952 508a8e 20950->20952 20952->20944 20953 508aa6 20958 508af1 20953->20958 20955 508ab5 20971 508ae7 20955->20971 20957->20953 20959 508b00 20958->20959 20960 508b28 20958->20960 20961 4fc902 __strnicoll 41 API calls 20959->20961 20962 506a14 __fread_nolock 41 API calls 20960->20962 20963 508b1b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20961->20963 20964 508b31 20962->20964 20963->20955 20974 509bf0 20964->20974 20967 508bf2 20967->20963 20989 508c92 20967->20989 20968 508bdb 20977 508e51 20968->20977 20996 4fd60b LeaveCriticalSection 20971->20996 20973 508aef 20973->20952 20975 509a07 45 API calls 20974->20975 20976 508b4f 20975->20976 20976->20963 20976->20967 20976->20968 20978 508e60 ___scrt_uninitialize_crt 20977->20978 20979 506a14 __fread_nolock 41 API calls 20978->20979 20981 508e7c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20979->20981 20980 4f8107 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20983 508ffa 20980->20983 20982 509bf0 45 API calls 20981->20982 20988 508e88 20981->20988 20984 508edc 20982->20984 20983->20963 20985 508f0e ReadFile 20984->20985 20984->20988 20986 508f35 20985->20986 20985->20988 20987 509bf0 45 API calls 20986->20987 20987->20988 20988->20980 20990 506a14 __fread_nolock 41 API calls 20989->20990 20991 508ca5 20990->20991 20992 509bf0 45 API calls 20991->20992 20995 508ced __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20991->20995 20993 508d40 20992->20993 20994 509bf0 45 API calls 20993->20994 20993->20995 20994->20995 20995->20963 20996->20973 21001 5088c8 21002 5088d5 21001->21002 21003 5088ed 21001->21003 21004 501137 __strnicoll 14 API calls 21002->21004 21007 50894c 21003->21007 21008 509c6c 14 API calls 21003->21008 21015 5088e5 21003->21015 21005 5088da 21004->21005 21006 4fc97f __strnicoll 41 API calls 21005->21006 21006->21015 21009 506a14 __fread_nolock 41 API calls 21007->21009 21008->21007 21010 508965 21009->21010 21021 509554 21010->21021 21013 506a14 __fread_nolock 41 API calls 21014 50899e 21013->21014 21014->21015 21016 506a14 __fread_nolock 41 API calls 21014->21016 21017 5089ac 21016->21017 21017->21015 21018 506a14 __fread_nolock 41 API calls 21017->21018 21019 5089ba 21018->21019 21020 506a14 __fread_nolock 41 API calls 21019->21020 21020->21015 21022 509560 __FrameHandler3::FrameUnwindToState 21021->21022 21023 509580 21022->21023 21024 509568 21022->21024 21026 50963d 21023->21026 21029 5095b6 21023->21029 21025 501124 __dosmaperr 14 API calls 21024->21025 21028 50956d 21025->21028 21027 501124 __dosmaperr 14 API calls 21026->21027 21030 509642 21027->21030 21031 501137 __strnicoll 14 API calls 21028->21031 21032 5095d4 21029->21032 21033 5095bf 21029->21033 21034 501137 __strnicoll 14 API calls 21030->21034 21050 50896d 21031->21050 21051 50c1e7 EnterCriticalSection 21032->21051 21035 501124 __dosmaperr 14 API calls 21033->21035 21037 5095cc 21034->21037 21038 5095c4 21035->21038 21043 4fc97f __strnicoll 41 API calls 21037->21043 21040 501137 __strnicoll 14 API calls 21038->21040 21039 5095da 21041 5095f6 21039->21041 21042 50960b 21039->21042 21040->21037 21044 501137 __strnicoll 14 API calls 21041->21044 21052 509668 21042->21052 21043->21050 21047 5095fb 21044->21047 21046 509606 21115 509635 21046->21115 21048 501124 __dosmaperr 14 API calls 21047->21048 21048->21046 21050->21013 21050->21015 21051->21039 21053 509692 21052->21053 21054 50967a 21052->21054 21056 5099e8 21053->21056 21059 5096d8 21053->21059 21055 501124 __dosmaperr 14 API calls 21054->21055 21057 50967f 21055->21057 21058 501124 __dosmaperr 14 API calls 21056->21058 21060 501137 __strnicoll 14 API calls 21057->21060 21061 5099ed 21058->21061 21062 5096e3 21059->21062 21066 509687 21059->21066 21070 509713 21059->21070 21060->21066 21063 501137 __strnicoll 14 API calls 21061->21063 21065 501124 __dosmaperr 14 API calls 21062->21065 21064 5096f0 21063->21064 21068 4fc97f __strnicoll 41 API calls 21064->21068 21067 5096e8 21065->21067 21066->21046 21069 501137 __strnicoll 14 API calls 21067->21069 21068->21066 21069->21064 21071 50972c 21070->21071 21072 509746 21070->21072 21073 509777 21070->21073 21071->21072 21080 509731 21071->21080 21074 501124 __dosmaperr 14 API calls 21072->21074 21075 505bdf __fread_nolock 15 API calls 21073->21075 21076 50974b 21074->21076 21079 509788 21075->21079 21077 501137 __strnicoll 14 API calls 21076->21077 21081 509752 21077->21081 21078 51052e __fread_nolock 41 API calls 21082 5098c4 21078->21082 21083 504beb ___free_lconv_mon 14 API calls 21079->21083 21080->21078 21084 4fc97f __strnicoll 41 API calls 21081->21084 21085 509938 21082->21085 21088 5098dd GetConsoleMode 21082->21088 21086 509791 21083->21086 21114 50975d __fread_nolock 21084->21114 21087 50993c ReadFile 21085->21087 21089 504beb ___free_lconv_mon 14 API calls 21086->21089 21090 5099b0 GetLastError 21087->21090 21091 509954 21087->21091 21088->21085 21092 5098ee 21088->21092 21093 509798 21089->21093 21094 509914 21090->21094 21095 5099bd 21090->21095 21091->21090 21096 50992d 21091->21096 21092->21087 21097 5098f4 ReadConsoleW 21092->21097 21098 5097a2 21093->21098 21099 5097bd 21093->21099 21094->21114 21118 5010dd 21094->21118 21101 501137 __strnicoll 14 API calls 21095->21101 21110 509979 21096->21110 21112 509990 21096->21112 21096->21114 21097->21096 21103 50990e GetLastError 21097->21103 21100 501137 __strnicoll 14 API calls 21098->21100 21102 509c0e __fread_nolock 43 API calls 21099->21102 21105 5097a7 21100->21105 21106 5099c2 21101->21106 21102->21080 21103->21094 21104 504beb ___free_lconv_mon 14 API calls 21104->21066 21108 501124 __dosmaperr 14 API calls 21105->21108 21109 501124 __dosmaperr 14 API calls 21106->21109 21108->21114 21109->21114 21123 509382 21110->21123 21112->21114 21136 5091da 21112->21136 21114->21104 21148 50c20a LeaveCriticalSection 21115->21148 21117 50963b 21117->21050 21119 501124 __dosmaperr 14 API calls 21118->21119 21120 5010e8 __dosmaperr 21119->21120 21121 501137 __strnicoll 14 API calls 21120->21121 21122 5010fb 21121->21122 21122->21114 21142 50908e 21123->21142 21126 50a722 __strnicoll MultiByteToWideChar 21127 509496 21126->21127 21130 50949f GetLastError 21127->21130 21133 5093ca 21127->21133 21128 509424 21134 5093de 21128->21134 21135 509c0e __fread_nolock 43 API calls 21128->21135 21129 509414 21131 501137 __strnicoll 14 API calls 21129->21131 21132 5010dd __dosmaperr 14 API calls 21130->21132 21131->21133 21132->21133 21133->21114 21134->21126 21135->21134 21138 509211 21136->21138 21137 5092a1 21137->21114 21138->21137 21139 5092a6 ReadFile 21138->21139 21139->21137 21140 5092c3 21139->21140 21140->21137 21141 509c0e __fread_nolock 43 API calls 21140->21141 21141->21137 21143 5090c2 21142->21143 21144 509131 ReadFile 21143->21144 21145 50912c 21143->21145 21144->21145 21146 50914a 21144->21146 21145->21128 21145->21129 21145->21133 21145->21134 21146->21145 21147 509c0e __fread_nolock 43 API calls 21146->21147 21147->21145 21148->21117 22609 4f72ea 22610 4f72f6 __EH_prolog3_GS 22609->22610 22613 4f735c 22610->22613 22614 4f7343 22610->22614 22617 4f730d 22610->22617 22628 500256 22613->22628 22625 4f6623 22614->22625 22652 4f8129 22617->22652 22619 4f4387 std::_Throw_Cpp_error 41 API calls 22619->22617 22620 4f737b 22621 4f741b 22620->22621 22623 4f7434 22620->22623 22624 500256 43 API calls 22620->22624 22648 4f4a6d 22620->22648 22621->22619 22622 501027 43 API calls 22622->22623 22623->22621 22623->22622 22624->22620 22626 500256 43 API calls 22625->22626 22627 4f662e 22626->22627 22627->22617 22629 500262 __FrameHandler3::FrameUnwindToState 22628->22629 22630 500284 22629->22630 22631 50026c 22629->22631 22655 4fd5f7 EnterCriticalSection 22630->22655 22632 501137 __strnicoll 14 API calls 22631->22632 22634 500271 22632->22634 22636 4fc97f __strnicoll 41 API calls 22634->22636 22635 50028e 22637 50032a 22635->22637 22638 506a14 __fread_nolock 41 API calls 22635->22638 22642 50027c _Fputc 22636->22642 22656 50021a 22637->22656 22645 5002ab 22638->22645 22640 500330 22663 50035a 22640->22663 22642->22620 22643 500302 22644 501137 __strnicoll 14 API calls 22643->22644 22646 500307 22644->22646 22645->22637 22645->22643 22647 4fc97f __strnicoll 41 API calls 22646->22647 22647->22642 22649 4f4a79 22648->22649 22650 4f4a94 22648->22650 22649->22620 22667 4f1bc8 22650->22667 22653 4f8107 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22652->22653 22654 4f8133 22653->22654 22654->22654 22655->22635 22657 500226 22656->22657 22659 50023b __fread_nolock 22656->22659 22658 501137 __strnicoll 14 API calls 22657->22658 22660 50022b 22658->22660 22659->22640 22661 4fc97f __strnicoll 41 API calls 22660->22661 22662 500236 22661->22662 22662->22640 22666 4fd60b LeaveCriticalSection 22663->22666 22665 500360 22665->22642 22666->22665 22668 4f1c4d 22667->22668 22669 4f1be1 std::_Throw_Cpp_error 22667->22669 22670 4f451d std::_Throw_Cpp_error 43 API calls 22668->22670 22672 4f1578 std::_Throw_Cpp_error 43 API calls 22669->22672 22671 4f1c52 22670->22671 22673 4f1c00 22672->22673 22674 4f1800 _Deallocate 41 API calls 22673->22674 22675 4f1c32 22673->22675 22674->22675 22675->22649 23032 50be9b 23033 50beb4 23032->23033 23034 50bed2 23032->23034 23033->23034 23035 505aa3 2 API calls 23033->23035 23035->23033 23053 4f72ab 23054 4f72e3 23053->23054 23055 4f72b4 23053->23055 23055->23054 23058 5001c5 23055->23058 23057 4f72d6 23059 5001d7 23058->23059 23063 5001e0 ___scrt_uninitialize_crt 23058->23063 23060 500049 ___scrt_uninitialize_crt 70 API calls 23059->23060 23061 5001dd 23060->23061 23061->23057 23062 5001f1 23062->23057 23063->23062 23066 4fffe9 23063->23066 23067 4ffff5 __FrameHandler3::FrameUnwindToState 23066->23067 23074 4fd5f7 EnterCriticalSection 23067->23074 23069 500003 23070 500157 ___scrt_uninitialize_crt 70 API calls 23069->23070 23071 500014 23070->23071 23075 50003d 23071->23075 23074->23069 23078 4fd60b LeaveCriticalSection 23075->23078 23077 500026 23077->23057 23078->23077 18239 4f82bf 18240 4f82cb __FrameHandler3::FrameUnwindToState 18239->18240 18265 4f7e77 18240->18265 18242 4f82d2 18243 4f842b 18242->18243 18253 4f82fc ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState ___scrt_release_startup_lock 18242->18253 18308 4f87a2 IsProcessorFeaturePresent 18243->18308 18245 4f8432 18283 50214c 18245->18283 18250 4f831b 18251 4f839c 18276 502713 18251->18276 18253->18250 18253->18251 18286 502126 18253->18286 18255 4f83a2 18280 515712 FreeConsole 18255->18280 18260 4f83c7 18261 4f83d0 18260->18261 18299 502101 18260->18299 18302 4f7fe8 18261->18302 18266 4f7e80 18265->18266 18315 4f8565 IsProcessorFeaturePresent 18266->18315 18270 4f7e91 18271 4f7e95 18270->18271 18325 502b69 18270->18325 18271->18242 18274 4f7eac 18274->18242 18277 502721 18276->18277 18278 50271c 18276->18278 18277->18255 18397 50246d 18278->18397 19056 515637 CreateThread WaitForSingleObject 18280->19056 18282 4f83b9 18297 4f88bc GetModuleHandleW 18282->18297 19785 501f31 18283->19785 18287 4ff1eb __FrameHandler3::FrameUnwindToState 18286->18287 18288 50213c _unexpected 18286->18288 18289 504900 __Getctype 41 API calls 18287->18289 18288->18251 18290 4ff1fc 18289->18290 18291 4fc9fb __FrameHandler3::FrameUnwindToState 41 API calls 18290->18291 18292 4ff226 18291->18292 18294 4ff25b 18292->18294 18295 4ff257 18292->18295 19862 505726 18292->19862 19867 4ff27f 18294->19867 18295->18251 18298 4f83c3 18297->18298 18298->18245 18298->18260 18300 501f31 __FrameHandler3::FrameUnwindToState 23 API calls 18299->18300 18301 50210c 18300->18301 18301->18261 18303 4f7ff4 18302->18303 18304 4f800a 18303->18304 19871 502b7b 18303->19871 18304->18250 18306 4f8002 18307 4fb14b ___scrt_uninitialize_crt 7 API calls 18306->18307 18307->18304 18309 4f87b8 __fread_nolock __FrameHandler3::FrameUnwindToState 18308->18309 18310 4f8863 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18309->18310 18311 4f88a7 __FrameHandler3::FrameUnwindToState 18310->18311 18311->18245 18312 502110 18313 501f31 __FrameHandler3::FrameUnwindToState 23 API calls 18312->18313 18314 4f8440 18313->18314 18316 4f7e8c 18315->18316 18317 4fb12c 18316->18317 18334 4fc1fc 18317->18334 18321 4fb148 18321->18270 18322 4fb13d 18322->18321 18348 4fc238 18322->18348 18324 4fb135 18324->18270 18388 50bea4 18325->18388 18328 4fb14b 18329 4fb15e 18328->18329 18330 4fb154 18328->18330 18329->18271 18331 4fb470 ___vcrt_uninitialize_ptd 6 API calls 18330->18331 18332 4fb159 18331->18332 18333 4fc238 ___vcrt_uninitialize_locks DeleteCriticalSection 18332->18333 18333->18329 18335 4fc205 18334->18335 18337 4fc22e 18335->18337 18339 4fb131 18335->18339 18352 4fc5b1 18335->18352 18338 4fc238 ___vcrt_uninitialize_locks DeleteCriticalSection 18337->18338 18338->18339 18339->18324 18340 4fb43d 18339->18340 18369 4fc4c2 18340->18369 18343 4fb452 18343->18322 18346 4fb46d 18346->18322 18349 4fc262 18348->18349 18350 4fc243 18348->18350 18349->18324 18351 4fc24d DeleteCriticalSection 18350->18351 18351->18349 18351->18351 18357 4fc3d7 18352->18357 18355 4fc5e9 InitializeCriticalSectionAndSpinCount 18356 4fc5d4 18355->18356 18356->18335 18358 4fc3f4 18357->18358 18359 4fc3f8 18357->18359 18358->18355 18358->18356 18359->18358 18360 4fc460 GetProcAddress 18359->18360 18362 4fc451 18359->18362 18364 4fc477 LoadLibraryExW 18359->18364 18360->18358 18362->18360 18363 4fc459 FreeLibrary 18362->18363 18363->18360 18365 4fc48e GetLastError 18364->18365 18366 4fc4be 18364->18366 18365->18366 18367 4fc499 ___vcrt_FlsFree 18365->18367 18366->18359 18367->18366 18368 4fc4af LoadLibraryExW 18367->18368 18368->18359 18370 4fc3d7 ___vcrt_FlsFree 5 API calls 18369->18370 18371 4fc4dc 18370->18371 18372 4fc4f5 TlsAlloc 18371->18372 18373 4fb447 18371->18373 18373->18343 18374 4fc573 18373->18374 18375 4fc3d7 ___vcrt_FlsFree 5 API calls 18374->18375 18376 4fc58d 18375->18376 18377 4fc5a8 TlsSetValue 18376->18377 18378 4fb460 18376->18378 18377->18378 18378->18346 18379 4fb470 18378->18379 18380 4fb47a 18379->18380 18381 4fb480 18379->18381 18383 4fc4fd 18380->18383 18381->18343 18384 4fc3d7 ___vcrt_FlsFree 5 API calls 18383->18384 18385 4fc517 18384->18385 18386 4fc52f TlsFree 18385->18386 18387 4fc523 18385->18387 18386->18387 18387->18381 18389 50beb4 18388->18389 18390 4f7e9e 18388->18390 18389->18390 18392 505aa3 18389->18392 18390->18274 18390->18328 18393 505aaa 18392->18393 18394 505aed GetStdHandle 18393->18394 18395 505b4f 18393->18395 18396 505b00 GetFileType 18393->18396 18394->18393 18395->18389 18396->18393 18398 502476 18397->18398 18401 50248c 18397->18401 18398->18401 18403 502499 18398->18403 18400 502483 18400->18401 18420 502604 18400->18420 18401->18277 18404 5024a2 18403->18404 18405 5024a5 18403->18405 18404->18400 18428 50b6f2 18405->18428 18410 5024c2 18461 5024f3 18410->18461 18411 5024b6 18455 504beb 18411->18455 18416 504beb ___free_lconv_mon 14 API calls 18417 5024e6 18416->18417 18418 504beb ___free_lconv_mon 14 API calls 18417->18418 18419 5024ec 18418->18419 18419->18400 18421 502675 18420->18421 18423 502613 18420->18423 18421->18401 18422 50a79e WideCharToMultiByte std::_Locinfo::_Locinfo_ctor 18422->18423 18423->18421 18423->18422 18424 50511b __Getctype 14 API calls 18423->18424 18426 502679 18423->18426 18427 504beb ___free_lconv_mon 14 API calls 18423->18427 18424->18423 18425 504beb ___free_lconv_mon 14 API calls 18425->18421 18426->18425 18427->18423 18429 5024ab 18428->18429 18430 50b6fb 18428->18430 18434 50b9f4 GetEnvironmentStringsW 18429->18434 18483 5049bb 18430->18483 18435 5024b0 18434->18435 18436 50ba0c 18434->18436 18435->18410 18435->18411 18437 50a79e std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 18436->18437 18438 50ba29 18437->18438 18439 50ba33 FreeEnvironmentStringsW 18438->18439 18440 50ba3e 18438->18440 18439->18435 18441 505bdf __fread_nolock 15 API calls 18440->18441 18442 50ba45 18441->18442 18443 50ba4d 18442->18443 18444 50ba5e 18442->18444 18445 504beb ___free_lconv_mon 14 API calls 18443->18445 18446 50a79e std::_Locinfo::_Locinfo_ctor WideCharToMultiByte 18444->18446 18447 50ba52 FreeEnvironmentStringsW 18445->18447 18448 50ba6e 18446->18448 18447->18435 18449 50ba75 18448->18449 18450 50ba7d 18448->18450 18451 504beb ___free_lconv_mon 14 API calls 18449->18451 18452 504beb ___free_lconv_mon 14 API calls 18450->18452 18453 50ba7b FreeEnvironmentStringsW 18451->18453 18452->18453 18453->18435 18456 504bf6 HeapFree 18455->18456 18460 5024bc 18455->18460 18457 504c0b GetLastError 18456->18457 18456->18460 18458 504c18 __dosmaperr 18457->18458 18459 501137 __strnicoll 12 API calls 18458->18459 18459->18460 18460->18400 18462 502508 18461->18462 18463 50511b __Getctype 14 API calls 18462->18463 18464 50252f 18463->18464 18465 502537 18464->18465 18474 502541 18464->18474 18466 504beb ___free_lconv_mon 14 API calls 18465->18466 18482 5024c9 18466->18482 18467 50259e 18468 504beb ___free_lconv_mon 14 API calls 18467->18468 18468->18482 18469 50511b __Getctype 14 API calls 18469->18474 18470 5025ad 19046 5025d5 18470->19046 18474->18467 18474->18469 18474->18470 18476 5025c8 18474->18476 18478 504beb ___free_lconv_mon 14 API calls 18474->18478 19037 5044aa 18474->19037 18475 504beb ___free_lconv_mon 14 API calls 18477 5025ba 18475->18477 19052 4fc9ac IsProcessorFeaturePresent 18476->19052 18480 504beb ___free_lconv_mon 14 API calls 18477->18480 18478->18474 18480->18482 18481 5025d4 18482->18416 18484 5049c6 18483->18484 18490 5049cc 18483->18490 18534 50562a 18484->18534 18488 5049ea 18544 50511b 18488->18544 18489 5049d2 18493 5049d7 18489->18493 18556 4fc9fb 18489->18556 18490->18489 18539 505669 18490->18539 18511 50b4fd 18493->18511 18496 504a13 18499 505669 __Getctype 6 API calls 18496->18499 18497 5049fe 18498 505669 __Getctype 6 API calls 18497->18498 18500 504a0a 18498->18500 18501 504a1f 18499->18501 18506 504beb ___free_lconv_mon 14 API calls 18500->18506 18502 504a32 18501->18502 18503 504a23 18501->18503 18551 50472e 18502->18551 18504 505669 __Getctype 6 API calls 18503->18504 18504->18500 18508 504a10 18506->18508 18508->18489 18509 504beb ___free_lconv_mon 14 API calls 18510 504a44 18509->18510 18510->18493 18839 50b652 18511->18839 18516 50b540 18516->18429 18519 50b567 18864 50b74d 18519->18864 18520 50b559 18521 504beb ___free_lconv_mon 14 API calls 18520->18521 18521->18516 18524 50b59f 18525 501137 __strnicoll 14 API calls 18524->18525 18527 50b5a4 18525->18527 18526 50b5e6 18529 50b62f 18526->18529 18875 50b16f 18526->18875 18530 504beb ___free_lconv_mon 14 API calls 18527->18530 18528 50b5ba 18528->18526 18531 504beb ___free_lconv_mon 14 API calls 18528->18531 18533 504beb ___free_lconv_mon 14 API calls 18529->18533 18530->18516 18531->18526 18533->18516 18567 505419 18534->18567 18537 505661 TlsGetValue 18538 50564f 18538->18490 18540 505419 _unexpected 5 API calls 18539->18540 18541 505685 18540->18541 18542 5056a3 TlsSetValue 18541->18542 18543 5049e6 18541->18543 18543->18488 18543->18489 18549 505128 __Getctype 18544->18549 18545 505168 18585 501137 18545->18585 18546 505153 HeapAlloc 18547 5049f6 18546->18547 18546->18549 18547->18496 18547->18497 18549->18545 18549->18546 18582 501c0b 18549->18582 18622 5045c2 18551->18622 18724 504cf3 18556->18724 18559 4fca0b 18561 4fca15 IsProcessorFeaturePresent 18559->18561 18566 4fca34 18559->18566 18562 4fca21 18561->18562 18754 4fc783 18562->18754 18563 502110 __FrameHandler3::FrameUnwindToState 23 API calls 18564 4fca3e 18563->18564 18566->18563 18568 505447 18567->18568 18572 505443 18567->18572 18568->18572 18574 50534e 18568->18574 18571 505461 GetProcAddress 18571->18572 18573 505471 _unexpected 18571->18573 18572->18537 18572->18538 18573->18572 18580 50535f ___vcrt_FlsFree 18574->18580 18575 5053f5 18575->18571 18575->18572 18576 50537d LoadLibraryExW 18577 505398 GetLastError 18576->18577 18578 5053fc 18576->18578 18577->18580 18578->18575 18579 50540e FreeLibrary 18578->18579 18579->18575 18580->18575 18580->18576 18581 5053cb LoadLibraryExW 18580->18581 18581->18578 18581->18580 18588 501c38 18582->18588 18599 504a51 GetLastError 18585->18599 18587 50113c 18587->18547 18589 501c44 __FrameHandler3::FrameUnwindToState 18588->18589 18594 4ff268 EnterCriticalSection 18589->18594 18591 501c4f 18595 501c8b 18591->18595 18594->18591 18598 4ff2b0 LeaveCriticalSection 18595->18598 18597 501c16 18597->18549 18598->18597 18600 504a6d 18599->18600 18601 504a67 18599->18601 18603 505669 __Getctype 6 API calls 18600->18603 18605 504a71 SetLastError 18600->18605 18602 50562a __Getctype 6 API calls 18601->18602 18602->18600 18604 504a89 18603->18604 18604->18605 18607 50511b __Getctype 12 API calls 18604->18607 18605->18587 18608 504a9e 18607->18608 18609 504aa6 18608->18609 18610 504ab7 18608->18610 18611 505669 __Getctype 6 API calls 18609->18611 18612 505669 __Getctype 6 API calls 18610->18612 18613 504ab4 18611->18613 18614 504ac3 18612->18614 18618 504beb ___free_lconv_mon 12 API calls 18613->18618 18615 504ac7 18614->18615 18616 504ade 18614->18616 18617 505669 __Getctype 6 API calls 18615->18617 18619 50472e __Getctype 12 API calls 18616->18619 18617->18613 18618->18605 18620 504ae9 18619->18620 18621 504beb ___free_lconv_mon 12 API calls 18620->18621 18621->18605 18623 5045ce __FrameHandler3::FrameUnwindToState 18622->18623 18636 4ff268 EnterCriticalSection 18623->18636 18625 5045d8 18637 504608 18625->18637 18628 5046d4 18629 5046e0 __FrameHandler3::FrameUnwindToState 18628->18629 18641 4ff268 EnterCriticalSection 18629->18641 18631 5046ea 18642 5048b5 18631->18642 18633 504702 18646 504722 18633->18646 18636->18625 18640 4ff2b0 LeaveCriticalSection 18637->18640 18639 5045f6 18639->18628 18640->18639 18641->18631 18643 5048c4 __Getctype 18642->18643 18645 5048eb __Getctype 18642->18645 18643->18645 18649 50d088 18643->18649 18645->18633 18723 4ff2b0 LeaveCriticalSection 18646->18723 18648 504710 18648->18509 18650 50d09e 18649->18650 18670 50d108 18649->18670 18653 50d0d1 18650->18653 18658 504beb ___free_lconv_mon 14 API calls 18650->18658 18650->18670 18652 504beb ___free_lconv_mon 14 API calls 18654 50d12a 18652->18654 18655 50d0f3 18653->18655 18663 504beb ___free_lconv_mon 14 API calls 18653->18663 18656 504beb ___free_lconv_mon 14 API calls 18654->18656 18657 504beb ___free_lconv_mon 14 API calls 18655->18657 18659 50d13d 18656->18659 18660 50d0fd 18657->18660 18662 50d0c6 18658->18662 18664 504beb ___free_lconv_mon 14 API calls 18659->18664 18665 504beb ___free_lconv_mon 14 API calls 18660->18665 18661 50d1c4 18666 504beb ___free_lconv_mon 14 API calls 18661->18666 18677 50c33e 18662->18677 18668 50d0e8 18663->18668 18669 50d14b 18664->18669 18665->18670 18671 50d1ca 18666->18671 18705 50c7f2 18668->18705 18674 504beb ___free_lconv_mon 14 API calls 18669->18674 18670->18652 18675 50d156 18670->18675 18671->18645 18672 50d164 18672->18661 18676 504beb 14 API calls ___free_lconv_mon 18672->18676 18674->18675 18717 50d1f9 18675->18717 18676->18672 18678 50c438 18677->18678 18679 50c34f 18677->18679 18678->18653 18680 50c360 18679->18680 18682 504beb ___free_lconv_mon 14 API calls 18679->18682 18681 50c372 18680->18681 18683 504beb ___free_lconv_mon 14 API calls 18680->18683 18684 50c384 18681->18684 18685 504beb ___free_lconv_mon 14 API calls 18681->18685 18682->18680 18683->18681 18686 50c396 18684->18686 18687 504beb ___free_lconv_mon 14 API calls 18684->18687 18685->18684 18688 50c3a8 18686->18688 18690 504beb ___free_lconv_mon 14 API calls 18686->18690 18687->18686 18689 50c3ba 18688->18689 18691 504beb ___free_lconv_mon 14 API calls 18688->18691 18692 50c3cc 18689->18692 18693 504beb ___free_lconv_mon 14 API calls 18689->18693 18690->18688 18691->18689 18694 50c3de 18692->18694 18695 504beb ___free_lconv_mon 14 API calls 18692->18695 18693->18692 18696 50c3f0 18694->18696 18698 504beb ___free_lconv_mon 14 API calls 18694->18698 18695->18694 18697 50c402 18696->18697 18699 504beb ___free_lconv_mon 14 API calls 18696->18699 18700 50c414 18697->18700 18701 504beb ___free_lconv_mon 14 API calls 18697->18701 18698->18696 18699->18697 18702 50c426 18700->18702 18703 504beb ___free_lconv_mon 14 API calls 18700->18703 18701->18700 18702->18678 18704 504beb ___free_lconv_mon 14 API calls 18702->18704 18703->18702 18704->18678 18706 50c857 18705->18706 18707 50c7ff 18705->18707 18706->18655 18708 50c80f 18707->18708 18709 504beb ___free_lconv_mon 14 API calls 18707->18709 18710 50c821 18708->18710 18712 504beb ___free_lconv_mon 14 API calls 18708->18712 18709->18708 18711 50c833 18710->18711 18713 504beb ___free_lconv_mon 14 API calls 18710->18713 18714 50c845 18711->18714 18715 504beb ___free_lconv_mon 14 API calls 18711->18715 18712->18710 18713->18711 18714->18706 18716 504beb ___free_lconv_mon 14 API calls 18714->18716 18715->18714 18716->18706 18718 50d206 18717->18718 18719 50d225 18717->18719 18718->18719 18720 50cd0d __Getctype 14 API calls 18718->18720 18719->18672 18721 50d21f 18720->18721 18722 504beb ___free_lconv_mon 14 API calls 18721->18722 18722->18719 18723->18648 18760 504c25 18724->18760 18727 504d38 18728 504d44 __FrameHandler3::FrameUnwindToState 18727->18728 18729 504a51 __strnicoll 14 API calls 18728->18729 18733 504d71 __FrameHandler3::FrameUnwindToState 18728->18733 18736 504d6b __FrameHandler3::FrameUnwindToState 18728->18736 18729->18736 18730 504db8 18731 501137 __strnicoll 14 API calls 18730->18731 18732 504dbd 18731->18732 18771 4fc97f 18732->18771 18735 504de4 18733->18735 18774 4ff268 EnterCriticalSection 18733->18774 18739 504e26 18735->18739 18740 504f17 18735->18740 18750 504e55 18735->18750 18736->18730 18736->18733 18753 504da2 18736->18753 18739->18750 18775 504900 GetLastError 18739->18775 18741 504f22 18740->18741 18806 4ff2b0 LeaveCriticalSection 18740->18806 18744 502110 __FrameHandler3::FrameUnwindToState 23 API calls 18741->18744 18746 504f2a 18744->18746 18747 504900 __Getctype 41 API calls 18751 504eaa 18747->18751 18749 504900 __Getctype 41 API calls 18749->18750 18802 504ec4 18750->18802 18752 504900 __Getctype 41 API calls 18751->18752 18751->18753 18752->18753 18753->18559 18755 4fc79f __fread_nolock __FrameHandler3::FrameUnwindToState 18754->18755 18756 4fc7cb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18755->18756 18759 4fc89c __FrameHandler3::FrameUnwindToState 18756->18759 18758 4fc8ba 18758->18566 18831 4f8107 18759->18831 18761 504c31 __FrameHandler3::FrameUnwindToState 18760->18761 18766 4ff268 EnterCriticalSection 18761->18766 18763 504c3f 18767 504c7d 18763->18767 18766->18763 18770 4ff2b0 LeaveCriticalSection 18767->18770 18769 4fca00 18769->18559 18769->18727 18770->18769 18807 4fc8cb 18771->18807 18774->18735 18776 50491c 18775->18776 18777 504916 18775->18777 18779 505669 __Getctype 6 API calls 18776->18779 18781 504920 SetLastError 18776->18781 18778 50562a __Getctype 6 API calls 18777->18778 18778->18776 18780 504938 18779->18780 18780->18781 18783 50511b __Getctype 14 API calls 18780->18783 18784 5049b0 18781->18784 18785 5049b5 18781->18785 18786 50494d 18783->18786 18784->18749 18789 4fc9fb __FrameHandler3::FrameUnwindToState 39 API calls 18785->18789 18787 504955 18786->18787 18788 504966 18786->18788 18790 505669 __Getctype 6 API calls 18787->18790 18791 505669 __Getctype 6 API calls 18788->18791 18792 5049ba 18789->18792 18799 504963 18790->18799 18793 504972 18791->18793 18794 504976 18793->18794 18795 50498d 18793->18795 18796 505669 __Getctype 6 API calls 18794->18796 18798 50472e __Getctype 14 API calls 18795->18798 18796->18799 18797 504beb ___free_lconv_mon 14 API calls 18797->18781 18800 504998 18798->18800 18799->18797 18801 504beb ___free_lconv_mon 14 API calls 18800->18801 18801->18781 18803 504eca 18802->18803 18805 504e9b 18802->18805 18830 4ff2b0 LeaveCriticalSection 18803->18830 18805->18747 18805->18751 18805->18753 18806->18741 18808 4fc8dd _Fputc 18807->18808 18813 4fc902 18808->18813 18810 4fc8f5 18824 4fc6bb 18810->18824 18814 4fc919 18813->18814 18815 4fc912 18813->18815 18817 4fc6f7 __strnicoll GetLastError SetLastError 18814->18817 18820 4fc927 18814->18820 18816 4fc720 _Fputc 16 API calls 18815->18816 18816->18814 18818 4fc94e 18817->18818 18819 4fc9ac _Deallocate 11 API calls 18818->18819 18818->18820 18821 4fc97e 18819->18821 18820->18810 18822 4fc8cb __strnicoll 41 API calls 18821->18822 18823 4fc98b 18822->18823 18823->18810 18825 4fc6c7 18824->18825 18826 4fc6de 18825->18826 18827 4fc766 _Fputc 41 API calls 18825->18827 18828 4fc766 _Fputc 41 API calls 18826->18828 18829 4fc6f1 18826->18829 18827->18826 18828->18829 18829->18753 18830->18805 18832 4f810f 18831->18832 18833 4f8110 IsProcessorFeaturePresent 18831->18833 18832->18758 18835 4f89f2 18833->18835 18838 4f89b5 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 18835->18838 18837 4f8ad5 18837->18758 18838->18837 18840 50b65e __FrameHandler3::FrameUnwindToState 18839->18840 18843 50b678 18840->18843 18883 4ff268 EnterCriticalSection 18840->18883 18842 50b6b4 18884 50b6d1 18842->18884 18844 50b527 18843->18844 18846 4fc9fb __FrameHandler3::FrameUnwindToState 41 API calls 18843->18846 18850 50b27d 18844->18850 18847 50b6f1 18846->18847 18848 50b688 18848->18842 18849 504beb ___free_lconv_mon 14 API calls 18848->18849 18849->18842 18888 50114a 18850->18888 18853 50b2b0 18855 50b2b5 GetACP 18853->18855 18856 50b2c7 18853->18856 18854 50b29e GetOEMCP 18854->18856 18855->18856 18856->18516 18857 505bdf 18856->18857 18858 505c1d 18857->18858 18862 505bed __Getctype 18857->18862 18859 501137 __strnicoll 14 API calls 18858->18859 18861 505c1b 18859->18861 18860 505c08 RtlAllocateHeap 18860->18861 18860->18862 18861->18519 18861->18520 18862->18858 18862->18860 18863 501c0b codecvt 2 API calls 18862->18863 18863->18862 18865 50b27d 43 API calls 18864->18865 18866 50b76d 18865->18866 18868 50b7aa IsValidCodePage 18866->18868 18872 50b7e6 __fread_nolock 18866->18872 18867 4f8107 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18869 50b594 18867->18869 18870 50b7bc 18868->18870 18868->18872 18869->18524 18869->18528 18871 50b7eb GetCPInfo 18870->18871 18874 50b7c5 __fread_nolock 18870->18874 18871->18872 18871->18874 18872->18867 18930 50b351 18874->18930 18876 50b17b __FrameHandler3::FrameUnwindToState 18875->18876 19011 4ff268 EnterCriticalSection 18876->19011 18878 50b185 19012 50b1bc 18878->19012 18883->18848 18887 4ff2b0 LeaveCriticalSection 18884->18887 18886 50b6d8 18886->18843 18887->18886 18889 501161 18888->18889 18890 501168 18888->18890 18889->18853 18889->18854 18890->18889 18891 504900 __Getctype 41 API calls 18890->18891 18892 501189 18891->18892 18896 50505f 18892->18896 18897 505072 18896->18897 18898 50119f 18896->18898 18897->18898 18904 50d2d4 18897->18904 18900 5050bd 18898->18900 18901 5050d0 18900->18901 18902 5050e5 18900->18902 18901->18902 18925 50b73a 18901->18925 18902->18889 18905 50d2e0 __FrameHandler3::FrameUnwindToState 18904->18905 18906 504900 __Getctype 41 API calls 18905->18906 18907 50d2e9 18906->18907 18908 50d32f 18907->18908 18917 4ff268 EnterCriticalSection 18907->18917 18908->18898 18910 50d307 18918 50d355 18910->18918 18915 4fc9fb __FrameHandler3::FrameUnwindToState 41 API calls 18916 50d354 18915->18916 18917->18910 18919 50d363 __Getctype 18918->18919 18920 50d318 18918->18920 18919->18920 18921 50d088 __Getctype 14 API calls 18919->18921 18922 50d334 18920->18922 18921->18920 18923 4ff2b0 std::_Lockit::~_Lockit LeaveCriticalSection 18922->18923 18924 50d32b 18923->18924 18924->18908 18924->18915 18926 504900 __Getctype 41 API calls 18925->18926 18927 50b73f 18926->18927 18928 50b652 __strnicoll 41 API calls 18927->18928 18929 50b74a 18928->18929 18929->18902 18931 50b379 GetCPInfo 18930->18931 18932 50b442 18930->18932 18931->18932 18938 50b391 18931->18938 18933 4f8107 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18932->18933 18936 50b4fb 18933->18936 18936->18872 18941 507740 18938->18941 18940 507a37 46 API calls 18940->18932 18942 50114a __strnicoll 41 API calls 18941->18942 18943 507760 18942->18943 18961 50a722 18943->18961 18945 507824 18947 4f8107 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18945->18947 18946 50781c 18964 4f7bc6 18946->18964 18949 507847 18947->18949 18948 50778d 18948->18945 18948->18946 18951 505bdf __fread_nolock 15 API calls 18948->18951 18952 5077b2 __fread_nolock __alloca_probe_16 18948->18952 18956 507a37 18949->18956 18951->18952 18952->18946 18953 50a722 __strnicoll MultiByteToWideChar 18952->18953 18954 5077fd 18953->18954 18954->18946 18955 507808 GetStringTypeW 18954->18955 18955->18946 18957 50114a __strnicoll 41 API calls 18956->18957 18958 507a4a 18957->18958 18971 507849 18958->18971 18962 50a733 MultiByteToWideChar 18961->18962 18962->18948 18965 4f7bd0 18964->18965 18967 4f7be1 18964->18967 18965->18967 18968 4fc9e0 18965->18968 18967->18945 18969 504beb ___free_lconv_mon 14 API calls 18968->18969 18970 4fc9f8 18969->18970 18970->18967 18972 507864 __strnicoll 18971->18972 18973 50a722 __strnicoll MultiByteToWideChar 18972->18973 18977 5078aa 18973->18977 18974 507a22 18975 4f8107 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18974->18975 18976 507a35 18975->18976 18976->18940 18977->18974 18978 505bdf __fread_nolock 15 API calls 18977->18978 18980 5078d0 __alloca_probe_16 18977->18980 18988 507956 18977->18988 18978->18980 18979 4f7bc6 __freea 14 API calls 18979->18974 18981 50a722 __strnicoll MultiByteToWideChar 18980->18981 18980->18988 18982 507915 18981->18982 18982->18988 18999 5057e8 18982->18999 18985 507947 18985->18988 18991 5057e8 std::_Locinfo::_Locinfo_ctor 7 API calls 18985->18991 18986 50797f 18987 507a0a 18986->18987 18989 505bdf __fread_nolock 15 API calls 18986->18989 18992 507991 __alloca_probe_16 18986->18992 18990 4f7bc6 __freea 14 API calls 18987->18990 18988->18979 18989->18992 18990->18988 18991->18988 18992->18987 18993 5057e8 std::_Locinfo::_Locinfo_ctor 7 API calls 18992->18993 18994 5079d4 18993->18994 18994->18987 19008 50a79e 18994->19008 18996 5079ee 18996->18987 18997 5079f7 18996->18997 18998 4f7bc6 __freea 14 API calls 18997->18998 18998->18988 19000 50531a std::_Lockit::_Lockit 5 API calls 18999->19000 19001 5057f3 19000->19001 19002 505820 19001->19002 19003 5057f9 LCMapStringEx 19001->19003 19004 505845 __strnicoll 5 API calls 19002->19004 19007 505840 19003->19007 19006 505839 LCMapStringW 19004->19006 19006->19007 19007->18985 19007->18986 19007->18988 19009 50a7b5 WideCharToMultiByte 19008->19009 19009->18996 19011->18878 19022 50065d 19012->19022 19014 50b1de 19015 50065d __fread_nolock 41 API calls 19014->19015 19016 50b1fd 19015->19016 19017 50b192 19016->19017 19018 504beb ___free_lconv_mon 14 API calls 19016->19018 19019 50b1b0 19017->19019 19018->19017 19036 4ff2b0 LeaveCriticalSection 19019->19036 19021 50b19e 19021->18529 19023 50066e 19022->19023 19031 50066a ctype 19022->19031 19024 500675 19023->19024 19028 500688 __fread_nolock 19023->19028 19025 501137 __strnicoll 14 API calls 19024->19025 19026 50067a 19025->19026 19027 4fc97f __strnicoll 41 API calls 19026->19027 19027->19031 19029 5006b6 19028->19029 19030 5006bf 19028->19030 19028->19031 19032 501137 __strnicoll 14 API calls 19029->19032 19030->19031 19034 501137 __strnicoll 14 API calls 19030->19034 19031->19014 19033 5006bb 19032->19033 19035 4fc97f __strnicoll 41 API calls 19033->19035 19034->19033 19035->19031 19036->19021 19038 5044b8 19037->19038 19039 5044c6 19037->19039 19038->19039 19043 5044de 19038->19043 19040 501137 __strnicoll 14 API calls 19039->19040 19045 5044ce 19040->19045 19041 4fc97f __strnicoll 41 API calls 19042 5044d8 19041->19042 19042->18474 19043->19042 19044 501137 __strnicoll 14 API calls 19043->19044 19044->19045 19045->19041 19047 5025b3 19046->19047 19048 5025e2 19046->19048 19047->18475 19049 5025f9 19048->19049 19051 504beb ___free_lconv_mon 14 API calls 19048->19051 19050 504beb ___free_lconv_mon 14 API calls 19049->19050 19050->19047 19051->19048 19053 4fc9b8 19052->19053 19054 4fc783 __FrameHandler3::FrameUnwindToState 8 API calls 19053->19054 19055 4fc9cd GetCurrentProcess TerminateProcess 19054->19055 19055->18481 19056->18282 19057 515653 19056->19057 19074 4f217e 19057->19074 19062 51568a VirtualAllocEx 19090 4f1d8b 19062->19090 19075 4f219b _strlen 19074->19075 19114 4f1653 19075->19114 19077 4f21a8 19078 4f7dbe 19077->19078 19081 4f7dc3 19078->19081 19080 4f7ddd 19080->19062 19099 51505a 19080->19099 19081->19080 19082 501c0b codecvt 2 API calls 19081->19082 19083 4f7ddf 19081->19083 19167 4ff2de 19081->19167 19082->19081 19084 4f4246 Concurrency::cancel_current_task 19083->19084 19085 4f7de9 codecvt 19083->19085 19086 4f9362 _AnonymousOriginator RaiseException 19084->19086 19087 4f9362 _AnonymousOriginator RaiseException 19085->19087 19088 4f4262 19086->19088 19089 4f8790 19087->19089 19174 4f1da2 19090->19174 19092 4f1d9a 19093 4f48a3 19092->19093 19237 4f3983 19093->19237 19105 51508a 19099->19105 19109 515154 19099->19109 19102 4f8107 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19103 51516e 19102->19103 19103->19062 19104 4f217e 43 API calls std::_Throw_Cpp_error 19104->19105 19105->19104 19106 4fd44e 44 API calls 19105->19106 19107 4f4a6d 43 API calls 19105->19107 19108 4f4387 41 API calls std::_Throw_Cpp_error 19105->19108 19105->19109 19106->19105 19107->19105 19108->19105 19781 4f4361 19109->19781 19115 4f16be 19114->19115 19118 4f1664 std::_Throw_Cpp_error 19114->19118 19129 4f451d 19115->19129 19120 4f166b std::_Throw_Cpp_error 19118->19120 19121 4f1578 19118->19121 19120->19077 19122 4f158b 19121->19122 19123 4f1583 19121->19123 19125 4f1597 19122->19125 19127 4f7dbe codecvt 16 API calls 19122->19127 19132 4f159a 19123->19132 19125->19120 19128 4f1595 19127->19128 19128->19120 19148 4f4eb5 19129->19148 19133 4f15a9 19132->19133 19134 4f4246 Concurrency::cancel_current_task 19132->19134 19135 4f7dbe codecvt 16 API calls 19133->19135 19145 4f9362 19134->19145 19136 4f15af 19135->19136 19136->19134 19137 4f1589 19136->19137 19139 4fc98f 19136->19139 19137->19120 19141 4fc8cb __strnicoll 41 API calls 19139->19141 19140 4f4262 19142 4fc99e 19141->19142 19143 4fc9ac _Deallocate 11 API calls 19142->19143 19144 4fc9ab 19143->19144 19146 4f93a9 RaiseException 19145->19146 19147 4f937c 19145->19147 19146->19140 19147->19146 19153 4f4e4c 19148->19153 19151 4f9362 _AnonymousOriginator RaiseException 19152 4f4ed4 19151->19152 19156 4f25eb 19153->19156 19159 4f92e0 19156->19159 19160 4f92ed 19159->19160 19166 4f2617 19159->19166 19161 4ff2de ___std_exception_copy 15 API calls 19160->19161 19160->19166 19162 4f930a 19161->19162 19163 4f931a 19162->19163 19164 5044aa ___std_exception_copy 41 API calls 19162->19164 19165 4fc9e0 ___std_exception_copy 14 API calls 19163->19165 19164->19163 19165->19166 19166->19151 19173 505bdf __Getctype 19167->19173 19168 505c1d 19169 501137 __strnicoll 14 API calls 19168->19169 19171 505c1b 19169->19171 19170 505c08 RtlAllocateHeap 19170->19171 19170->19173 19171->19081 19172 501c0b codecvt 2 API calls 19172->19173 19173->19168 19173->19170 19173->19172 19179 4f1b10 19174->19179 19176 4f1dbb 19190 4f38be 19176->19190 19178 4f1dd0 19178->19092 19180 4f1b49 19179->19180 19181 4f1b19 19179->19181 19182 4f7dbe codecvt 16 API calls 19180->19182 19181->19180 19183 4f1b1e 19181->19183 19184 4f1b53 19182->19184 19185 4f7dbe codecvt 16 API calls 19183->19185 19186 4f1b64 19184->19186 19195 4f136c 19184->19195 19188 4f1b29 19185->19188 19186->19176 19188->19176 19192 4f38c6 19190->19192 19191 4f38d4 19191->19178 19192->19191 19229 4f4280 19192->19229 19196 4f137d 19195->19196 19201 4f2849 19196->19201 19198 4f139a 19204 4f1e60 19198->19204 19213 4f3851 19201->19213 19203 4f2857 19203->19198 19223 4f4533 19204->19223 19216 4f1e1a InitOnceBeginInitialize 19213->19216 19215 4f3861 19215->19203 19217 4f1e55 19216->19217 19218 4f1e34 19216->19218 19220 4fc9fb __FrameHandler3::FrameUnwindToState 41 API calls 19217->19220 19219 4f1e52 19218->19219 19221 4f386a 50 API calls 19218->19221 19219->19215 19220->19219 19222 4f1e3e InitOnceComplete 19221->19222 19222->19219 19225 4f2bcf 19223->19225 19226 4f2bec 19225->19226 19227 4f2bda 19225->19227 19228 4f15c5 43 API calls 19227->19228 19228->19226 19234 4f269c 19229->19234 19232 4f9362 _AnonymousOriginator RaiseException 19233 4f429f 19232->19233 19235 4f25eb std::exception::exception 42 API calls 19234->19235 19236 4f26a9 19235->19236 19236->19232 19238 4f398b 19237->19238 19239 4f4280 43 API calls 19238->19239 19240 4f39a4 19239->19240 19241 4f39b7 19240->19241 19245 4f4476 19240->19245 19254 4f3c44 19241->19254 19246 4f4482 __EH_prolog3_catch 19245->19246 19247 4f449b 19246->19247 19259 4f3093 19246->19259 19249 4f3093 53 API calls 19247->19249 19250 4f44be 19247->19250 19249->19250 19251 4f44c6 codecvt 19250->19251 19266 4f3dd9 19250->19266 19251->19241 19340 4f26db 19254->19340 19257 4f9362 _AnonymousOriginator RaiseException 19258 4f3c65 19257->19258 19270 4f4999 19259->19270 19261 4f30b6 19281 4f5a29 19261->19281 19265 4f30a2 19265->19261 19276 4f5bc4 19265->19276 19267 4f3de1 19266->19267 19326 4f4be1 19267->19326 19284 4f5a18 19270->19284 19272 4f49a2 19274 4f49b6 19272->19274 19287 4f5d95 19272->19287 19274->19265 19318 4f5b73 19276->19318 19280 4f5be4 19280->19265 19282 4f5a35 ReleaseSRWLockExclusive 19281->19282 19283 4f30bb 19281->19283 19282->19283 19283->19247 19293 4f5a47 GetCurrentThreadId 19284->19293 19288 4f5dab std::_Throw_Cpp_error 19287->19288 19308 4f5cd2 19288->19308 19291 4f9362 _AnonymousOriginator RaiseException 19292 4f5dc9 19291->19292 19294 4f5a71 19293->19294 19295 4f5a90 19293->19295 19296 4f5a76 AcquireSRWLockExclusive 19294->19296 19304 4f5a86 19294->19304 19297 4f5a99 19295->19297 19298 4f5ab0 19295->19298 19296->19304 19299 4f5aa4 AcquireSRWLockExclusive 19297->19299 19297->19304 19300 4f5b0f 19298->19300 19307 4f5ac8 19298->19307 19299->19304 19302 4f5b16 TryAcquireSRWLockExclusive 19300->19302 19300->19304 19301 4f8107 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19303 4f5a25 19301->19303 19302->19304 19303->19272 19304->19301 19305 4f78e5 GetSystemTimePreciseAsFileTime GetSystemTimeAsFileTime 19305->19307 19306 4f5aff TryAcquireSRWLockExclusive 19306->19304 19306->19307 19307->19304 19307->19305 19307->19306 19309 4f5cde __EH_prolog3_GS 19308->19309 19310 4f217e std::_Throw_Cpp_error 43 API calls 19309->19310 19311 4f5cf2 19310->19311 19312 4f23dc std::_Throw_Cpp_error 43 API calls 19311->19312 19313 4f5d07 19312->19313 19314 4f4387 std::_Throw_Cpp_error 41 API calls 19313->19314 19315 4f5d0f 19314->19315 19316 4f8129 std::_Throw_Cpp_error 5 API calls 19315->19316 19317 4f5d1c 19316->19317 19317->19291 19325 4f5b8e SleepConditionVariableSRW 19318->19325 19320 4f5b80 19321 4f5b84 19320->19321 19322 4fc9fb __FrameHandler3::FrameUnwindToState 41 API calls 19320->19322 19324 4f5bea GetCurrentThreadId 19321->19324 19323 4f5b8d 19322->19323 19324->19280 19325->19320 19329 4f591f 19326->19329 19330 4f593a __InternalCxxFrameHandler 19329->19330 19335 4f5950 19329->19335 19333 4f9362 _AnonymousOriginator RaiseException 19330->19333 19331 4f59c1 RaiseException 19332 4f8107 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19331->19332 19334 4f4beb 19332->19334 19333->19335 19335->19331 19336 4f59e3 19335->19336 19339 4f59a1 __alloca_probe_16 19335->19339 19337 4fc9fb __FrameHandler3::FrameUnwindToState 41 API calls 19336->19337 19338 4f59e8 19337->19338 19339->19331 19341 4f25eb std::exception::exception 42 API calls 19340->19341 19342 4f26e7 19341->19342 19342->19257 19782 4f4369 19781->19782 19783 4f4379 19781->19783 19784 4f1800 _Deallocate 41 API calls 19782->19784 19783->19102 19784->19783 19786 501f70 19785->19786 19787 501f5e 19785->19787 19797 501dda 19786->19797 19812 501ffc GetModuleHandleW 19787->19812 19792 4f8438 19792->18312 19796 501fc2 19798 501de6 __FrameHandler3::FrameUnwindToState 19797->19798 19820 4ff268 EnterCriticalSection 19798->19820 19800 501df0 19821 501e46 19800->19821 19802 501dfd 19825 501e1b 19802->19825 19805 501fc8 19850 50203f 19805->19850 19808 501fe6 19810 502061 __FrameHandler3::FrameUnwindToState 3 API calls 19808->19810 19809 501fd6 GetCurrentProcess TerminateProcess 19809->19808 19811 501fee ExitProcess 19810->19811 19813 501f63 19812->19813 19813->19786 19814 502061 GetModuleHandleExW 19813->19814 19815 5020a0 GetProcAddress 19814->19815 19816 5020c1 19814->19816 19815->19816 19817 5020b4 19815->19817 19818 501f6f 19816->19818 19819 5020c7 FreeLibrary 19816->19819 19817->19816 19818->19786 19819->19818 19820->19800 19822 501e52 __FrameHandler3::FrameUnwindToState 19821->19822 19824 501eb9 __FrameHandler3::FrameUnwindToState 19822->19824 19828 5029d4 19822->19828 19824->19802 19849 4ff2b0 LeaveCriticalSection 19825->19849 19827 501e09 19827->19792 19827->19805 19829 5029e0 __EH_prolog3 19828->19829 19832 50272c 19829->19832 19831 502a07 codecvt 19831->19824 19833 502738 __FrameHandler3::FrameUnwindToState 19832->19833 19840 4ff268 EnterCriticalSection 19833->19840 19835 502746 19841 5028e4 19835->19841 19840->19835 19842 502903 19841->19842 19843 502753 19841->19843 19842->19843 19844 504beb ___free_lconv_mon 14 API calls 19842->19844 19845 50277b 19843->19845 19844->19843 19848 4ff2b0 LeaveCriticalSection 19845->19848 19847 502764 19847->19831 19848->19847 19849->19827 19855 506b75 GetPEB 19850->19855 19853 502049 GetPEB 19854 501fd2 19853->19854 19854->19808 19854->19809 19856 502044 19855->19856 19857 506b8f 19855->19857 19856->19853 19856->19854 19859 50549c 19857->19859 19860 505419 _unexpected 5 API calls 19859->19860 19861 5054b8 19860->19861 19861->19856 19863 505419 _unexpected 5 API calls 19862->19863 19864 505742 19863->19864 19865 505760 InitializeCriticalSectionAndSpinCount 19864->19865 19866 50574b 19864->19866 19865->19866 19866->18292 19868 4ff2ab 19867->19868 19869 4ff28c 19867->19869 19868->18295 19870 4ff296 DeleteCriticalSection 19869->19870 19870->19868 19870->19870 19872 502b86 19871->19872 19873 502b98 ___scrt_uninitialize_crt 19871->19873 19874 502b94 19872->19874 19876 5001bc 19872->19876 19873->18306 19874->18306 19879 500049 19876->19879 19882 4fff3d 19879->19882 19883 4fff49 __FrameHandler3::FrameUnwindToState 19882->19883 19890 4ff268 EnterCriticalSection 19883->19890 19885 4fff53 ___scrt_uninitialize_crt 19886 4fffbf 19885->19886 19891 4ffeb1 19885->19891 19899 4fffdd 19886->19899 19890->19885 19892 4ffebd __FrameHandler3::FrameUnwindToState 19891->19892 19902 4fd5f7 EnterCriticalSection 19892->19902 19894 4fff00 19916 4fff31 19894->19916 19895 4ffec7 ___scrt_uninitialize_crt 19895->19894 19903 500157 19895->19903 20020 4ff2b0 LeaveCriticalSection 19899->20020 19901 4fffcb 19901->19874 19902->19895 19904 50016c _Fputc 19903->19904 19905 500173 19904->19905 19906 50017e 19904->19906 19907 500049 ___scrt_uninitialize_crt 70 API calls 19905->19907 19919 5000ee 19906->19919 19909 500179 19907->19909 19911 4fc6bb _Fputc 41 API calls 19909->19911 19913 5001b6 19911->19913 19913->19894 19914 50019f 19932 507d95 19914->19932 20019 4fd60b LeaveCriticalSection 19916->20019 19918 4fff1f 19918->19885 19920 500107 19919->19920 19924 50012e 19919->19924 19921 506a14 __fread_nolock 41 API calls 19920->19921 19920->19924 19922 500123 19921->19922 19943 5085c0 19922->19943 19924->19909 19925 506a14 19924->19925 19926 506a20 19925->19926 19927 506a35 19925->19927 19928 501137 __strnicoll 14 API calls 19926->19928 19927->19914 19929 506a25 19928->19929 19930 4fc97f __strnicoll 41 API calls 19929->19930 19931 506a30 19930->19931 19931->19914 19933 507db3 19932->19933 19934 507da6 19932->19934 19936 507dfc 19933->19936 19938 507dda 19933->19938 19935 501137 __strnicoll 14 API calls 19934->19935 19940 507dab 19935->19940 19937 501137 __strnicoll 14 API calls 19936->19937 19939 507e01 19937->19939 19986 507cf3 19938->19986 19942 4fc97f __strnicoll 41 API calls 19939->19942 19940->19909 19942->19940 19946 5085cc __FrameHandler3::FrameUnwindToState 19943->19946 19944 508690 19945 4fc902 __strnicoll 41 API calls 19944->19945 19953 5085d4 19945->19953 19946->19944 19947 508621 19946->19947 19946->19953 19954 50c1e7 EnterCriticalSection 19947->19954 19949 508627 19950 508644 19949->19950 19955 5086c8 19949->19955 19983 508688 19950->19983 19953->19924 19954->19949 19956 5086ed 19955->19956 19981 508710 __fread_nolock 19955->19981 19957 5086f1 19956->19957 19959 50874f 19956->19959 19958 4fc902 __strnicoll 41 API calls 19957->19958 19958->19981 19960 508766 19959->19960 19962 509c4e ___scrt_uninitialize_crt 43 API calls 19959->19962 19961 50824c ___scrt_uninitialize_crt 42 API calls 19960->19961 19963 508770 19961->19963 19962->19960 19964 5087b6 19963->19964 19965 508776 19963->19965 19968 508819 WriteFile 19964->19968 19969 5087ca 19964->19969 19966 5087a0 19965->19966 19967 50877d 19965->19967 19970 507e12 ___scrt_uninitialize_crt 47 API calls 19966->19970 19975 5081e4 ___scrt_uninitialize_crt 6 API calls 19967->19975 19967->19981 19971 5087b1 19968->19971 19972 50883b GetLastError 19968->19972 19973 5087d2 19969->19973 19974 508807 19969->19974 19970->19971 19971->19981 19972->19971 19977 5087f5 19973->19977 19978 5087d7 19973->19978 19976 5082ca ___scrt_uninitialize_crt 7 API calls 19974->19976 19975->19981 19976->19981 19980 50848e ___scrt_uninitialize_crt 8 API calls 19977->19980 19979 5087e0 19978->19979 19978->19981 19982 5083a5 ___scrt_uninitialize_crt 7 API calls 19979->19982 19980->19971 19981->19950 19982->19981 19984 50c20a ___scrt_uninitialize_crt LeaveCriticalSection 19983->19984 19985 50868e 19984->19985 19985->19953 19987 507cff __FrameHandler3::FrameUnwindToState 19986->19987 19999 50c1e7 EnterCriticalSection 19987->19999 19989 507d0e 19990 507d53 19989->19990 20000 50c2be 19989->20000 19992 501137 __strnicoll 14 API calls 19990->19992 19994 507d5a 19992->19994 19993 507d3a FlushFileBuffers 19993->19994 19995 507d46 GetLastError 19993->19995 20016 507d89 19994->20016 20013 501124 19995->20013 19999->19989 20001 50c2e0 20000->20001 20002 50c2cb 20000->20002 20004 501124 __dosmaperr 14 API calls 20001->20004 20006 50c305 20001->20006 20003 501124 __dosmaperr 14 API calls 20002->20003 20005 50c2d0 20003->20005 20007 50c310 20004->20007 20008 501137 __strnicoll 14 API calls 20005->20008 20006->19993 20009 501137 __strnicoll 14 API calls 20007->20009 20010 50c2d8 20008->20010 20011 50c318 20009->20011 20010->19993 20012 4fc97f __strnicoll 41 API calls 20011->20012 20012->20010 20014 504a51 __strnicoll 14 API calls 20013->20014 20015 501129 20014->20015 20015->19990 20017 50c20a ___scrt_uninitialize_crt LeaveCriticalSection 20016->20017 20018 507d72 20017->20018 20018->19940 20019->19918 20020->19901 21475 5030af 21478 502d7b 21475->21478 21479 502d87 __FrameHandler3::FrameUnwindToState 21478->21479 21486 4ff268 EnterCriticalSection 21479->21486 21481 502dbf 21487 502ddd 21481->21487 21482 502d91 21482->21481 21485 50d355 __Getctype 14 API calls 21482->21485 21485->21482 21486->21482 21490 4ff2b0 LeaveCriticalSection 21487->21490 21489 502dcb 21490->21489 23113 505b53 23114 505b5f __FrameHandler3::FrameUnwindToState 23113->23114 23125 4ff268 EnterCriticalSection 23114->23125 23116 505b66 23126 50c149 23116->23126 23123 505aa3 2 API calls 23124 505b84 23123->23124 23145 505baa 23124->23145 23125->23116 23127 50c155 __FrameHandler3::FrameUnwindToState 23126->23127 23128 50c15e 23127->23128 23129 50c17f 23127->23129 23130 501137 __strnicoll 14 API calls 23128->23130 23148 4ff268 EnterCriticalSection 23129->23148 23132 50c163 23130->23132 23133 4fc97f __strnicoll 41 API calls 23132->23133 23135 505b75 23133->23135 23134 50c1b7 23156 50c1de 23134->23156 23135->23124 23139 5059ed GetStartupInfoW 23135->23139 23138 50c18b 23138->23134 23149 50c099 23138->23149 23140 505a9e 23139->23140 23141 505a0a 23139->23141 23140->23123 23141->23140 23142 50c149 42 API calls 23141->23142 23143 505a32 23142->23143 23143->23140 23144 505a62 GetFileType 23143->23144 23144->23143 23160 4ff2b0 LeaveCriticalSection 23145->23160 23147 505b95 23148->23138 23150 50511b __Getctype 14 API calls 23149->23150 23151 50c0ab 23150->23151 23153 505726 _unexpected 6 API calls 23151->23153 23155 50c0b8 23151->23155 23152 504beb ___free_lconv_mon 14 API calls 23154 50c10d 23152->23154 23153->23151 23154->23138 23155->23152 23159 4ff2b0 LeaveCriticalSection 23156->23159 23158 50c1e5 23158->23135 23159->23158 23160->23147 21694 4fd565 21695 5001bc ___scrt_uninitialize_crt 70 API calls 21694->21695 21696 4fd56d 21695->21696 21704 505902 21696->21704 21698 4fd572 21714 5059ad 21698->21714 21701 4fd59c 21702 504beb ___free_lconv_mon 14 API calls 21701->21702 21703 4fd5a7 21702->21703 21705 50590e __FrameHandler3::FrameUnwindToState 21704->21705 21718 4ff268 EnterCriticalSection 21705->21718 21707 505985 21725 5059a4 21707->21725 21710 505959 DeleteCriticalSection 21711 504beb ___free_lconv_mon 14 API calls 21710->21711 21713 505919 21711->21713 21713->21707 21713->21710 21719 4ffe81 21713->21719 21715 5059c4 21714->21715 21716 4fd581 DeleteCriticalSection 21714->21716 21715->21716 21717 504beb ___free_lconv_mon 14 API calls 21715->21717 21716->21698 21716->21701 21717->21716 21718->21713 21720 4ffe94 _Fputc 21719->21720 21728 4ffd5c 21720->21728 21722 4ffea0 21723 4fc6bb _Fputc 41 API calls 21722->21723 21724 4ffeac 21723->21724 21724->21713 21800 4ff2b0 LeaveCriticalSection 21725->21800 21727 505991 21727->21698 21729 4ffd68 __FrameHandler3::FrameUnwindToState 21728->21729 21730 4ffd95 21729->21730 21731 4ffd72 21729->21731 21733 4ffd8d 21730->21733 21739 4fd5f7 EnterCriticalSection 21730->21739 21732 4fc902 __strnicoll 41 API calls 21731->21732 21732->21733 21733->21722 21735 4ffdb3 21740 4ffdf3 21735->21740 21737 4ffdc0 21754 4ffdeb 21737->21754 21739->21735 21741 4ffe23 21740->21741 21742 4ffe00 21740->21742 21744 5000ee ___scrt_uninitialize_crt 66 API calls 21741->21744 21751 4ffe1b 21741->21751 21743 4fc902 __strnicoll 41 API calls 21742->21743 21743->21751 21745 4ffe3b 21744->21745 21746 5059ad 14 API calls 21745->21746 21747 4ffe43 21746->21747 21748 506a14 __fread_nolock 41 API calls 21747->21748 21749 4ffe4f 21748->21749 21757 507b75 21749->21757 21751->21737 21753 504beb ___free_lconv_mon 14 API calls 21753->21751 21799 4fd60b LeaveCriticalSection 21754->21799 21756 4ffdf1 21756->21733 21758 507b9e 21757->21758 21761 4ffe56 21757->21761 21759 507bed 21758->21759 21762 507bc5 21758->21762 21760 4fc902 __strnicoll 41 API calls 21759->21760 21760->21761 21761->21751 21761->21753 21764 507ae4 21762->21764 21765 507af0 __FrameHandler3::FrameUnwindToState 21764->21765 21772 50c1e7 EnterCriticalSection 21765->21772 21767 507afe 21768 507b2f 21767->21768 21773 507c18 21767->21773 21786 507b69 21768->21786 21772->21767 21774 50c2be __fread_nolock 41 API calls 21773->21774 21777 507c28 21774->21777 21775 507c2e 21789 50c22d 21775->21789 21777->21775 21778 50c2be __fread_nolock 41 API calls 21777->21778 21785 507c60 21777->21785 21780 507c57 21778->21780 21779 50c2be __fread_nolock 41 API calls 21781 507c6c CloseHandle 21779->21781 21784 50c2be __fread_nolock 41 API calls 21780->21784 21781->21775 21782 507c78 GetLastError 21781->21782 21782->21775 21783 507c86 __fread_nolock 21783->21768 21784->21785 21785->21775 21785->21779 21798 50c20a LeaveCriticalSection 21786->21798 21788 507b52 21788->21761 21790 50c2a3 21789->21790 21791 50c23c 21789->21791 21792 501137 __strnicoll 14 API calls 21790->21792 21791->21790 21797 50c266 21791->21797 21793 50c2a8 21792->21793 21794 501124 __dosmaperr 14 API calls 21793->21794 21795 50c293 21794->21795 21795->21783 21796 50c28d SetStdHandle 21796->21795 21797->21795 21797->21796 21798->21788 21799->21756 21800->21727 20100 b1018d 20101 b101c5 20100->20101 20102 b102d3 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 20101->20102 20105 b10392 TerminateProcess 20101->20105 20102->20101 20103 b103a2 WriteProcessMemory 20102->20103 20104 b103e7 20103->20104 20106 b10429 WriteProcessMemory Wow64SetThreadContext ResumeThread 20104->20106 20107 b103ec WriteProcessMemory 20104->20107 20105->20102 20107->20104 23490 5047c7 23491 5047d2 23490->23491 23492 5047e2 23490->23492 23496 5047e8 23491->23496 23495 504beb ___free_lconv_mon 14 API calls 23495->23492 23497 5047fd 23496->23497 23501 504803 23496->23501 23498 504beb ___free_lconv_mon 14 API calls 23497->23498 23498->23501 23499 504beb ___free_lconv_mon 14 API calls 23500 50480f 23499->23500 23502 504beb ___free_lconv_mon 14 API calls 23500->23502 23501->23499 23503 50481a 23502->23503 23504 504beb ___free_lconv_mon 14 API calls 23503->23504 23505 504825 23504->23505 23506 504beb ___free_lconv_mon 14 API calls 23505->23506 23507 504830 23506->23507 23508 504beb ___free_lconv_mon 14 API calls 23507->23508 23509 50483b 23508->23509 23510 504beb ___free_lconv_mon 14 API calls 23509->23510 23511 504846 23510->23511 23512 504beb ___free_lconv_mon 14 API calls 23511->23512 23513 504851 23512->23513 23514 504beb ___free_lconv_mon 14 API calls 23513->23514 23515 50485c 23514->23515 23516 504beb ___free_lconv_mon 14 API calls 23515->23516 23517 50486a 23516->23517 23522 504614 23517->23522 23523 504620 __FrameHandler3::FrameUnwindToState 23522->23523 23538 4ff268 EnterCriticalSection 23523->23538 23525 504654 23539 504673 23525->23539 23527 50462a 23527->23525 23529 504beb ___free_lconv_mon 14 API calls 23527->23529 23529->23525 23530 50467f 23531 50468b __FrameHandler3::FrameUnwindToState 23530->23531 23543 4ff268 EnterCriticalSection 23531->23543 23533 504695 23534 5048b5 __Getctype 14 API calls 23533->23534 23535 5046a8 23534->23535 23544 5046c8 23535->23544 23538->23527 23542 4ff2b0 LeaveCriticalSection 23539->23542 23541 504661 23541->23530 23542->23541 23543->23533 23547 4ff2b0 LeaveCriticalSection 23544->23547 23546 5046b6 23546->23495 23547->23546 22229 4f6d8b 22230 4f6dde 22229->22230 22231 4f6d92 22229->22231 22234 4fd5f7 EnterCriticalSection 22231->22234 22233 4f6d97 22234->22233 22294 5005a3 22297 5005c0 22294->22297 22298 5005cc __FrameHandler3::FrameUnwindToState 22297->22298 22299 500616 22298->22299 22302 5005df __fread_nolock 22298->22302 22309 5005bb 22298->22309 22310 4fd5f7 EnterCriticalSection 22299->22310 22301 500620 22311 5003bd 22301->22311 22303 501137 __strnicoll 14 API calls 22302->22303 22305 5005f9 22303->22305 22306 4fc97f __strnicoll 41 API calls 22305->22306 22306->22309 22310->22301 22314 5003ce __fread_nolock 22311->22314 22323 5003ea 22311->22323 22312 5003da 22313 501137 __strnicoll 14 API calls 22312->22313 22315 5003df 22313->22315 22314->22312 22320 50042c __fread_nolock 22314->22320 22314->22323 22316 4fc97f __strnicoll 41 API calls 22315->22316 22316->22323 22317 500553 __fread_nolock 22321 501137 __strnicoll 14 API calls 22317->22321 22318 506a14 __fread_nolock 41 API calls 22318->22320 22319 50065d __fread_nolock 41 API calls 22319->22320 22320->22317 22320->22318 22320->22319 22322 509668 __fread_nolock 53 API calls 22320->22322 22320->22323 22321->22315 22322->22320 22324 500655 22323->22324 22327 4fd60b LeaveCriticalSection 22324->22327 22326 50065b 22326->22309 22327->22326 20021 506ba6 20022 506a14 __fread_nolock 41 API calls 20021->20022 20024 506bb3 20022->20024 20023 506bbf 20024->20023 20026 506c0b 20024->20026 20044 506d6e 20024->20044 20026->20023 20032 506c6d 20026->20032 20052 506a50 20026->20052 20033 506c9c 20032->20033 20034 506a14 __fread_nolock 41 API calls 20033->20034 20035 506cab 20034->20035 20036 506d51 20035->20036 20037 506cbe 20035->20037 20038 5085c0 ___scrt_uninitialize_crt 66 API calls 20036->20038 20039 506d02 20037->20039 20040 506cdb 20037->20040 20042 506c7e 20038->20042 20039->20042 20063 509bb0 20039->20063 20041 5085c0 ___scrt_uninitialize_crt 66 API calls 20040->20041 20041->20042 20045 506d84 20044->20045 20046 506d88 20044->20046 20045->20026 20047 50c2be __fread_nolock 41 API calls 20046->20047 20049 506dd7 20046->20049 20048 506da9 20047->20048 20048->20049 20050 506db1 SetFilePointerEx 20048->20050 20049->20026 20050->20049 20051 506dc8 GetFileSizeEx 20050->20051 20051->20049 20054 506a5c 20052->20054 20053 506a7d 20053->20032 20058 509c6c 20053->20058 20054->20053 20055 506a14 __fread_nolock 41 API calls 20054->20055 20056 506a77 20055->20056 20091 51052e 20056->20091 20059 50511b __Getctype 14 API calls 20058->20059 20060 509c89 20059->20060 20061 504beb ___free_lconv_mon 14 API calls 20060->20061 20062 509c93 20061->20062 20062->20032 20064 509bc4 _Fputc 20063->20064 20069 509a07 20064->20069 20067 4fc6bb _Fputc 41 API calls 20068 509be8 20067->20068 20068->20042 20070 509a13 __FrameHandler3::FrameUnwindToState 20069->20070 20071 509af1 20070->20071 20073 509a1b 20070->20073 20074 509a6f 20070->20074 20072 4fc902 __strnicoll 41 API calls 20071->20072 20072->20073 20073->20067 20080 50c1e7 EnterCriticalSection 20074->20080 20076 509a75 20077 509a9a 20076->20077 20081 509b2d 20076->20081 20087 509ae9 20077->20087 20080->20076 20082 50c2be __fread_nolock 41 API calls 20081->20082 20083 509b3f 20082->20083 20084 509b5b SetFilePointerEx 20083->20084 20086 509b47 __fread_nolock 20083->20086 20085 509b73 GetLastError 20084->20085 20084->20086 20085->20086 20086->20077 20090 50c20a LeaveCriticalSection 20087->20090 20089 509aef 20089->20073 20090->20089 20092 51053b 20091->20092 20094 510548 20091->20094 20093 501137 __strnicoll 14 API calls 20092->20093 20095 510540 20093->20095 20096 510554 20094->20096 20097 501137 __strnicoll 14 API calls 20094->20097 20095->20053 20096->20053 20098 510575 20097->20098 20099 4fc97f __strnicoll 41 API calls 20098->20099 20099->20095

                        Control-flow Graph

                        APIs
                        • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00B100FF,00B100EF), ref: 00B102FC
                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 00B1030F
                        • Wow64GetThreadContext.KERNEL32(0000010C,00000000), ref: 00B1032D
                        • ReadProcessMemory.KERNELBASE(00000108,?,00B10143,00000004,00000000), ref: 00B10351
                        • VirtualAllocEx.KERNELBASE(00000108,?,?,00003000,00000040), ref: 00B1037C
                        • TerminateProcess.KERNELBASE(00000108,00000000), ref: 00B1039B
                        • WriteProcessMemory.KERNELBASE(00000108,00000000,?,?,00000000,?), ref: 00B103D4
                        • WriteProcessMemory.KERNELBASE(00000108,00400000,?,?,00000000,?,00000028), ref: 00B1041F
                        • WriteProcessMemory.KERNELBASE(00000108,-00000008,?,00000004,00000000), ref: 00B1045D
                        • Wow64SetThreadContext.KERNEL32(0000010C,01140000), ref: 00B10499
                        • ResumeThread.KERNELBASE(0000010C), ref: 00B104A8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655580724.0000000000B10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_b10000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Similarity
                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                        • API String ID: 2440066154-1257834847
                        • Opcode ID: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                        • Instruction ID: ff142b80bf04cc79fcd6951d21412f731658c8d0b289f7f32580f0f99735f513
                        • Opcode Fuzzy Hash: 6ed679946abb4a161c9f75f6101290084365813039212a6bd0c7882d8dd446c2
                        • Instruction Fuzzy Hash: B5B1E57660028AAFDB60CF68CC80BDA77A5FF88714F158564EA0CEB341D774FA518B94
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 913097a76a2aa3f9716249509b8196a2f4b16ccbac58342a843d0fa289859693
                        • Instruction ID: 28493dca41f52c00c777af6d00f2007a2c4ab279fadcf7c3e118e221ba0702c5
                        • Opcode Fuzzy Hash: 913097a76a2aa3f9716249509b8196a2f4b16ccbac58342a843d0fa289859693
                        • Instruction Fuzzy Hash: 3AE08C72911228EBCB14DB8CC949D8EF7ECFB84B01F110096B501D3140C670DE00CBD0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 857f0d7d492d1b07fb02e0609ce517428c09b40ad8e6f1d21a06a0ac5173a7a1
                        • Instruction ID: 6516ff5340c01fd628804a7dccd1926f3164ef191014196f1b46209c137f14e3
                        • Opcode Fuzzy Hash: 857f0d7d492d1b07fb02e0609ce517428c09b40ad8e6f1d21a06a0ac5173a7a1
                        • Instruction Fuzzy Hash: D3C08C34000A1086CE398910C27D3AE3764B3D1782F80048CC46A4B6C6CA6F9D83D641

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 22 50534e-50535a 23 5053ec-5053ef 22->23 24 5053f5 23->24 25 50535f-505370 23->25 26 5053f7-5053fb 24->26 27 505372-505375 25->27 28 50537d-505396 LoadLibraryExW 25->28 29 505415-505417 27->29 30 50537b 27->30 31 505398-5053a1 GetLastError 28->31 32 5053fc-50540c 28->32 29->26 34 5053e9 30->34 35 5053a3-5053b5 call 504588 31->35 36 5053da-5053e7 31->36 32->29 33 50540e-50540f FreeLibrary 32->33 33->29 34->23 35->36 39 5053b7-5053c9 call 504588 35->39 36->34 39->36 42 5053cb-5053d8 LoadLibraryExW 39->42 42->32 42->36
                        APIs
                        • FreeLibrary.KERNEL32(00000000,?,0050545B,?,?,004F4EC6,00000000,?,?,00505685,00000021,FlsSetValue,0051A2C0,0051A2C8,004F4EC6), ref: 0050540F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3664257935-537541572
                        • Opcode ID: c6c75e1d8f8a1e432678b9f93716e00613451cae3cf0b1f048f6f83597a54232
                        • Instruction ID: 6bcb7c9d07bb31254dec06e306cc5a534505099909764f760edb14a9720e78b8
                        • Opcode Fuzzy Hash: c6c75e1d8f8a1e432678b9f93716e00613451cae3cf0b1f048f6f83597a54232
                        • Instruction Fuzzy Hash: 7121C675A01615A7C7219F24AC45ADF3BA8FB517A0F250520F906A72D0E6B0ED04DEA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 43 507849-507862 44 507864-507874 call 5016a6 43->44 45 507878-50787d 43->45 44->45 51 507876 44->51 46 50788c-5078b2 call 50a722 45->46 47 50787f-507889 45->47 53 507a25-507a36 call 4f8107 46->53 54 5078b8-5078c3 46->54 47->46 51->45 56 507a18 54->56 57 5078c9-5078ce 54->57 61 507a1a 56->61 59 5078d0-5078d9 call 4f8450 57->59 60 5078e3-5078ee call 505bdf 57->60 69 5078f9-5078fd 59->69 70 5078db-5078e1 59->70 60->69 71 5078f0 60->71 64 507a1c-507a23 call 4f7bc6 61->64 64->53 69->61 73 507903-50791a call 50a722 69->73 72 5078f6 70->72 71->72 72->69 73->61 76 507920-507932 call 5057e8 73->76 78 507937-50793b 76->78 79 507956-507958 78->79 80 50793d-507945 78->80 79->61 81 507947-50794c 80->81 82 50797f-50798b 80->82 85 507952-507954 81->85 86 5079fe-507a00 81->86 83 507a0a 82->83 84 50798d-50798f 82->84 89 507a0c-507a13 call 4f7bc6 83->89 87 507991-50799a call 4f8450 84->87 88 5079a4-5079af call 505bdf 84->88 85->79 90 50795d-507977 call 5057e8 85->90 86->64 87->89 99 50799c-5079a2 87->99 88->89 100 5079b1 88->100 89->79 90->86 101 50797d 90->101 102 5079b7-5079bc 99->102 100->102 101->79 102->89 103 5079be-5079d6 call 5057e8 102->103 103->89 106 5079d8-5079df 103->106 107 5079e1-5079e2 106->107 108 507a02-507a08 106->108 109 5079e3-5079f5 call 50a79e 107->109 108->109 109->89 112 5079f7-5079fd call 4f7bc6 109->112 112->86
                        APIs
                        • __alloca_probe_16.LIBCMT ref: 005078D0
                        • __alloca_probe_16.LIBCMT ref: 00507991
                        • __freea.LIBCMT ref: 005079F8
                          • Part of subcall function 00505BDF: RtlAllocateHeap.NTDLL(00000000,004F4EC6,?,?,004F930A,?,?,?,?,?,004F2617,004F4EC6,?,?,?,?), ref: 00505C11
                        • __freea.LIBCMT ref: 00507A0D
                        • __freea.LIBCMT ref: 00507A1D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: __freea$__alloca_probe_16$AllocateHeap
                        • String ID:
                        • API String ID: 1423051803-0
                        • Opcode ID: b8655a539676166a65a99d69e0f77527858cd13b4fb540157e6ff104460ece08
                        • Instruction ID: 1246d14e91778276ce2e83eb085b6c00746bdb6ed892d9125b0e54239d0a8418
                        • Opcode Fuzzy Hash: b8655a539676166a65a99d69e0f77527858cd13b4fb540157e6ff104460ece08
                        • Instruction Fuzzy Hash: C851B372A0421EAFEB219E65CC45EBF3FA9FF48354B154929FD04D7191E634ED1087A0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 115 51554f-515564 116 515627-515634 call 4f433b 115->116 117 51556a-515574 115->117 119 515625-515626 117->119 120 51557a-515588 117->120 119->116 121 51558c-51559e call 4f13cb 120->121 124 5155a3-51561e call 4f1eb7 call 4f13cb call 4f1eb7 call 4fd44e call 4f1920 call 4f1800 121->124 124->121 137 515624 124->137 137->119
                        APIs
                          • Part of subcall function 004F13CB: __EH_prolog3_catch.LIBCMT ref: 004F13D2
                          • Part of subcall function 004F13CB: _strlen.LIBCMT ref: 004F13E4
                          • Part of subcall function 004F1920: __EH_prolog3_catch.LIBCMT ref: 004F1927
                        • _Deallocate.LIBCONCRT ref: 00515606
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: H_prolog3_catch$Deallocate_strlen
                        • String ID: ,sQ$Earth$Own head
                        • API String ID: 1170754441-1411447988
                        • Opcode ID: 11da8c66abc51a76ef9a8fef648f6c999cd6b13b7e02e7bf2456421c70cf2953
                        • Instruction ID: 8a37a0c2afd32bc19181a72f684355ce99403cb1218a7caa524db4e3249fd19d
                        • Opcode Fuzzy Hash: 11da8c66abc51a76ef9a8fef648f6c999cd6b13b7e02e7bf2456421c70cf2953
                        • Instruction Fuzzy Hash: 6D21B572409786AED300EF399841CAFFFE8B995308F941A1EF49052116D635E649CBA6

                        Control-flow Graph

                        APIs
                          • Part of subcall function 004F217E: _strlen.LIBCMT ref: 004F2196
                        • VirtualAllocEx.KERNELBASE(?,00000000,000004AC,00001000,00000040,0000000006:1@0000000005:@), ref: 0051569D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocVirtual_strlen
                        • String ID: 0 R$0000000006:1@0000000005:@
                        • API String ID: 3554592677-168714497
                        • Opcode ID: a6f16eca5abaab094aeb7b5792c9aa23a41c0abe4111f960812101fe487c43c8
                        • Instruction ID: 5ca03ff2a255af5832527f5a1805ed0ef7458f5c85c404c81049ab8948eeb909
                        • Opcode Fuzzy Hash: a6f16eca5abaab094aeb7b5792c9aa23a41c0abe4111f960812101fe487c43c8
                        • Instruction Fuzzy Hash: 01110831A0120CAAEB14EBA5DC42FFE7B74AFD4764F50011EF201761C1EEB85D4586A8

                        Control-flow Graph

                        APIs
                        • GetCurrentProcess.KERNEL32(?,?,00501FC2,00000016,004FC782,?,?,25454A19,004FC782,?), ref: 00501FD9
                        • TerminateProcess.KERNEL32(00000000,?,00501FC2,00000016,004FC782,?,?,25454A19,004FC782,?), ref: 00501FE0
                        • ExitProcess.KERNEL32 ref: 00501FF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: 289b408a35eb03f6177a8b1e71a3f0235a823d26eb0b467900c03838a46c27dc
                        • Instruction ID: ff9cd448253380568fc438fe61ee16fba056b4a8e8ba0b0a67f1929f0c84a4bf
                        • Opcode Fuzzy Hash: 289b408a35eb03f6177a8b1e71a3f0235a823d26eb0b467900c03838a46c27dc
                        • Instruction Fuzzy Hash: A9D09239405209AFCF216FA1DC0D99D3F2ABF98395B458014B90D8A1B2DB31999AEA94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 170 5086c8-5086e7 171 5088c1 170->171 172 5086ed-5086ef 170->172 175 5088c3-5088c7 171->175 173 5086f1-508710 call 4fc902 172->173 174 50871b-508741 172->174 181 508713-508716 173->181 177 508743-508745 174->177 178 508747-50874d 174->178 177->178 180 50874f-508759 177->180 178->173 178->180 182 508769-508774 call 50824c 180->182 183 50875b-508766 call 509c4e 180->183 181->175 188 5087b6-5087c8 182->188 189 508776-50877b 182->189 183->182 192 508819-508839 WriteFile 188->192 193 5087ca-5087d0 188->193 190 5087a0-5087b4 call 507e12 189->190 191 50877d-508781 189->191 213 508799-50879b 190->213 194 508787-508796 call 5081e4 191->194 195 508889-50889b 191->195 197 508844 192->197 198 50883b-508841 GetLastError 192->198 199 5087d2-5087d5 193->199 200 508807-508812 call 5082ca 193->200 194->213 201 5088a5-5088b7 195->201 202 50889d-5088a3 195->202 206 508847-508852 197->206 198->197 207 5087f5-508805 call 50848e 199->207 208 5087d7-5087da 199->208 212 508817 200->212 201->181 202->171 202->201 214 508854-508859 206->214 215 5088bc-5088bf 206->215 218 5087f0-5087f3 207->218 208->195 209 5087e0-5087eb call 5083a5 208->209 209->218 212->218 213->206 219 508887 214->219 220 50885b-508860 214->220 215->175 218->213 219->195 221 508862-508874 220->221 222 508879-508882 call 501100 220->222 221->181 222->181
                        APIs
                          • Part of subcall function 00507E12: GetConsoleOutputCP.KERNEL32(25454A19,00000000,00000000,00000000), ref: 00507E75
                        • WriteFile.KERNEL32(?,00000000,00000000,004FFDC0,00000000,00000000,00000000,00000000,00000000,?,004FFDC0,00000000,00000000,005204B0,00000010,00000000), ref: 00508831
                        • GetLastError.KERNEL32(?,004FFDC0,00000000,00000000,005204B0,00000010,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0050883B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ConsoleErrorFileLastOutputWrite
                        • String ID:
                        • API String ID: 2915228174-0
                        • Opcode ID: 57a0eaa371e1feed2bfb895c8dd203d513fd368651264a6f16976e548e1931e8
                        • Instruction ID: f2339aff6a67093662763e44d4311212e32a7356688f891ed2c170efb181b137
                        • Opcode Fuzzy Hash: 57a0eaa371e1feed2bfb895c8dd203d513fd368651264a6f16976e548e1931e8
                        • Instruction Fuzzy Hash: 5C61A1B1D00149AEDF118FA8C888EFEBFB9BF49304F144485E984A7296DB36D945CB60

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 225 50b74d-50b775 call 50b27d 228 50b77b-50b781 225->228 229 50b93d-50b93e call 50b2ee 225->229 231 50b784-50b78a 228->231 232 50b943-50b945 229->232 233 50b790-50b79c 231->233 234 50b88c-50b8ab call 4f9950 231->234 235 50b946-50b954 call 4f8107 232->235 233->231 236 50b79e-50b7a4 233->236 242 50b8ae-50b8b3 234->242 239 50b884-50b887 236->239 240 50b7aa-50b7b6 IsValidCodePage 236->240 239->235 240->239 244 50b7bc-50b7c3 240->244 245 50b8f0-50b8fa 242->245 246 50b8b5-50b8ba 242->246 247 50b7c5-50b7d1 244->247 248 50b7eb-50b7f8 GetCPInfo 244->248 245->242 251 50b8fc-50b926 call 50b23f 245->251 249 50b8bc-50b8c4 246->249 250 50b8ed 246->250 252 50b7d5-50b7e1 call 50b351 247->252 253 50b878-50b87e 248->253 254 50b7fa-50b819 call 4f9950 248->254 255 50b8e5-50b8eb 249->255 256 50b8c6-50b8c9 249->256 250->245 266 50b927-50b936 251->266 262 50b7e6 252->262 253->229 253->239 254->252 264 50b81b-50b822 254->264 255->246 255->250 260 50b8cb-50b8d1 256->260 260->255 265 50b8d3-50b8e3 260->265 262->232 267 50b824-50b829 264->267 268 50b84e-50b851 264->268 265->255 265->260 266->266 269 50b938 266->269 267->268 270 50b82b-50b833 267->270 271 50b856-50b85d 268->271 269->229 272 50b835-50b83c 270->272 273 50b846-50b84c 270->273 271->271 274 50b85f-50b873 call 50b23f 271->274 275 50b83d-50b844 272->275 273->267 273->268 274->252 275->273 275->275
                        APIs
                          • Part of subcall function 0050B27D: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 0050B2A8
                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,0050B594,?,00000000,?,00000000,?), ref: 0050B7AE
                        • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,0050B594,?,00000000,?,00000000,?), ref: 0050B7F0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: CodeInfoPageValid
                        • String ID:
                        • API String ID: 546120528-0
                        • Opcode ID: 7061e7d955e02b054971ab5d16bc06bb82c8f26b88d3b9528ed16914065fd181
                        • Instruction ID: 72491ec2b53a33a1b9d0064b829351e2b5f4c3d57c69d4183aaf2c86728371fb
                        • Opcode Fuzzy Hash: 7061e7d955e02b054971ab5d16bc06bb82c8f26b88d3b9528ed16914065fd181
                        • Instruction Fuzzy Hash: 07510270E002458EEB20CF36C8D16AEBFF8FF95304F18856ED0968B2A2E7759945CB50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 278 4f13cb-4f13fe call 4f81a1 call 4ff160 283 4f1416-4f1421 278->283 284 4f1400 278->284 287 4f1424-4f1434 call 4f277e 283->287 285 4f1402-4f1404 284->285 286 4f1410-4f1414 284->286 285->283 288 4f1406-4f1408 285->288 286->287 292 4f1436-4f143b 287->292 293 4f1440-4f1454 287->293 288->283 290 4f140a 288->290 290->286 294 4f140c-4f140e 290->294 295 4f1545-4f156f call 4f45c5 call 4f2b1a call 4f8115 292->295 296 4f1456 293->296 297 4f1492-4f14a2 call 4f76d6 293->297 294->283 294->286 298 4f1459-4f145b 296->298 303 4f14a5-4f14a8 297->303 300 4f145d 298->300 301 4f1490 298->301 304 4f145f-4f1461 300->304 305 4f1463-4f147a call 4f4c21 300->305 301->297 307 4f14ef-4f14f4 303->307 308 4f14aa-4f14ac 303->308 304->301 304->305 305->307 319 4f147c-4f148e 305->319 310 4f14f7-4f1508 307->310 308->307 312 4f14ae 308->312 310->295 313 4f14b1-4f14b3 312->313 317 4f14e8-4f14ed 313->317 318 4f14b5 313->318 317->310 320 4f14bb-4f14d2 call 4f4c21 318->320 321 4f14b7-4f14b9 318->321 319->298 320->307 324 4f14d4-4f14e6 320->324 321->317 321->320 324->313
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: H_prolog3_catch_strlen
                        • String ID:
                        • API String ID: 3133806014-0
                        • Opcode ID: 3706da750823c34a50ce6f58ed02f129f9f7702d387f24b14595da481fe6c744
                        • Instruction ID: 279f1d2a967825e0afe9d410f7ca93a7eedfcd0b2e0af8ca8c2d3a129ff0b3be
                        • Opcode Fuzzy Hash: 3706da750823c34a50ce6f58ed02f129f9f7702d387f24b14595da481fe6c744
                        • Instruction Fuzzy Hash: 89516171E00518CFCB20DF68C9809BDB7F1AF88328B25425BEA25EB3A2D635DD41CB55

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 326 5082ca-50831f call 4f8d10 329 508321 326->329 330 508394-5083a4 call 4f8107 326->330 331 508327 329->331 333 50832d-50832f 331->333 335 508331-508336 333->335 336 508349-50836e WriteFile 333->336 337 508338-50833e 335->337 338 50833f-508347 335->338 339 508370-50837b 336->339 340 50838c-508392 GetLastError 336->340 337->338 338->333 338->336 339->330 341 50837d-508388 339->341 340->330 341->331 342 50838a 341->342 342->330
                        APIs
                        • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,00000000,?,00508817,?,00000000,00000000,00000000,00000000,00000000), ref: 00508366
                        • GetLastError.KERNEL32(?,00508817,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,004FFDC0,00000000,00000000,005204B0,00000010), ref: 0050838C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID:
                        • API String ID: 442123175-0
                        • Opcode ID: c2b37459d17fcbd83ea3ffa0a3948da1c807e09e25998419b00e373b888601cb
                        • Instruction ID: 9154e6c1837187e7058bfe214c8fa9a31ba58397d17d8f8eff9c6e41c7443131
                        • Opcode Fuzzy Hash: c2b37459d17fcbd83ea3ffa0a3948da1c807e09e25998419b00e373b888601cb
                        • Instruction Fuzzy Hash: 55218034A00219DFCF15CF29DC809EDBBB9FB98705F1448AAEA46D7251DA30DE46CB64

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 343 505aa3-505aa8 344 505aaa-505ac2 343->344 345 505ad0-505ad9 344->345 346 505ac4-505ac8 344->346 348 505aeb 345->348 349 505adb-505ade 345->349 346->345 347 505aca-505ace 346->347 350 505b45-505b49 347->350 353 505aed-505afa GetStdHandle 348->353 351 505ae0-505ae5 349->351 352 505ae7-505ae9 349->352 350->344 354 505b4f-505b52 350->354 351->353 352->353 355 505b27-505b39 353->355 356 505afc-505afe 353->356 355->350 357 505b3b-505b3e 355->357 356->355 358 505b00-505b09 GetFileType 356->358 357->350 358->355 359 505b0b-505b14 358->359 360 505b16-505b1a 359->360 361 505b1c-505b1f 359->361 360->350 361->350 362 505b21-505b25 361->362 362->350
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00505AEF
                        • GetFileType.KERNELBASE(00000000), ref: 00505B01
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileHandleType
                        • String ID:
                        • API String ID: 3000768030-0
                        • Opcode ID: 67a181ce7d8c238e83b85cc586ca71d3baf48231d6b65af90ace1a78c9d34bad
                        • Instruction ID: 7361d73ab4f51d8c9fff6ad31f4b6111bfb1fb9764e54f19c48226975ac64c30
                        • Opcode Fuzzy Hash: 67a181ce7d8c238e83b85cc586ca71d3baf48231d6b65af90ace1a78c9d34bad
                        • Instruction Fuzzy Hash: CF118131204F518AC7308E3E9CC862BBE95F756331B380B1AD4B7865F1E630E886EE50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 363 5057e8-5057f7 call 50531a 366 505820-50583a call 505845 LCMapStringW 363->366 367 5057f9-50581e LCMapStringEx 363->367 371 505840-505842 366->371 367->371
                        APIs
                        • LCMapStringEx.KERNELBASE(?,00507937,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 0050581C
                        • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00507937,?,?,00000000,?,00000000), ref: 0050583A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: String
                        • String ID:
                        • API String ID: 2568140703-0
                        • Opcode ID: c4458336f5802c235be92d0f6f49c1da858bd9d5ca862270669d990275972f27
                        • Instruction ID: 4873f37fdd434139f8e241d352548bf714ecf2181d7879078745e37aacc6e738
                        • Opcode Fuzzy Hash: c4458336f5802c235be92d0f6f49c1da858bd9d5ca862270669d990275972f27
                        • Instruction Fuzzy Hash: D0F0643240051AFBCF126F90DC09ADE3F26FF483A0B158020FE1865061DB36D932AF94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 372 515637-515652 CreateThread WaitForSingleObject
                        APIs
                        • CreateThread.KERNELBASE(00000000,00000000,Function_00025653,00000000,00000000,00000000), ref: 00515643
                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0051564C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: CreateObjectSingleThreadWait
                        • String ID:
                        • API String ID: 1891408510-0
                        • Opcode ID: 33843fb27ef57f7669a312ab3ce424a076af5fc682d66f1bfa97f3dad38a45df
                        • Instruction ID: a1525cb0743c0cdea9583ed6125ea10bc0a9b05b2fd5b477e8a52c7cd3778232
                        • Opcode Fuzzy Hash: 33843fb27ef57f7669a312ab3ce424a076af5fc682d66f1bfa97f3dad38a45df
                        • Instruction Fuzzy Hash: B6C092F0A54200BEFE005BB0AD0CDB73A1CE6587A13208B007E22D20E0EA348C049634

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 373 50b351-50b373 374 50b379-50b38b GetCPInfo 373->374 375 50b48c-50b4b2 373->375 374->375 376 50b391-50b398 374->376 377 50b4b7-50b4bc 375->377 378 50b39a-50b3a4 376->378 379 50b4c6-50b4cc 377->379 380 50b4be-50b4c4 377->380 378->378 383 50b3a6-50b3b9 378->383 381 50b4d8 379->381 382 50b4ce-50b4d1 379->382 384 50b4d4-50b4d6 380->384 385 50b4da-50b4ec 381->385 382->384 386 50b3da-50b3dc 383->386 384->385 385->377 387 50b4ee-50b4fc call 4f8107 385->387 388 50b3bb-50b3c2 386->388 389 50b3de-50b415 call 507740 call 507a37 386->389 391 50b3d1-50b3d3 388->391 399 50b41a-50b44f call 507a37 389->399 395 50b3c4-50b3c6 391->395 396 50b3d5-50b3d8 391->396 395->396 398 50b3c8-50b3d0 395->398 396->386 398->391 402 50b451-50b45b 399->402 403 50b469-50b46b 402->403 404 50b45d-50b467 402->404 406 50b479 403->406 407 50b46d-50b477 403->407 405 50b47b-50b488 404->405 405->402 408 50b48a 405->408 406->405 407->405 408->387
                        APIs
                        • GetCPInfo.KERNEL32(E8458D00,?,0050B5A0,0050B594,00000000), ref: 0050B383
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: Info
                        • String ID:
                        • API String ID: 1807457897-0
                        • Opcode ID: 4dd8535c06428b43249739de247bb502ad93e2dc31a2db9455cdd63cb09323c3
                        • Instruction ID: c8513f74132aa224b5e764cb2817fb4e54cb460a1a019c5d917c53451d09a6e5
                        • Opcode Fuzzy Hash: 4dd8535c06428b43249739de247bb502ad93e2dc31a2db9455cdd63cb09323c3
                        • Instruction Fuzzy Hash: 50514B719042589AEF218E28CDC4AEE7FB9FB55304F2409ADE599C7183C375AE45CB20

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 409 4f6f32-4f6f4c 410 4f6f4e-4f6f50 409->410 411 4f6f55-4f6f5d 409->411 412 4f702c-4f7039 call 4f8107 410->412 413 4f6f5f-4f6f69 411->413 414 4f6f81-4f6f85 411->414 413->414 418 4f6f6b-4f6f7c 413->418 415 4f6f8b-4f6f9c call 4f6d99 414->415 416 4f7028 414->416 424 4f6f9e-4f6fa2 415->424 425 4f6fa4-4f6fd8 415->425 420 4f702b 416->420 422 4f7024-4f7026 418->422 420->412 422->420 426 4f6feb call 4f6643 424->426 432 4f6ffb-4f7003 425->432 433 4f6fda-4f6fdd 425->433 429 4f6ff0-4f6ff4 426->429 429->422 431 4f6ff6-4f6ff9 429->431 431->422 434 4f7018-4f7022 432->434 435 4f7005-4f7016 call 500cf6 432->435 433->432 436 4f6fdf-4f6fe3 433->436 434->416 434->422 435->416 435->434 436->416 438 4f6fe5-4f6fe8 436->438 438->426
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ef634a8d8fcb1691247a346389038009f016caa27e4c576ff046d2315421e9c6
                        • Instruction ID: abc1f4d30ba651e693aa4628fbeff8984887e421f8c47aeac3b76815f5ad5455
                        • Opcode Fuzzy Hash: ef634a8d8fcb1691247a346389038009f016caa27e4c576ff046d2315421e9c6
                        • Instruction Fuzzy Hash: AA31727690451EAFCB14CF68D9808FEB7B8FF19314B14066BE701A7280DB39E914CBA5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f434da4de59e0bf9c3e0d7969dcfde0b4adb0bc5b9d5d87485771d37e935a2fd
                        • Instruction ID: 8775c0eb3591f71b1d69c2320addbb0acd433fac1b54442cf3a4663bf2f36162
                        • Opcode Fuzzy Hash: f434da4de59e0bf9c3e0d7969dcfde0b4adb0bc5b9d5d87485771d37e935a2fd
                        • Instruction Fuzzy Hash: A001F537600A255BDF128E7DED4599F3B9AFBD53217148924F904CB1C4FA3098459F51
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,004F4EC6,?,?,004F930A,?,?,?,?,?,004F2617,004F4EC6,?,?,?,?), ref: 00505C11
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 3c02fd5793f441c8b2a43e3fdda2126e5450fa1fa2bc898db875f419e66448bf
                        • Instruction ID: fd8ae4d8ea88803316e8803af84b4603be5ce890659e32a80ab11d97a29af3e2
                        • Opcode Fuzzy Hash: 3c02fd5793f441c8b2a43e3fdda2126e5450fa1fa2bc898db875f419e66448bf
                        • Instruction Fuzzy Hash: FCE09231601F229BFB3127699D09B9F3E4CBF827A0F590120FD0A960D1FB60DC419EA9
                        APIs
                        • FreeConsole.KERNELBASE(004F83B9,00000000,00000000,00000000,00520308,00000014), ref: 00515712
                          • Part of subcall function 00515637: CreateThread.KERNELBASE(00000000,00000000,Function_00025653,00000000,00000000,00000000), ref: 00515643
                          • Part of subcall function 00515637: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0051564C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ConsoleCreateFreeObjectSingleThreadWait
                        • String ID:
                        • API String ID: 973188901-0
                        • Opcode ID: 862092e2ccb57f932ca4ef57963fe4b65dfb4e9d5d7d33e5301d909c9b200f46
                        • Instruction ID: d95d864551c9cd566c7283676bb2fc9394fe15631fe44929bddbe9e3f1ad7e60
                        • Opcode Fuzzy Hash: 862092e2ccb57f932ca4ef57963fe4b65dfb4e9d5d7d33e5301d909c9b200f46
                        • Instruction Fuzzy Hash: 0C900270111541C697802730AC0D4892A5076D424279085607105C0025FF7645446950
                        APIs
                        • GetLocaleInfoW.KERNEL32(?,2000000B,NP,00000002,00000000,?,?,?,0050E54E,?,00000000), ref: 0050E2C9
                        • GetLocaleInfoW.KERNEL32(?,20001004,NP,00000002,00000000,?,?,?,0050E54E,?,00000000), ref: 0050E2F2
                        • GetACP.KERNEL32(?,?,0050E54E,?,00000000), ref: 0050E307
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: InfoLocale
                        • String ID: ACP$NP$OCP
                        • API String ID: 2299586839-4142511605
                        • Opcode ID: 733b06eecde50f66f36eedb73298e2d8d2beca38c082bf88fb37faf8335e616c
                        • Instruction ID: cd93f75956e717d0e4f85f7d86a6ae9c344dfee5decdbe2b9ede3bab5b1834a9
                        • Opcode Fuzzy Hash: 733b06eecde50f66f36eedb73298e2d8d2beca38c082bf88fb37faf8335e616c
                        • Instruction Fuzzy Hash: 41217126640106A7EB358F54CA07ADF7EABBB64B50B768C24E90AD7191E732DD40C350
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: 698d52712a418fbc706e906f8d785f51c9fd745b4b0cd39b77040c75aa515911
                        • Instruction ID: 5fb52f6c530c4d4013e6ed4560363e5785f83c2cd32d6679aae55b554b02048a
                        • Opcode Fuzzy Hash: 698d52712a418fbc706e906f8d785f51c9fd745b4b0cd39b77040c75aa515911
                        • Instruction Fuzzy Hash: 65D21771E082298BDB75CE28DD447EEBBB5FB84304F1445EAD80DA7680D778AE818F41
                        APIs
                          • Part of subcall function 00504900: GetLastError.KERNEL32(?,00000008,00504EFF), ref: 00504904
                          • Part of subcall function 00504900: SetLastError.KERNEL32(00000000,004F4EC6,00000002,000000FF), ref: 005049A6
                        • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0050E511
                        • IsValidCodePage.KERNEL32(00000000), ref: 0050E55A
                        • IsValidLocale.KERNEL32(?,00000001), ref: 0050E569
                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0050E5B1
                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0050E5D0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                        • String ID:
                        • API String ID: 415426439-0
                        • Opcode ID: 293f3cbab5a19e5912b57f34e46dbad488aeb09f3407da8fd406cb73a9df12c0
                        • Instruction ID: 7cefe2e4dc43956bea2951604fad9e1f17ee7292466ce723904f391c8fdf0348
                        • Opcode Fuzzy Hash: 293f3cbab5a19e5912b57f34e46dbad488aeb09f3407da8fd406cb73a9df12c0
                        • Instruction Fuzzy Hash: 28515072A00216ABEF11DFA4DC46ABE7BB8BF58704F244C69F910EB1D1E7709944CB61
                        APIs
                          • Part of subcall function 00504900: GetLastError.KERNEL32(?,00000008,00504EFF), ref: 00504904
                          • Part of subcall function 00504900: SetLastError.KERNEL32(00000000,004F4EC6,00000002,000000FF), ref: 005049A6
                        • GetACP.KERNEL32(?,?,?,?,?,?,005034A3,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0050DB62
                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,005034A3,?,?,?,00000055,?,-00000050,?,?), ref: 0050DB8D
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0050DCF0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$CodeInfoLocalePageValid
                        • String ID: utf8
                        • API String ID: 607553120-905460609
                        • Opcode ID: 93f33f9629cde2ed2fb0ae33b089d0153ca3cd40826988c9d3965e37349c5ca8
                        • Instruction ID: 22607f5a943affe362dcd87a955d616a5b1622b2d78994b6663c13ef3613f078
                        • Opcode Fuzzy Hash: 93f33f9629cde2ed2fb0ae33b089d0153ca3cd40826988c9d3965e37349c5ca8
                        • Instruction Fuzzy Hash: 2271B371600206AAEB24ABB5DC4ABBE7BB8FF94700F144429F905D71C1EAB4ED41CA71
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: _strrchr
                        • String ID:
                        • API String ID: 3213747228-0
                        • Opcode ID: 1f47ff457ba235831066e09548e84625a770d893a1596bb91e99954b6fab6d07
                        • Instruction ID: 5885bf90886ded0a222534ae281d5a1aa945cbcd5d51792c58e94551a1a304de
                        • Opcode Fuzzy Hash: 1f47ff457ba235831066e09548e84625a770d893a1596bb91e99954b6fab6d07
                        • Instruction Fuzzy Hash: 85B158729046469FDB11CF68C8957EFBFA5FF55340F1481AAE945AB2C1E2389E01CFA0
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 004F87AE
                        • IsDebuggerPresent.KERNEL32 ref: 004F887A
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004F8893
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 004F889D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                        • String ID:
                        • API String ID: 254469556-0
                        • Opcode ID: 3e77c48546410da6e63f845d8a6212ced8ff9b615a5a1302f9adf252e010ef16
                        • Instruction ID: f92f0ca0a8d5035fac1638b2ab3d777999828dc8ad07cb7611d1c132fc752df3
                        • Opcode Fuzzy Hash: 3e77c48546410da6e63f845d8a6212ced8ff9b615a5a1302f9adf252e010ef16
                        • Instruction Fuzzy Hash: F431F7B5D0121C9BDF60EFA5D949BDDBBB8AF08304F1041AEE50DAB250EB749A84CF45
                        APIs
                          • Part of subcall function 00504900: GetLastError.KERNEL32(?,00000008,00504EFF), ref: 00504904
                          • Part of subcall function 00504900: SetLastError.KERNEL32(00000000,004F4EC6,00000002,000000FF), ref: 005049A6
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0050DF08
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0050DF52
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0050E018
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: InfoLocale$ErrorLast
                        • String ID:
                        • API String ID: 661929714-0
                        • Opcode ID: c90251cce8bfd06828ed4a52d1585a07e65188566df821acfafe2000787fc6ac
                        • Instruction ID: a52208d0f00b52d900544aa549a6b9a8987d8399ce28e099651a28722225a2cb
                        • Opcode Fuzzy Hash: c90251cce8bfd06828ed4a52d1585a07e65188566df821acfafe2000787fc6ac
                        • Instruction Fuzzy Hash: 68618D715006179FDB289F28CD9ABAE7BA8FF04300F248979E905C66C1EB74E985DB50
                        APIs
                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,004F4EC6), ref: 004FC87B
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,004F4EC6), ref: 004FC885
                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,004F4EC6), ref: 004FC892
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: e8f69781ef06cd43524d9a4b85c9c45cc77509c3b3e9207fe6a901ab028361ed
                        • Instruction ID: a87968dba2473887d8812498cc50eb49a46103eb4c52f42285a52f6be8d2e539
                        • Opcode Fuzzy Hash: e8f69781ef06cd43524d9a4b85c9c45cc77509c3b3e9207fe6a901ab028361ed
                        • Instruction Fuzzy Hash: B431C47490122CABCB21DF25D989BDDBBB8BF18310F5041EAE50CA7250EB749F858F49
                        APIs
                          • Part of subcall function 00504900: GetLastError.KERNEL32(?,00000008,00504EFF), ref: 00504904
                          • Part of subcall function 00504900: SetLastError.KERNEL32(00000000,004F4EC6,00000002,000000FF), ref: 005049A6
                        • EnumSystemLocalesW.KERNEL32(0050DEB4,00000001,00000000,?,-00000050,?,0050E4E5,00000000,?,?,?,00000055,?), ref: 0050DE00
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID: P
                        • API String ID: 2417226690-290524615
                        • Opcode ID: 45a9b8dc75b940df76e641594d090df2e62d3ca667e8775f25202c2a4f5416e1
                        • Instruction ID: 6b526bc313d85b062b3b418ae5a4322fa53973bf9bc68cd3783574b00c99cbc3
                        • Opcode Fuzzy Hash: 45a9b8dc75b940df76e641594d090df2e62d3ca667e8775f25202c2a4f5416e1
                        • Instruction Fuzzy Hash: 1611E5372007055FDB189F79D8916BEBBA5FF90368B18842DE9868BA80D771B942CB50
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 45359dbdee025ceff4488a092b7096e5c1b1646e308180004250f0db49df2fef
                        • Instruction ID: 0fe01d9e61600c213285f76eeecb792103d9cd89c0e1c19cc9bb57eb3fcdb9c7
                        • Opcode Fuzzy Hash: 45359dbdee025ceff4488a092b7096e5c1b1646e308180004250f0db49df2fef
                        • Instruction Fuzzy Hash: C4F13F71E006199FDF14CFA9C880AADBBB1FF88314F158269E815AB391D731AD41CF95
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0050A061,?,?,00000008,?,?,00513135,00000000), ref: 0050A293
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 35a0c205967521b4907aba9d9a928ea0cb7a589479a0726df3d9c0d037152b56
                        • Instruction ID: 2bc79e0ce58512208252a810c9a088d2ea574d83bc9f2952604e43f422734985
                        • Opcode Fuzzy Hash: 35a0c205967521b4907aba9d9a928ea0cb7a589479a0726df3d9c0d037152b56
                        • Instruction Fuzzy Hash: C9B12B356107098FD715CF28C48ABA97FA1FF45364F298658E89ACF2E1C336E991CB41
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 004F857B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: FeaturePresentProcessor
                        • String ID:
                        • API String ID: 2325560087-0
                        • Opcode ID: 217bc871bb7facb6ff6ab55ff8e4fe800d9cad5acfa6ef563913192193fd736f
                        • Instruction ID: d9b1e8e62adf453e605e7a94d4f542cb4d736fc885eb19b6876950a65a25c878
                        • Opcode Fuzzy Hash: 217bc871bb7facb6ff6ab55ff8e4fe800d9cad5acfa6ef563913192193fd736f
                        • Instruction Fuzzy Hash: 5C519BB1A11209CFEB14CF58E8817AEBBF0FB68344F20846AD505EB390D7B89945DF50
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 60ecddf4fca1b5693e772b95f88875515976e59a29d0a8cf03625d1ffcd330bc
                        • Instruction ID: 61ba42824c1d69b3c5f0a959ffb2189e7f43c0d843b97de910006c419346151a
                        • Opcode Fuzzy Hash: 60ecddf4fca1b5693e772b95f88875515976e59a29d0a8cf03625d1ffcd330bc
                        • Instruction Fuzzy Hash: 0141A1B580521DAFDB20DF69CC89AAEBBB9FF45304F1442D9E44DD3281EA359E858F10
                        APIs
                          • Part of subcall function 00504900: GetLastError.KERNEL32(?,00000008,00504EFF), ref: 00504904
                          • Part of subcall function 00504900: SetLastError.KERNEL32(00000000,004F4EC6,00000002,000000FF), ref: 005049A6
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0050E15B
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID:
                        • API String ID: 3736152602-0
                        • Opcode ID: e2967f4a375ece797fb9d113f96faab0191eb2c885043845429fd09c26868467
                        • Instruction ID: a150734f7782d12b6a8eaa731fd51f91536fb27feaca13054e3588870860e329
                        • Opcode Fuzzy Hash: e2967f4a375ece797fb9d113f96faab0191eb2c885043845429fd09c26868467
                        • Instruction Fuzzy Hash: 88218072645206ABDB289A25DC47EBE7BA8FF44310B20487AF901D71C1EB34AD05DB50
                        APIs
                          • Part of subcall function 00504900: GetLastError.KERNEL32(?,00000008,00504EFF), ref: 00504904
                          • Part of subcall function 00504900: SetLastError.KERNEL32(00000000,004F4EC6,00000002,000000FF), ref: 005049A6
                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0050E1B1,00000000,00000000,?), ref: 0050E362
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID:
                        • API String ID: 3736152602-0
                        • Opcode ID: 3b6a918a85fba6a3358f699eb6b0db0785bd1afb5bcb9208d18b4e914fadf084
                        • Instruction ID: cf70cdd8708c68a9537d047c1b58a3d9e06144bdef31ae7bf8dc082bd0d3ca6e
                        • Opcode Fuzzy Hash: 3b6a918a85fba6a3358f699eb6b0db0785bd1afb5bcb9208d18b4e914fadf084
                        • Instruction Fuzzy Hash: 51F08632510116ABDB2896659807BFE7F68FB80754F254C29ED45A31C0DA74FD41C590
                        APIs
                          • Part of subcall function 00504900: GetLastError.KERNEL32(?,00000008,00504EFF), ref: 00504904
                          • Part of subcall function 00504900: SetLastError.KERNEL32(00000000,004F4EC6,00000002,000000FF), ref: 005049A6
                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0050DCF0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$InfoLocale
                        • String ID: utf8
                        • API String ID: 3736152602-905460609
                        • Opcode ID: bd4c99b11953b3ef804acf8f02db9628269a460f731ee7210c56a73f47a4fca2
                        • Instruction ID: cbcc0e5b9c149aa2e94d0d0ad78166465fa9f924b534e9a13ea3106ef4756f1a
                        • Opcode Fuzzy Hash: bd4c99b11953b3ef804acf8f02db9628269a460f731ee7210c56a73f47a4fca2
                        • Instruction Fuzzy Hash: 18F0F432600109ABC714AB74EC0AAFE77A8EB44310B10047EBA02D7281EA74AD05C7A0
                        APIs
                          • Part of subcall function 00504900: GetLastError.KERNEL32(?,00000008,00504EFF), ref: 00504904
                          • Part of subcall function 00504900: SetLastError.KERNEL32(00000000,004F4EC6,00000002,000000FF), ref: 005049A6
                        • EnumSystemLocalesW.KERNEL32(0050E107,00000001,?,?,-00000050,?,0050E4A9,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 0050DE73
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: a102a4e4623b14ec1a5b4c200f31d0e9986dfbb46faccd2f21f6976e330619ec
                        • Instruction ID: cfcc5a0e0711939f0127c146e9c70902debc79b7b12e6b3874e0a4c1e2a78b7d
                        • Opcode Fuzzy Hash: a102a4e4623b14ec1a5b4c200f31d0e9986dfbb46faccd2f21f6976e330619ec
                        • Instruction Fuzzy Hash: 68F0F6362003045FDB145F75DC85A7F7FA9FF90768B15842DF9458B6C0C6B1AC02CA60
                        APIs
                          • Part of subcall function 004FF268: EnterCriticalSection.KERNEL32(-0007B90A,?,00501C4F,00000000,005205F0,0000000C,00501C16,?,?,0050514E,?,?,00504A9E,00000001,00000364,004F4EC6), ref: 004FF277
                        • EnumSystemLocalesW.KERNEL32(00505178,00000001,005207E0,0000000C,005055A7,00000000), ref: 005051BD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: CriticalEnterEnumLocalesSectionSystem
                        • String ID:
                        • API String ID: 1272433827-0
                        • Opcode ID: 0ecaa6dd67db7d1fdc8368f41f4f6c7fb0dc20c61477a1f474918a240a830b65
                        • Instruction ID: 6b8ac4aa20dd99a5a93d30b421974d683c1b8ab96d50b74447a006a4b118233c
                        • Opcode Fuzzy Hash: 0ecaa6dd67db7d1fdc8368f41f4f6c7fb0dc20c61477a1f474918a240a830b65
                        • Instruction Fuzzy Hash: 4FF03776A40204EFDB00DF98E846B9D7BF0FB55725F10412AF8149B2E1DBB55944EF84
                        APIs
                          • Part of subcall function 00504900: GetLastError.KERNEL32(?,00000008,00504EFF), ref: 00504904
                          • Part of subcall function 00504900: SetLastError.KERNEL32(00000000,004F4EC6,00000002,000000FF), ref: 005049A6
                        • EnumSystemLocalesW.KERNEL32(0050DC9C,00000001,?,?,?,0050E507,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 0050DD7A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast$EnumLocalesSystem
                        • String ID:
                        • API String ID: 2417226690-0
                        • Opcode ID: cf1a1a35c7cc5556f15c8439415bdb3c26c1ef2646c772408e1f1de96b54381d
                        • Instruction ID: f93d71500ce4d3635f62b40791ab58605777040d8e751862dcf3cded255c444b
                        • Opcode Fuzzy Hash: cf1a1a35c7cc5556f15c8439415bdb3c26c1ef2646c772408e1f1de96b54381d
                        • Instruction Fuzzy Hash: 9DF0E53A30020557CB04AF75D85976EBFA4FFC2750B068059EA058B291C6719842CBA0
                        APIs
                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00504009,?,20001004,00000000,00000002,?,?,0050360B), ref: 005056DF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: InfoLocale
                        • String ID:
                        • API String ID: 2299586839-0
                        • Opcode ID: a5eff292dfd6b62011b6d0dac93fa8475ead69ca7944bf6a88428f6d0014fcc0
                        • Instruction ID: e6929ef2558a282d846ba541361811e47010b757f3bfc3aae5adcc68273639a1
                        • Opcode Fuzzy Hash: a5eff292dfd6b62011b6d0dac93fa8475ead69ca7944bf6a88428f6d0014fcc0
                        • Instruction Fuzzy Hash: DAE04F35540A29BBCF122F60DC08A9F3F15FF55751F148420FC05652A1EB728D20EFA4
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_0000890A,004F82B2), ref: 004F8903
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: bea1bd61a410280d8d813663079c10d14962daa85f8d9bfb20c02f44bcdf9f69
                        • Instruction ID: fc74bcfd5a8d71552ddee77af8aee72dc6f1af3163802957aa61386b56b58380
                        • Opcode Fuzzy Hash: bea1bd61a410280d8d813663079c10d14962daa85f8d9bfb20c02f44bcdf9f69
                        • Instruction Fuzzy Hash:
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: 918a2301495c5a336830d1f453bb2b0bef42e68440ae8c9bb99431bf01971f66
                        • Instruction ID: f43b466ff4810cb46cdce922588a0efb59c32ac73b1e76fe2e4fbfcb28f79c60
                        • Opcode Fuzzy Hash: 918a2301495c5a336830d1f453bb2b0bef42e68440ae8c9bb99431bf01971f66
                        • Instruction Fuzzy Hash: 83A01130200200CB83808F30AA8820A3BE8AB2228030AA028AC08C02A0EB2080C8BA00
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                        • String ID:
                        • API String ID: 3471368781-0
                        • Opcode ID: d991bcbc99cf9a6863d9ce182947f0e13ce23c7fded8baf4619519dc2f76def5
                        • Instruction ID: 3107aa97246941bd44c9bb5c3885f2d96d219cfbc07f3a0e526c736f845ae1f8
                        • Opcode Fuzzy Hash: d991bcbc99cf9a6863d9ce182947f0e13ce23c7fded8baf4619519dc2f76def5
                        • Instruction Fuzzy Hash: 84B1F8355007068BDB349FA5CC96BBFBBB8FF44308F54892DE947865C0EA75A945CB20
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00ca5361333671212f85c3c7222c10ce47e4d2f682e3e006e2c4c47d8a31ff16
                        • Instruction ID: d60864f06b96ac05ec18aaad9d21b4534d80d8e5ba86e16de4d203c5a0add353
                        • Opcode Fuzzy Hash: 00ca5361333671212f85c3c7222c10ce47e4d2f682e3e006e2c4c47d8a31ff16
                        • Instruction Fuzzy Hash: 5CB1C17090060E8BCF24EF6BC455ABFB7A1AF40346F14451FD752D73A1C679A902CB6A
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 004F7D2A
                        • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 004F7D38
                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 004F7D49
                        • GetProcAddress.KERNEL32(00000000,GetTempPath2W), ref: 004F7D5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressProc$HandleModule
                        • String ID: GetCurrentPackageId$GetSystemTimePreciseAsFileTime$GetTempPath2W$kernel32.dll
                        • API String ID: 667068680-1247241052
                        • Opcode ID: 8f3e84a7218c5f722990277ebb96d214ac931a65e4ed69e62766ec40ebb2912d
                        • Instruction ID: b1b3823ac0b5331acc4caf4012e5e325661ab31adc401398bc68b3066753968d
                        • Opcode Fuzzy Hash: 8f3e84a7218c5f722990277ebb96d214ac931a65e4ed69e62766ec40ebb2912d
                        • Instruction Fuzzy Hash: 86E0EC31996314ABEB10DF78BC0DCC63EFDFA2D7223025855F505D21A0E6B40588ABA0
                        APIs
                        • type_info::operator==.LIBVCRUNTIME ref: 004FB801
                        • ___TypeMatch.LIBVCRUNTIME ref: 004FB90F
                        • _UnwindNestedFrames.LIBCMT ref: 004FBA61
                        • CallUnexpected.LIBVCRUNTIME ref: 004FBA7C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                        • String ID: csm$csm$csm
                        • API String ID: 2751267872-393685449
                        • Opcode ID: 89277f590dd0edbda4e8df4bdac284e59c7055c1c418bdb3add1088551f8f199
                        • Instruction ID: d620f6b3f893f3ea02fbfad7eaf2c48d385e85be34ed86629aae6a879e3ed97d
                        • Opcode Fuzzy Hash: 89277f590dd0edbda4e8df4bdac284e59c7055c1c418bdb3add1088551f8f199
                        • Instruction Fuzzy Hash: BEB14471C0020DABCF25EFA5C9819BEBBB5FF06314B14415AEA016B212D778DA51CFD9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3907804496
                        • Opcode ID: 2288c3d2f525a1eb9412ccec43e00325a8e8bcb40746b8987893d5a57e5ba9b5
                        • Instruction ID: 18123b034c15644e1d53866f406da098f89168f2ab095ccb4d06dcf9ecd08878
                        • Opcode Fuzzy Hash: 2288c3d2f525a1eb9412ccec43e00325a8e8bcb40746b8987893d5a57e5ba9b5
                        • Instruction Fuzzy Hash: FCB1F374A04246AFDB15DF99C884BADBFB1BF86304F148558E504AB3DBC7709E42CB61
                        APIs
                        • GetCPInfo.KERNEL32(00BD05C8,00BD05C8,?,7FFFFFFF,?,005122CA,00BD05C8,00BD05C8,?,00BD05C8,?,?,?,?,00BD05C8,?), ref: 005120A0
                        • __alloca_probe_16.LIBCMT ref: 0051215B
                        • __alloca_probe_16.LIBCMT ref: 005121EA
                        • __freea.LIBCMT ref: 00512235
                        • __freea.LIBCMT ref: 0051223B
                        • __freea.LIBCMT ref: 00512271
                        • __freea.LIBCMT ref: 00512277
                        • __freea.LIBCMT ref: 00512287
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: __freea$__alloca_probe_16$Info
                        • String ID:
                        • API String ID: 127012223-0
                        • Opcode ID: e8dce8155ee83b8d134aa924d36a775b89e69d99ec87db01bfbb6674ebdc086d
                        • Instruction ID: 046fc91f26a4b4b2e6019140506569125864b779531a5610767205b8b3a0e305
                        • Opcode Fuzzy Hash: e8dce8155ee83b8d134aa924d36a775b89e69d99ec87db01bfbb6674ebdc086d
                        • Instruction Fuzzy Hash: 8771073690024A6BEF219F548C45FFE7FB6BF49314F284509E914A7281E635DCD0C7A0
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 004F7A43
                        • __alloca_probe_16.LIBCMT ref: 004F7A6F
                        • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 004F7AAE
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004F7ACB
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004F7B0A
                        • __alloca_probe_16.LIBCMT ref: 004F7B27
                        • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004F7B69
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 004F7B8C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ByteCharMultiStringWide$__alloca_probe_16
                        • String ID:
                        • API String ID: 2040435927-0
                        • Opcode ID: 27bbbd0daaeac2da5a64c3cb4de8b2743f875be91284a04d8022ff91cfd90058
                        • Instruction ID: f618ea8b6badb487276b2baa3cbabfdd66d01b3d60c3ba5b3ded75908c65824c
                        • Opcode Fuzzy Hash: 27bbbd0daaeac2da5a64c3cb4de8b2743f875be91284a04d8022ff91cfd90058
                        • Instruction Fuzzy Hash: CB51CF7250420AABEB205F60CC45FBF3BB9EF45748F15452AFA14A6250E73C9D11CB69
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 004FB1E7
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 004FB1EF
                        • _ValidateLocalCookies.LIBCMT ref: 004FB278
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004FB2A3
                        • _ValidateLocalCookies.LIBCMT ref: 004FB2F8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: csm
                        • API String ID: 1170836740-1018135373
                        • Opcode ID: 564b6c5140fec468430e8a0abc97c80843471abc5204104b11f91394efcf3adc
                        • Instruction ID: d0f6f80ef62556129db5c75815930d43886a02ae8582ecfe39a95b7a2cd4a039
                        • Opcode Fuzzy Hash: 564b6c5140fec468430e8a0abc97c80843471abc5204104b11f91394efcf3adc
                        • Instruction Fuzzy Hash: 7441C334A0020DDBCF10DF69C889AAE7FB0FF46324F14819AE9149B392D7399A15CBD5
                        APIs
                        • __EH_prolog3.LIBCMT ref: 004F6664
                        • std::_Lockit::_Lockit.LIBCPMT ref: 004F666E
                        • int.LIBCPMT ref: 004F6685
                          • Part of subcall function 004F2C1B: std::_Lockit::_Lockit.LIBCPMT ref: 004F2C2C
                          • Part of subcall function 004F2C1B: std::_Lockit::~_Lockit.LIBCPMT ref: 004F2C46
                        • codecvt.LIBCPMT ref: 004F66A8
                        • std::_Facet_Register.LIBCPMT ref: 004F66BF
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 004F66DF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                        • String ID:
                        • API String ID: 712880209-0
                        • Opcode ID: 927deb212a8bf6fff85f2f2f5f288b34e1a99e5509a430f04952be11db746b07
                        • Instruction ID: 23862da12aa29f8173c620d3bcfe242af0f36ecbdcff97564afe49a4273fd8ae
                        • Opcode Fuzzy Hash: 927deb212a8bf6fff85f2f2f5f288b34e1a99e5509a430f04952be11db746b07
                        • Instruction Fuzzy Hash: B811D27190022D9BCB00EB65D9466BEBBF4AF84314F11050FE605A7382DF789A01CB89
                        APIs
                        • GetLastError.KERNEL32(?,?,004FB36B,004F9930,004F585E,25454A19,?,?,?,?,00513C63,000000FF), ref: 004FB382
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004FB390
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004FB3A9
                        • SetLastError.KERNEL32(00000000,?,004FB36B,004F9930,004F585E,25454A19,?,?,?,?,00513C63,000000FF), ref: 004FB3FB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: bc3aa5e2c8f5276cdbcc170fa598aff66fc1b851fb68cd80d86c0932b7c678c8
                        • Instruction ID: 4cdd39f2aacb05be0b7d443af9b71367db93d3a15a4b42412e3961b49f02509c
                        • Opcode Fuzzy Hash: bc3aa5e2c8f5276cdbcc170fa598aff66fc1b851fb68cd80d86c0932b7c678c8
                        • Instruction Fuzzy Hash: 7101D83614922D6F9A542B7AFCC68772A54EB33379320022FFB10851F1EF9A4D4A61DC
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,25454A19,?,?,00000000,00513E8A,000000FF,?,00501FEE,?,?,00501FC2,00000016), ref: 00502096
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005020A8
                        • FreeLibrary.KERNEL32(00000000,?,00000000,00513E8A,000000FF,?,00501FEE,?,?,00501FC2,00000016), ref: 005020CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: e1e821fdc5dca99a05d58c664ee8b4081e5183fa752b01e685d4965c0c3b5353
                        • Instruction ID: 67bef8f275122921c738ab978b0f9b8516965923f8fd8d969de07d04197f24cc
                        • Opcode Fuzzy Hash: e1e821fdc5dca99a05d58c664ee8b4081e5183fa752b01e685d4965c0c3b5353
                        • Instruction Fuzzy Hash: EB018B35900629ABDB128F50DC1DBEEBFB8FB08B10F008629F811A22D0DBB49944CA90
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 004F5A5B
                        • AcquireSRWLockExclusive.KERNEL32(00000000,?,004F49A2,?,?,004F3B2B), ref: 004F5A7A
                        • AcquireSRWLockExclusive.KERNEL32(00000000,?,00000000,?,004F49A2,?,?,004F3B2B), ref: 004F5AA8
                        • TryAcquireSRWLockExclusive.KERNEL32(00000000,?,00000000,?,004F49A2,?,?,004F3B2B), ref: 004F5B03
                        • TryAcquireSRWLockExclusive.KERNEL32(00000000,?,00000000,?,004F49A2,?,?,004F3B2B), ref: 004F5B1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: AcquireExclusiveLock$CurrentThread
                        • String ID:
                        • API String ID: 66001078-0
                        • Opcode ID: 26d72449e0d0cd7597b6fdfe012cdbdc39a9b1ce2f5a9a127ef516b36292bc6c
                        • Instruction ID: e26dde74e9b3a0b3ded41edf41f0590dfb5a054ba3a8af26e9e849302c310d0c
                        • Opcode Fuzzy Hash: 26d72449e0d0cd7597b6fdfe012cdbdc39a9b1ce2f5a9a127ef516b36292bc6c
                        • Instruction Fuzzy Hash: 92412830900E0ADBCB20DF65C4859BAB7F4FF08311B104A6BD7569B640D738F995CB69
                        APIs
                        • __EH_prolog3.LIBCMT ref: 004F5F62
                        • std::_Lockit::_Lockit.LIBCPMT ref: 004F5F6D
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 004F5FDB
                          • Part of subcall function 004F60BE: std::locale::_Locimp::_Locimp.LIBCPMT ref: 004F60D6
                        • std::locale::_Setgloballocale.LIBCPMT ref: 004F5F88
                        • _Yarn.LIBCPMT ref: 004F5F9E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                        • String ID:
                        • API String ID: 1088826258-0
                        • Opcode ID: 824be4ea7a56739cd8764a32d624cb8ecc71fa102c5968c10ad2507d173458ae
                        • Instruction ID: 4f1da6579c44cb9e0a7222b88cf95d9ff552177e164b944e983d04515d2f6565
                        • Opcode Fuzzy Hash: 824be4ea7a56739cd8764a32d624cb8ecc71fa102c5968c10ad2507d173458ae
                        • Instruction Fuzzy Hash: 16014234A006289BCB06EF20DC415BEBBB1BF95300B14400EFA0157391CF78AE42EBC9
                        APIs
                        • __alloca_probe_16.LIBCMT ref: 004F59A7
                        • RaiseException.KERNEL32(?,?,?,004F4BEB,?,?,?,?,?,?,?,?,?,?,004F4BEB,00000001), ref: 004F59CC
                          • Part of subcall function 004F9362: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,004F4ED4,?,0051FDA8,?), ref: 004F93C2
                          • Part of subcall function 004FC9FB: IsProcessorFeaturePresent.KERNEL32(00000017,004FC782,?,004FC6F1,004F4EC6,00000016,004FC900,?,?,?,?,?,00000000,?,?), ref: 004FCA17
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                        • String ID: csm$KO
                        • API String ID: 1924019822-2281408922
                        • Opcode ID: ac21ee4a7c608b98ba93a0d507ce1a5f6cb8eeb82f5821d77f86816f6666c0f6
                        • Instruction ID: 73136abd4a64b68d3b2b5af7c09137d98c1d76c2a1726801fb9765b2ad17de7a
                        • Opcode Fuzzy Hash: ac21ee4a7c608b98ba93a0d507ce1a5f6cb8eeb82f5821d77f86816f6666c0f6
                        • Instruction Fuzzy Hash: D721BD71D0061CDBCF28DF95D845ABFB7B8AF04324F54080EE705AB250DAB8AD45CB98
                        APIs
                        • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,004FC428,?,?,00000000,?,?,?,004FC552,00000002,FlsGetValue,00518080,FlsGetValue), ref: 004FC484
                        • GetLastError.KERNEL32(?,004FC428,?,?,00000000,?,?,?,004FC552,00000002,FlsGetValue,00518080,FlsGetValue,?,?,004FB395), ref: 004FC48E
                        • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 004FC4B6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID: api-ms-
                        • API String ID: 3177248105-2084034818
                        • Opcode ID: ebb5997972e14e8c5fb7a5d6f7d064a34a5e58d78770f9e4f2c35b76be189f63
                        • Instruction ID: e9a4d7e33670fecbec3ea0543cbfbc79dcd319a735958b30b907a831a9335db5
                        • Opcode Fuzzy Hash: ebb5997972e14e8c5fb7a5d6f7d064a34a5e58d78770f9e4f2c35b76be189f63
                        • Instruction Fuzzy Hash: 3BE0483028020CB7EF202B50DD4ABB93E59AB54B44F118021FB0CA45E1DB759954A644
                        APIs
                        • GetConsoleOutputCP.KERNEL32(25454A19,00000000,00000000,00000000), ref: 00507E75
                          • Part of subcall function 0050A79E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,005079EE,?,00000000,-00000008), ref: 0050A84A
                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 005080D0
                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00508118
                        • GetLastError.KERNEL32 ref: 005081BB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                        • String ID:
                        • API String ID: 2112829910-0
                        • Opcode ID: b3254420026eafd2c9298f1029cebc3a580448ecc0bdf8bf141132d4482c89bc
                        • Instruction ID: 50868425facf094ececc3f84e3512e2e71d5a87a2a6d17d9ebe13ead221fea41
                        • Opcode Fuzzy Hash: b3254420026eafd2c9298f1029cebc3a580448ecc0bdf8bf141132d4482c89bc
                        • Instruction Fuzzy Hash: 81D169B5D042599FCF11CFA8D8849ADBFB4FF48304F18852AE966E7391DB30A946CB50
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: AdjustPointer
                        • String ID:
                        • API String ID: 1740715915-0
                        • Opcode ID: 81b35cb02d5339c35f475b35e0e3e49564a16940a1526c667833a3ad2ce2cfc8
                        • Instruction ID: 368d318b9133c5be1e39372f545c00db216b29296fe4943a74c43a01a5a82eb0
                        • Opcode Fuzzy Hash: 81b35cb02d5339c35f475b35e0e3e49564a16940a1526c667833a3ad2ce2cfc8
                        • Instruction Fuzzy Hash: A051BFB260020EAFDB299F25D841BBA77A5EF06318F14452FEA0187291D73DEC41CBD8
                        APIs
                          • Part of subcall function 0050A79E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,005079EE,?,00000000,-00000008), ref: 0050A84A
                        • GetLastError.KERNEL32 ref: 0050AAC2
                        • __dosmaperr.LIBCMT ref: 0050AAC9
                        • GetLastError.KERNEL32(?,?,?,?), ref: 0050AB03
                        • __dosmaperr.LIBCMT ref: 0050AB0A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                        • String ID:
                        • API String ID: 1913693674-0
                        • Opcode ID: bafc7ba68f4ad8d5c815bf444415ab4636ee682df214cfa4f72856586b18396f
                        • Instruction ID: fce6c36902afa2e1eaadc468e79941ecbb80550eedc886b638a948d90ef28cf8
                        • Opcode Fuzzy Hash: bafc7ba68f4ad8d5c815bf444415ab4636ee682df214cfa4f72856586b18396f
                        • Instruction Fuzzy Hash: 85217C7160070AAFDB20AF658999D6FBFA9FF843647148519F929971D0E730EC40CBA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7f3d8dd0f34c493664aa5583f0e1f94bf503939b5a3a5d6875a42eae2aada9ce
                        • Instruction ID: a2a0f5677dfc127f67a9b8836a98ff9468572be77bd53ca0b8310ba9e154e518
                        • Opcode Fuzzy Hash: 7f3d8dd0f34c493664aa5583f0e1f94bf503939b5a3a5d6875a42eae2aada9ce
                        • Instruction Fuzzy Hash: 8B21A131600A06AFDB20AF61CC98D6F7FA9FF903647148525F815971C0D730ED40C796
                        APIs
                        • GetEnvironmentStringsW.KERNEL32 ref: 0050B9FC
                          • Part of subcall function 0050A79E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,005079EE,?,00000000,-00000008), ref: 0050A84A
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0050BA34
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0050BA54
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                        • String ID:
                        • API String ID: 158306478-0
                        • Opcode ID: 4fc754c40661dfce61e1349b84556fe34e545df722e3fe1cda8777cea3b5e6d7
                        • Instruction ID: 217c31a7b0f7e3ed1e9a451f3ad6f26c263ad4a0461d2cbc33c66899fafa2821
                        • Opcode Fuzzy Hash: 4fc754c40661dfce61e1349b84556fe34e545df722e3fe1cda8777cea3b5e6d7
                        • Instruction Fuzzy Hash: 2D11EDB2A0560A7EFA11ABB25CCECBF7E6CFFD52983104425F90291281FB20DE00D571
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 004F1F67
                        • int.LIBCPMT ref: 004F1F7A
                          • Part of subcall function 004F2C1B: std::_Lockit::_Lockit.LIBCPMT ref: 004F2C2C
                          • Part of subcall function 004F2C1B: std::_Lockit::~_Lockit.LIBCPMT ref: 004F2C46
                        • std::_Facet_Register.LIBCPMT ref: 004F1FAD
                        • std::_Lockit::~_Lockit.LIBCPMT ref: 004F1FC3
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                        • String ID:
                        • API String ID: 459529453-0
                        • Opcode ID: 518c7b1cbb1c51f8a718cc7b325363fab32ca742cd909fb4a4acc77c8039bddd
                        • Instruction ID: b10ee2adf83ba6022dbe1b9979caff1bea15a07e19a0e01063308403cbf13f98
                        • Opcode Fuzzy Hash: 518c7b1cbb1c51f8a718cc7b325363fab32ca742cd909fb4a4acc77c8039bddd
                        • Instruction Fuzzy Hash: BA01887190011CEBC714AB56E8458BE7BA8DF80764B10015FF615A73A1DF789E419798
                        APIs
                        • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00510770,00000000,00000001,00000000,00000000,?,0050820F,00000000,00000000,00000000), ref: 00511E46
                        • GetLastError.KERNEL32(?,00510770,00000000,00000001,00000000,00000000,?,0050820F,00000000,00000000,00000000,00000000,00000000,?,00508796,?), ref: 00511E52
                          • Part of subcall function 00511E18: CloseHandle.KERNEL32(FFFFFFFE,00511E62,?,00510770,00000000,00000001,00000000,00000000,?,0050820F,00000000,00000000,00000000,00000000,00000000), ref: 00511E28
                        • ___initconout.LIBCMT ref: 00511E62
                          • Part of subcall function 00511DDA: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00511E09,0051075D,00000000,?,0050820F,00000000,00000000,00000000,00000000), ref: 00511DED
                        • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,?,00510770,00000000,00000001,00000000,00000000,?,0050820F,00000000,00000000,00000000,00000000), ref: 00511E77
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                        • String ID:
                        • API String ID: 2744216297-0
                        • Opcode ID: eac3bafe63c2d9c6c1bb3a6bcbbe7a80b33ba03247976e8d50ee889d2a4aab38
                        • Instruction ID: 874194269571cdde057dcdf42df98512fb295a8f61bbb789168e6bd9bea6261b
                        • Opcode Fuzzy Hash: eac3bafe63c2d9c6c1bb3a6bcbbe7a80b33ba03247976e8d50ee889d2a4aab38
                        • Instruction Fuzzy Hash: 8BF03036441615BBDF622FD5EC08ECA3F66FF693A1B008160FE2986131C7728864EBD5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID:
                        • String ID: PV$PV
                        • API String ID: 0-2024304159
                        • Opcode ID: e05543e6efa093a43a6d77d4f56f0c7a7276926c69408e0b8d267aa41d5d357e
                        • Instruction ID: 33026d33a9de3d69e89669a5c63547bb57fee1a3183d708b1500a1674a49db68
                        • Opcode Fuzzy Hash: e05543e6efa093a43a6d77d4f56f0c7a7276926c69408e0b8d267aa41d5d357e
                        • Instruction Fuzzy Hash: DEC10775D44209ABDB20DBA8CC86FEE7FF8BB49700F144555FA05FB2C2E670A9419B60
                        APIs
                          • Part of subcall function 00504BEB: HeapFree.KERNEL32(00000000,00000000,?,0050CA85,?,00000000,?,?,0050CD26,?,00000007,?,?,0050D21F,?,?), ref: 00504C01
                          • Part of subcall function 00504BEB: GetLastError.KERNEL32(?,?,0050CA85,?,00000000,?,?,0050CD26,?,00000007,?,?,0050D21F,?,?), ref: 00504C0C
                        • ___free_lconv_mon.LIBCMT ref: 0050D0CC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: ErrorFreeHeapLast___free_lconv_mon
                        • String ID: PV$xV
                        • API String ID: 4068849827-2300119770
                        • Opcode ID: fb3408aad42d9b8669546eacc38ebe7f73d027b2c1d66f5a399bac553665f1d9
                        • Instruction ID: 9441d643823157fa4a23dd90b1bf7f6fcba1241c720736040d99a04cd4011498
                        • Opcode Fuzzy Hash: fb3408aad42d9b8669546eacc38ebe7f73d027b2c1d66f5a399bac553665f1d9
                        • Instruction Fuzzy Hash: 823118756087029FEB21AEB9D889B5EBBF8FF80310F148819E159971D1DE74F941CA20
                        APIs
                        • EncodePointer.KERNEL32(00000000,?), ref: 004FBAAC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: EncodePointer
                        • String ID: MOC$RCC
                        • API String ID: 2118026453-2084237596
                        • Opcode ID: 8129257d3c99e1fd658878fedc700ec64833b2b9572e17c63d3a1894e63c4fd1
                        • Instruction ID: d2aa101c91b3d32ff3128b75691a7d6dd82b4ee14862a25e63fe315124884345
                        • Opcode Fuzzy Hash: 8129257d3c99e1fd658878fedc700ec64833b2b9572e17c63d3a1894e63c4fd1
                        • Instruction Fuzzy Hash: 2E41587190020DAFCF16DF95CD81EEEBBB5FF49304F14819AFA04A6225D339AA50DB94
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 004F8AEE
                        • ___raise_securityfailure.LIBCMT ref: 004F8BAB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: FeaturePresentProcessor___raise_securityfailure
                        • String ID: /<P
                        • API String ID: 3761405300-3569938628
                        • Opcode ID: 8fecf3e2a38f2579bf01b2bfe1ec92fde58db353dc978f52b9b71e2c41818760
                        • Instruction ID: 3b4b3ca570c4da9310f1730419bdd97ca7f40ce2fdefe864ca6a1a55421f9cc5
                        • Opcode Fuzzy Hash: 8fecf3e2a38f2579bf01b2bfe1ec92fde58db353dc978f52b9b71e2c41818760
                        • Instruction Fuzzy Hash: 4911F0B4550305CBCB50CF19F984A443BEABB68304F00601AE61C8B3E1E3B0A5C9BF44
                        APIs
                        • std::_Lockit::_Lockit.LIBCPMT ref: 004F22CF
                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004F2307
                          • Part of subcall function 004F6059: _Yarn.LIBCPMT ref: 004F6078
                          • Part of subcall function 004F6059: _Yarn.LIBCPMT ref: 004F609C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                        • String ID: bad locale name
                        • API String ID: 1908188788-1405518554
                        • Opcode ID: 69274e9879feb9adbc8a17969faec18bce4bcca2681619bf193536c9fe9a6305
                        • Instruction ID: 90a42792e848f43a7a4ad76b2c081d1ba645c817345a11512d1871d89f384f28
                        • Opcode Fuzzy Hash: 69274e9879feb9adbc8a17969faec18bce4bcca2681619bf193536c9fe9a6305
                        • Instruction Fuzzy Hash: 35F01D71505B449E83309F7A9481457FBE4BE292103508E2FE1DEC3A12D734A404CB6D
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: H_prolog3
                        • String ID: TV$\gQ
                        • API String ID: 431132790-677070127
                        • Opcode ID: 752925aaa6407c2aaf0aa83d7111ab5c942c39da657e1628aa6765fc96994d83
                        • Instruction ID: a1d77cc148940a9c9ef6232b9f65d2864b3520a6af0f9d24b173de097c765e1b
                        • Opcode Fuzzy Hash: 752925aaa6407c2aaf0aa83d7111ab5c942c39da657e1628aa6765fc96994d83
                        • Instruction Fuzzy Hash: 9CE0D8B89422099AEB00AB95890B7EC7DF0BB1171CF90024DB1217F2D1DFF9070A4B52
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1655414684.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
                        • Associated: 00000000.00000002.1655384104.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655451157.0000000000516000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000522000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000556000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655478069.0000000000565000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1655526997.0000000000571000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_4f0000_FkJbps6Srrl6lOQ9M_l8dpw2.jbxd
                        Yara matches
                        Similarity
                        • API ID: H_prolog3
                        • String ID: HbQ$`V
                        • API String ID: 431132790-39652462
                        • Opcode ID: 4a691927aab97ce458b902ff6a7b6c1d0dae987db4bd56b645b08e9818e7ef2a
                        • Instruction ID: 929569b9bf5d432e6cf22105d2a0e780651c1e5551f0cfebbfdd9cc91b0da0fe
                        • Opcode Fuzzy Hash: 4a691927aab97ce458b902ff6a7b6c1d0dae987db4bd56b645b08e9818e7ef2a
                        • Instruction Fuzzy Hash: DCE09274A0160996EB00AB9189076ED7DE0BB1170CF80434DE1207F2E1EBF94A844F55

                        Execution Graph

                        Execution Coverage:10%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:66
                        Total number of Limit Nodes:10
                        execution_graph 40000 270d300 DuplicateHandle 40001 270d396 40000->40001 39919 270d0b8 39920 270d0fe GetCurrentProcess 39919->39920 39922 270d150 GetCurrentThread 39920->39922 39923 270d149 39920->39923 39924 270d18d GetCurrentProcess 39922->39924 39926 270d186 39922->39926 39923->39922 39925 270d1c3 39924->39925 39927 270d1eb GetCurrentThreadId 39925->39927 39926->39924 39928 270d21c 39927->39928 39929 270ad38 39933 270ae30 39929->39933 39941 270ae20 39929->39941 39930 270ad47 39934 270ae41 39933->39934 39935 270ae64 39933->39935 39934->39935 39949 270b0c8 39934->39949 39953 270b0b8 39934->39953 39935->39930 39936 270ae5c 39936->39935 39937 270b068 GetModuleHandleW 39936->39937 39938 270b095 39937->39938 39938->39930 39942 270ae41 39941->39942 39944 270ae64 39941->39944 39942->39944 39947 270b0c8 LoadLibraryExW 39942->39947 39948 270b0b8 LoadLibraryExW 39942->39948 39943 270ae5c 39943->39944 39945 270b068 GetModuleHandleW 39943->39945 39944->39930 39946 270b095 39945->39946 39946->39930 39947->39943 39948->39943 39950 270b0dc 39949->39950 39952 270b101 39950->39952 39957 270a870 39950->39957 39952->39936 39954 270b0dc 39953->39954 39955 270a870 LoadLibraryExW 39954->39955 39956 270b101 39954->39956 39955->39956 39956->39936 39958 270b2a8 LoadLibraryExW 39957->39958 39960 270b321 39958->39960 39960->39952 39979 2704668 39980 2704684 39979->39980 39981 2704696 39980->39981 39983 27047a0 39980->39983 39984 27047c5 39983->39984 39988 27048b0 39984->39988 39992 27048a1 39984->39992 39990 27048d7 39988->39990 39989 27049b4 39989->39989 39990->39989 39996 2704248 39990->39996 39994 27048b0 39992->39994 39993 27049b4 39993->39993 39994->39993 39995 2704248 CreateActCtxA 39994->39995 39995->39993 39997 2705940 CreateActCtxA 39996->39997 39999 2705a03 39997->39999 39961 74f4801 39962 74f479c 39961->39962 39963 74f480a 39961->39963 39967 74f5891 39962->39967 39971 74f58a0 39962->39971 39964 74f47bd 39968 74f58a1 39967->39968 39970 74f58f1 39968->39970 39975 74f556c 39968->39975 39970->39964 39972 74f58e8 39971->39972 39973 74f556c LoadLibraryW 39972->39973 39974 74f58f1 39972->39974 39973->39974 39974->39964 39976 74f59e8 LoadLibraryW 39975->39976 39978 74f5a5d 39976->39978 39978->39970

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1773 74f0040-74f0072 1774 74f0079-74f0145 1773->1774 1775 74f0074 1773->1775 1780 74f015a 1774->1780 1781 74f0147-74f0155 1774->1781 1775->1774 1851 74f0160 call 74f0a86 1780->1851 1852 74f0160 call 74f09f6 1780->1852 1853 74f0160 call 74f0901 1780->1853 1854 74f0160 call 74f09b0 1780->1854 1782 74f0608-74f0615 1781->1782 1783 74f0166-74f018f 1844 74f0195 call 74fcb98 1783->1844 1845 74f0195 call 74fca08 1783->1845 1846 74f0195 call 74fc9f8 1783->1846 1847 74f0195 call 74fc9c1 1783->1847 1785 74f019b-74f0204 1848 74f0206 call 74fedc8 1785->1848 1849 74f0206 call 74fedd8 1785->1849 1850 74f0206 call 74ff258 1785->1850 1790 74f020c-74f0216 1791 74f0597-74f05c1 1790->1791 1793 74f021b-74f0431 1791->1793 1794 74f05c7-74f0606 1791->1794 1821 74f043d-74f0487 1793->1821 1794->1782 1824 74f048f-74f0491 1821->1824 1825 74f0489 1821->1825 1826 74f0498-74f049f 1824->1826 1827 74f048b-74f048d 1825->1827 1828 74f0493 1825->1828 1829 74f0519-74f053f 1826->1829 1830 74f04a1-74f0518 1826->1830 1827->1824 1827->1828 1828->1826 1833 74f054c-74f0558 1829->1833 1834 74f0541-74f054a 1829->1834 1830->1829 1835 74f055e-74f057d 1833->1835 1834->1835 1839 74f057f-74f0592 1835->1839 1840 74f0593-74f0594 1835->1840 1839->1840 1840->1791 1844->1785 1845->1785 1846->1785 1847->1785 1848->1790 1849->1790 1850->1790 1851->1783 1852->1783 1853->1783 1854->1783
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1888297708.00000000074F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_74f0000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: .$1
                        • API String ID: 0-1839485796
                        • Opcode ID: 1640cbe986b13d0b3ee113defe7f49cba37dbbb7119acfe531e48c73df4d0aa5
                        • Instruction ID: 71ee40ad17f3c58329d512025fb241d544dee7c232cbe7dec8f314caeea57cbc
                        • Opcode Fuzzy Hash: 1640cbe986b13d0b3ee113defe7f49cba37dbbb7119acfe531e48c73df4d0aa5
                        • Instruction Fuzzy Hash: 87F1EF74E01229CFDB68DF65C884BEDBBB2BF89301F1095AAD50AA7250DB315E85CF10
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q
                        • API String ID: 0-388095546
                        • Opcode ID: 04232cbae5e94253064b64b8fc0209fe3696d46f1cd768706658d163965eaa27
                        • Instruction ID: 05f36768a44e24d48e4ecfebce317d64a723ebde604f59152d0a7252a19afa46
                        • Opcode Fuzzy Hash: 04232cbae5e94253064b64b8fc0209fe3696d46f1cd768706658d163965eaa27
                        • Instruction Fuzzy Hash: 7B126E34B002158FDB55EF69C585AAEBBF2FF88740B14816AE506EB365DB31DC42CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: ^q0
                        • API String ID: 0-2308874931
                        • Opcode ID: 188c664579605c2c0f6ed4f73d391d06d1ae8f152936f318e4ce3bb3adf70cf9
                        • Instruction ID: b3045cf2ddc7965fd3c0cd45b4accf5060267c055ecdd3f70401f39040fb605d
                        • Opcode Fuzzy Hash: 188c664579605c2c0f6ed4f73d391d06d1ae8f152936f318e4ce3bb3adf70cf9
                        • Instruction Fuzzy Hash: F3D10834D00219CFCB64EFB4D844A9DBBB2FF8A301F1081A9D50AAB354DB31598ACF11
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: ^q0
                        • API String ID: 0-2308874931
                        • Opcode ID: b025b4cdb92e2aecf05b76b0dfe0facadcf460838b29a0cdb9682b51116eb5ec
                        • Instruction ID: 01d5afe0a3b566bfd30ba23c778cbe7e1de3b500e4f714b63a88beac348a25f2
                        • Opcode Fuzzy Hash: b025b4cdb92e2aecf05b76b0dfe0facadcf460838b29a0cdb9682b51116eb5ec
                        • Instruction Fuzzy Hash: 0BD1E734D00219CFCB68EFB5D844A9DBBB2FF8A301F109569D50AAB394DB31598ADF11
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 02c6402d0cef308f801bc8dde925e8f0ad95acff4ee6f5c776c2324500902285
                        • Instruction ID: d017a9b2f270dba4993c734b07a83e824d45efbb44640ee8aa9fa21833f072fc
                        • Opcode Fuzzy Hash: 02c6402d0cef308f801bc8dde925e8f0ad95acff4ee6f5c776c2324500902285
                        • Instruction Fuzzy Hash: BCF1B031A002099FDB05DF68D985B9EBBF2EF89300F15856AE405EB365DB31ED46CB90

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 294 6420d80-6420dcb 299 6420dd1-6420dd3 294->299 300 6420efd-6420f10 294->300 301 6420dd6-6420de5 299->301 304 6421006-6421011 300->304 305 6420f16-6420f25 300->305 307 6420deb-6420e1d 301->307 308 6420e9d-6420ea1 301->308 306 6421019-6421022 304->306 312 6420fd1-6420fd5 305->312 313 6420f2b-6420f51 305->313 342 6420e26-6420e2d 307->342 343 6420e1f-6420e24 307->343 309 6420ea3-6420eae 308->309 310 6420eb0 308->310 315 6420eb5-6420eb8 309->315 310->315 317 6420fd7-6420fe2 312->317 318 6420fe4 312->318 344 6420f53-6420f58 313->344 345 6420f5a-6420f61 313->345 315->306 316 6420ebe-6420ec2 315->316 321 6420ed1 316->321 322 6420ec4-6420ecf 316->322 320 6420fe6-6420fe8 317->320 318->320 325 6420fea-6420ff4 320->325 326 6421039-64210b5 320->326 327 6420ed3-6420ed5 321->327 322->327 337 6420ff7-6421000 325->337 376 64210bb-64210bd 326->376 377 6421189-642119c 326->377 331 6421025-6421032 327->331 332 6420edb-6420ee5 327->332 331->326 346 6420ee8-6420ef2 332->346 337->304 337->305 350 6420e52-6420e76 342->350 351 6420e2f-6420e50 342->351 347 6420e91-6420e9b 343->347 349 6420fc5-6420fcf 344->349 352 6420f63-6420f84 345->352 353 6420f86-6420faa 345->353 346->301 348 6420ef8 346->348 347->346 348->306 349->337 366 6420e78-6420e7e 350->366 367 6420e8e 350->367 351->347 352->349 368 6420fc2 353->368 369 6420fac-6420fb2 353->369 371 6420e82-6420e84 366->371 372 6420e80 366->372 367->347 368->349 373 6420fb6-6420fb8 369->373 374 6420fb4 369->374 371->367 372->367 373->368 374->368 378 64210c0-64210cf 376->378 381 64211a2-64211b1 377->381 382 6421234-642123f 377->382 383 64210d1-64210fe 378->383 384 6421129-642112d 378->384 390 64211b3-64211dc 381->390 391 64211ff-6421203 381->391 386 6421247-6421250 382->386 406 6421104-6421106 383->406 387 642112f-642113a 384->387 388 642113c 384->388 389 6421141-6421144 387->389 388->389 389->386 393 642114a-642114e 389->393 415 64211f4-64211fd 390->415 416 64211de-64211e4 390->416 395 6421212 391->395 396 6421205-6421210 391->396 398 6421150-642115b 393->398 399 642115d 393->399 400 6421214-6421216 395->400 396->400 405 642115f-6421161 398->405 399->405 403 6421267-6421284 400->403 404 6421218-6421222 400->404 428 6421286-6421290 403->428 429 6421298-64212af 403->429 419 6421225-642122e 404->419 409 6421253-6421260 405->409 410 6421167-6421171 405->410 412 6421108-642110e 406->412 413 642111e-6421127 406->413 409->403 426 6421174-642117e 410->426 417 6421112-6421114 412->417 418 6421110 412->418 413->426 415->419 420 64211e6 416->420 421 64211e8-64211ea 416->421 417->413 418->413 419->381 419->382 420->415 421->415 426->378 430 6421184 426->430 431 6421292-6421293 428->431 432 64212dd-64212e9 428->432 435 64212b1-64212b7 429->435 436 64212c7-64212dc 429->436 430->386 431->429 437 64212ec-64212f0 432->437 438 64212bb-64212bd 435->438 439 64212b9 435->439 436->432 440 64212f2-64212f7 437->440 441 64212f9-64212fe 437->441 438->436 439->436 443 6421304-6421307 440->443 441->443 444 64214f8-6421500 443->444 445 642130d-6421322 443->445 445->437 447 6421324 445->447 448 64213e0-6421405 447->448 449 642132b-6421350 447->449 450 6421498-64214b9 447->450 460 6421407-6421409 448->460 461 642140b-642140f 448->461 462 6421352-6421354 449->462 463 6421356-642135a 449->463 455 64214bf-64214f3 450->455 455->437 464 642146d-6421493 460->464 465 6421430-6421453 461->465 466 6421411-642142e 461->466 467 64213b8-64213db 462->467 468 642137b-642139e 463->468 469 642135c-6421379 463->469 464->437 484 6421455-642145b 465->484 485 642146b 465->485 466->464 467->437 486 64213a0-64213a6 468->486 487 64213b6 468->487 469->467 490 642145f-6421461 484->490 491 642145d 484->491 485->464 488 64213aa-64213ac 486->488 489 64213a8 486->489 487->467 488->487 489->487 490->485 491->485
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-2449488485
                        • Opcode ID: 5905c18271c0a639d48b9a7629bf53b2f6866081081a333d9119e96b3e246509
                        • Instruction ID: 306c0996f9f5315075ec51730c273699283403a92d231fe1940a0b923d79ba04
                        • Opcode Fuzzy Hash: 5905c18271c0a639d48b9a7629bf53b2f6866081081a333d9119e96b3e246509
                        • Instruction Fuzzy Hash: 8132C030B002268FDB559F69C844A6EBBF6FF89700B65845AE506DB3A6CF70DC41CB91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1253 6421584 1254 642158e 1253->1254 1255 6421598-64215af 1254->1255 1256 64215b5-64215b7 1255->1256 1257 64215b9-64215bf 1256->1257 1258 64215cf-64215f1 1256->1258 1259 64215c3-64215c5 1257->1259 1260 64215c1 1257->1260 1263 6421638-642163f 1258->1263 1259->1258 1260->1258 1264 6421571-6421580 1263->1264 1265 6421645-6421747 1263->1265 1268 6421582 1264->1268 1269 64215f3-64215f7 1264->1269 1268->1253 1270 6421606 1269->1270 1271 64215f9-6421604 1269->1271 1273 642160b-642160e 1270->1273 1271->1273 1273->1265 1276 6421610-6421614 1273->1276 1277 6421623 1276->1277 1278 6421616-6421621 1276->1278 1279 6421625-6421627 1277->1279 1278->1279 1280 642174a-642176b 1279->1280 1281 642162d-6421637 1279->1281 1287 642176e-6421775 1280->1287 1281->1263 1287->1287 1288 6421777-642177c 1287->1288 1289 6421795-64217a7 1288->1289 1290 642177e-6421794 1288->1290 1292 64217a9-64217af 1289->1292 1293 64217bf-64217e1 1289->1293 1290->1289 1294 64217b3-64217b5 1292->1294 1295 64217b1 1292->1295 1298 64217e4-64217e8 1293->1298 1294->1293 1295->1293 1299 64217f1-64217f6 1298->1299 1300 64217ea-64217ef 1298->1300 1301 64217fc-64217ff 1299->1301 1300->1301 1302 6421805-642181a 1301->1302 1303 6421abf-6421ac7 1301->1303 1302->1298 1305 642181c 1302->1305 1306 6421823-64218d3 1305->1306 1307 6421990-64219bd 1305->1307 1308 6421a07-6421a2c 1305->1308 1309 64218d8-642198b 1305->1309 1306->1298 1329 64219c3-64219cd 1307->1329 1330 6421b36-6421b71 1307->1330 1325 6421a32-6421a36 1308->1325 1326 6421a2e-6421a30 1308->1326 1309->1298 1332 6421a57-6421a7a 1325->1332 1333 6421a38-6421a55 1325->1333 1331 6421a94-6421aba 1326->1331 1334 64219d3-6421a02 1329->1334 1335 6421b00-6421b2f 1329->1335 1331->1298 1352 6421a92 1332->1352 1353 6421a7c-6421a82 1332->1353 1333->1331 1334->1298 1335->1330 1352->1331 1355 6421a86-6421a88 1353->1355 1356 6421a84 1353->1356 1355->1352 1356->1352
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                        • API String ID: 0-2392861976
                        • Opcode ID: e949917533a8a8c8d8ecf3009fd0804cf7d2d698a8132eb1f85563153edbda44
                        • Instruction ID: 0f017e27dbb6495f081aafda881cf5d7fd568a6dc523c1ffb08c639834b4f7b6
                        • Opcode Fuzzy Hash: e949917533a8a8c8d8ecf3009fd0804cf7d2d698a8132eb1f85563153edbda44
                        • Instruction Fuzzy Hash: 32C1B430B002669FDB55AB64C854A2F77E6AFC9700F60445AE603CB3A2DF75DC46C791

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1443 270d0a8-270d147 GetCurrentProcess 1447 270d150-270d184 GetCurrentThread 1443->1447 1448 270d149-270d14f 1443->1448 1449 270d186-270d18c 1447->1449 1450 270d18d-270d1c1 GetCurrentProcess 1447->1450 1448->1447 1449->1450 1452 270d1c3-270d1c9 1450->1452 1453 270d1ca-270d1e5 call 270d289 1450->1453 1452->1453 1456 270d1eb-270d21a GetCurrentThreadId 1453->1456 1457 270d223-270d285 1456->1457 1458 270d21c-270d222 1456->1458 1458->1457
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 0270D136
                        • GetCurrentThread.KERNEL32 ref: 0270D173
                        • GetCurrentProcess.KERNEL32 ref: 0270D1B0
                        • GetCurrentThreadId.KERNEL32 ref: 0270D209
                        Memory Dump Source
                        • Source File: 00000003.00000002.1880319435.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2700000_RegAsm.jbxd
                        Similarity
                        • API ID: Current$ProcessThread
                        • String ID:
                        • API String ID: 2063062207-0
                        • Opcode ID: 7c68f2c935a683e2975fd28849349ca5a68db1c79677b02aa6c3375426c91799
                        • Instruction ID: 972c6ab29cb5db5688fa81e038329b01db49e7652cea9ff4a3572408e6a4d559
                        • Opcode Fuzzy Hash: 7c68f2c935a683e2975fd28849349ca5a68db1c79677b02aa6c3375426c91799
                        • Instruction Fuzzy Hash: 3F5158B0901349CFDB14DFAAD548B9EBBF1EF48314F208069E019A73A0DB749985CF65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1465 270d0b8-270d147 GetCurrentProcess 1469 270d150-270d184 GetCurrentThread 1465->1469 1470 270d149-270d14f 1465->1470 1471 270d186-270d18c 1469->1471 1472 270d18d-270d1c1 GetCurrentProcess 1469->1472 1470->1469 1471->1472 1474 270d1c3-270d1c9 1472->1474 1475 270d1ca-270d1e5 call 270d289 1472->1475 1474->1475 1478 270d1eb-270d21a GetCurrentThreadId 1475->1478 1479 270d223-270d285 1478->1479 1480 270d21c-270d222 1478->1480 1480->1479
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 0270D136
                        • GetCurrentThread.KERNEL32 ref: 0270D173
                        • GetCurrentProcess.KERNEL32 ref: 0270D1B0
                        • GetCurrentThreadId.KERNEL32 ref: 0270D209
                        Memory Dump Source
                        • Source File: 00000003.00000002.1880319435.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2700000_RegAsm.jbxd
                        Similarity
                        • API ID: Current$ProcessThread
                        • String ID:
                        • API String ID: 2063062207-0
                        • Opcode ID: d372317bf2f8714a4376f52f3bcc36ae960c4e2d282c22e250191418f1b71559
                        • Instruction ID: 8ac62706d66f3c859d49b9af9dd5025b2e260f090eef5e19278ac3afcd40eed0
                        • Opcode Fuzzy Hash: d372317bf2f8714a4376f52f3bcc36ae960c4e2d282c22e250191418f1b71559
                        • Instruction Fuzzy Hash: 0B5159B0900349DFDB14DFAAD548B9EBBF1EF48314F208469E419A73A0DB74A984CF65

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1487 270ae30-270ae3f 1488 270ae41-270ae4e call 2709838 1487->1488 1489 270ae6b-270ae6f 1487->1489 1496 270ae50 1488->1496 1497 270ae64 1488->1497 1491 270ae71-270ae7b 1489->1491 1492 270ae83-270aec4 1489->1492 1491->1492 1498 270aed1-270aedf 1492->1498 1499 270aec6-270aece 1492->1499 1544 270ae56 call 270b0c8 1496->1544 1545 270ae56 call 270b0b8 1496->1545 1497->1489 1500 270aee1-270aee6 1498->1500 1501 270af03-270af05 1498->1501 1499->1498 1503 270aef1 1500->1503 1504 270aee8-270aeef call 270a814 1500->1504 1506 270af08-270af0f 1501->1506 1502 270ae5c-270ae5e 1502->1497 1505 270afa0-270afb7 1502->1505 1508 270aef3-270af01 1503->1508 1504->1508 1520 270afb9-270b018 1505->1520 1509 270af11-270af19 1506->1509 1510 270af1c-270af23 1506->1510 1508->1506 1509->1510 1511 270af30-270af39 call 270a824 1510->1511 1512 270af25-270af2d 1510->1512 1518 270af46-270af4b 1511->1518 1519 270af3b-270af43 1511->1519 1512->1511 1521 270af69-270af76 1518->1521 1522 270af4d-270af54 1518->1522 1519->1518 1538 270b01a-270b060 1520->1538 1527 270af78-270af96 1521->1527 1528 270af99-270af9f 1521->1528 1522->1521 1523 270af56-270af66 call 270a834 call 270a844 1522->1523 1523->1521 1527->1528 1539 270b062-270b065 1538->1539 1540 270b068-270b093 GetModuleHandleW 1538->1540 1539->1540 1541 270b095-270b09b 1540->1541 1542 270b09c-270b0b0 1540->1542 1541->1542 1544->1502 1545->1502
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0270B086
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1880319435.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2700000_RegAsm.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID: 0V$0V
                        • API String ID: 4139908857-4216712621
                        • Opcode ID: 8a663a6755432f0d371095bfaaacaa5078aab8f00998aea34eb78f409945dc15
                        • Instruction ID: 8114febfd4d9c00c38b7cce39a99dc2890d4fe767cf7f3c9a9f92e874d78f2c7
                        • Opcode Fuzzy Hash: 8a663a6755432f0d371095bfaaacaa5078aab8f00998aea34eb78f409945dc15
                        • Instruction Fuzzy Hash: BE7113B0A00B45CFDB24DF29D18575ABBF1FB88304F00892DD58A97A90D775E94ACB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: jlPj
                        • API String ID: 0-600715053
                        • Opcode ID: 18d2eb810ddd2e4fe0b6471332464424bca3c673d6143c4f83f0f9ef71c85343
                        • Instruction ID: a2e00ddd79071c8711e253b05275e9abfa956d5971e2b42bb02f322811f9099e
                        • Opcode Fuzzy Hash: 18d2eb810ddd2e4fe0b6471332464424bca3c673d6143c4f83f0f9ef71c85343
                        • Instruction Fuzzy Hash: 6D02AD30B402298FDB55AF64C954A2EBBF2FF85704F604859D5029F3A1CFB6ED468B81
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 027059F1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1880319435.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2700000_RegAsm.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: f5544c138bc00914dc01fc2b135d91adc623c3582c3ff5e6a0aaadd93febbf56
                        • Instruction ID: 79e503a5813c2e883dc61122e894b6198efd8c6c9436da93541e7f292eb481ee
                        • Opcode Fuzzy Hash: f5544c138bc00914dc01fc2b135d91adc623c3582c3ff5e6a0aaadd93febbf56
                        • Instruction Fuzzy Hash: 0941E0B0D00619CFDB24CFA9C98469DBBF5BF44304F24816AD409BB251DB75698ACF90
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 027059F1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1880319435.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2700000_RegAsm.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 4fe0f129e68c97b33b68ff5da5e2d9e2c75d3ca212f225a77fd940e478966195
                        • Instruction ID: 05bf1b93fbaf96e0da470b07b6a57c1292c4a712a1c83639a8530ff2db624f97
                        • Opcode Fuzzy Hash: 4fe0f129e68c97b33b68ff5da5e2d9e2c75d3ca212f225a77fd940e478966195
                        • Instruction Fuzzy Hash: BA41E0B0D00619CBDB24CFAAC884B9DBBF5FF44304F64816AD409BB250DB75698ACF90
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0270D387
                        Memory Dump Source
                        • Source File: 00000003.00000002.1880319435.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2700000_RegAsm.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 51fd30ab728ec3dfc342c84ec1da8a7ecdf7af5ced052eb16b7a69c0305e8b10
                        • Instruction ID: 01296a25b154c89fc378e23459efb6424f793696ebe3acf096a0157f222275c3
                        • Opcode Fuzzy Hash: 51fd30ab728ec3dfc342c84ec1da8a7ecdf7af5ced052eb16b7a69c0305e8b10
                        • Instruction Fuzzy Hash: FE21E3B5900258DFDB10CFAAD585AEEFFF4EB48324F14842AE918A7350C374A944CFA4
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0270D387
                        Memory Dump Source
                        • Source File: 00000003.00000002.1880319435.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2700000_RegAsm.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: d65ce28458083b72e90a9e781b1571cf6bf818b856c2e236a26a1f2d72b19230
                        • Instruction ID: 21ee3beb4a9fe7b68b22d6cdd88d2993e015f89bd793dc61bd0be8d14051d68a
                        • Opcode Fuzzy Hash: d65ce28458083b72e90a9e781b1571cf6bf818b856c2e236a26a1f2d72b19230
                        • Instruction Fuzzy Hash: B021E0B5900348DFDB10CFAAD984ADEFBF4EB48320F14842AE918A7250C374A944CFA4
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0270B101,00000800,00000000,00000000), ref: 0270B312
                        Memory Dump Source
                        • Source File: 00000003.00000002.1880319435.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2700000_RegAsm.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 6ae52d02fa611780dfafba62e1e4a665aef711f7d4d9c8a533d78a40646208d5
                        • Instruction ID: 05b26f956a313fdc900489a7f3bd46206c834001ec9e85140ff5a55d2fc416bc
                        • Opcode Fuzzy Hash: 6ae52d02fa611780dfafba62e1e4a665aef711f7d4d9c8a533d78a40646208d5
                        • Instruction Fuzzy Hash: 751126B6900249CFDB14CFAAC984ADEFBF4EB88324F10842ED419A7250C775A645CFA5
                        APIs
                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E58,?,?,074F5946), ref: 074F5A4E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1888297708.00000000074F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_74f0000_RegAsm.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: c2beb7681f27683a39e1671fe6d40ddede0a224d393b7c298c53c5521cc4cfaa
                        • Instruction ID: c20b340c6fbd6b77e2844c6fc764afd1a5c1691dd5854915e3605d46756c153d
                        • Opcode Fuzzy Hash: c2beb7681f27683a39e1671fe6d40ddede0a224d393b7c298c53c5521cc4cfaa
                        • Instruction Fuzzy Hash: D61123B6D012598FDB10CFAAD844ADEFBF4EF88324F14842AD519A7310C775A545CFA1
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0270B101,00000800,00000000,00000000), ref: 0270B312
                        Memory Dump Source
                        • Source File: 00000003.00000002.1880319435.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2700000_RegAsm.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 474d3ad3fd9a735858b924d24883836d67f70ccc6323f3d12cbeba3bc76c822a
                        • Instruction ID: d6145a5bf19c82bd03c30864325cb4128d170ab14577726ab82fd05cef3a0cee
                        • Opcode Fuzzy Hash: 474d3ad3fd9a735858b924d24883836d67f70ccc6323f3d12cbeba3bc76c822a
                        • Instruction Fuzzy Hash: FA1103B6900249DFDB10CF9AC584A9EFBF4EB48324F10842AD419B7250C375A645CFA4
                        APIs
                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E58,?,?,074F5946), ref: 074F5A4E
                        Memory Dump Source
                        • Source File: 00000003.00000002.1888297708.00000000074F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074F0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_74f0000_RegAsm.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: fbd2c095c806fa846c846634317881fefa76c045c343e269a68748499cdff04e
                        • Instruction ID: ec0e35dee6be2cac5e4d2b97853ad7585cd426e297ddd7f773c819cd631978cf
                        • Opcode Fuzzy Hash: fbd2c095c806fa846c846634317881fefa76c045c343e269a68748499cdff04e
                        • Instruction Fuzzy Hash: B81120B6D007498BCB20CF9AC444ADEFBF4EB88324F14842AD919A7310C379A955CFA0
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0270B086
                        Memory Dump Source
                        • Source File: 00000003.00000002.1880319435.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_2700000_RegAsm.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: 6e00be7d2a5e752173d707d3d688687f764f3cb0b1f2eebacba8f52f311eef25
                        • Instruction ID: a4d2349f5dbd3ae92026d22cf16e55750f71a7ecf306ef69a38dabafe0cd98c0
                        • Opcode Fuzzy Hash: 6e00be7d2a5e752173d707d3d688687f764f3cb0b1f2eebacba8f52f311eef25
                        • Instruction Fuzzy Hash: 8D1102B6D00349CFDB10CF9AC544ADEFBF4EB48224F10846AD469B7210C375A649CFA1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 622ea5629adf01e8fa25215d70102b1277d662a0b55ef556ae35649464997049
                        • Instruction ID: 8df5d672f980c395b3a5e9c2141e035cddd98858cec9112fa37cd25dbc296d17
                        • Opcode Fuzzy Hash: 622ea5629adf01e8fa25215d70102b1277d662a0b55ef556ae35649464997049
                        • Instruction Fuzzy Hash: 77C22E70B401199FDB55DB64C850EAEBBB2FF88700F118099E606AB3A1DB71EE85CF51
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'^q
                        • API String ID: 0-1614139903
                        • Opcode ID: 8d593eb55191a2225feed74ee8ac730762087d21fe020d6e07391d4f25722c3f
                        • Instruction ID: f985257e2c71a815f42b3f05e3f0314e361f90ef9af2a8b3732bce660ee6450e
                        • Opcode Fuzzy Hash: 8d593eb55191a2225feed74ee8ac730762087d21fe020d6e07391d4f25722c3f
                        • Instruction Fuzzy Hash: C231F2327452504FCB16AB78A85546E7BE6DFCA21031548ABE405CB7A1DE35EC0BC7A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'^q
                        • API String ID: 0-1614139903
                        • Opcode ID: 5556184c0098521d1a88d83acbf1c1b3b08607e59a52f61eaa5cda75cc1d29ef
                        • Instruction ID: cce4eb2a2c115060cfd9f6ebae930b6a9b98d9c376bd2b7153f9ce8d466cbccc
                        • Opcode Fuzzy Hash: 5556184c0098521d1a88d83acbf1c1b3b08607e59a52f61eaa5cda75cc1d29ef
                        • Instruction Fuzzy Hash: 5A317C35B002098FCF49EB79A5595AE76E3ABC8210750443AE50BCB385EF35ED46C7E2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'^q
                        • API String ID: 0-1614139903
                        • Opcode ID: e4805b48df25085a3519e407171109b6a9f212f304388787cdf873bcb36233da
                        • Instruction ID: ffe7fdbd736386825fcd4139def1c97f31d5a8c8c550e1d589810efd8234976c
                        • Opcode Fuzzy Hash: e4805b48df25085a3519e407171109b6a9f212f304388787cdf873bcb36233da
                        • Instruction Fuzzy Hash: 42218F317002058FCB49AB78A56957E3AE3ABC8200750443EE507DB385EF35ED46C792
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'^q
                        • API String ID: 0-1614139903
                        • Opcode ID: 87c440feb02603da5f8aaf18224335cad5d42592d40c034a225625eb0e76210c
                        • Instruction ID: d864621164e1ab4bce81b6be085c5c5a565495d07710215b305250272c7280ec
                        • Opcode Fuzzy Hash: 87c440feb02603da5f8aaf18224335cad5d42592d40c034a225625eb0e76210c
                        • Instruction Fuzzy Hash: BC01DF34906249AFCF14EFB4F8954ACBFB2FF45200B1001AAE4069B391DB301F89DB61
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'^q
                        • API String ID: 0-1614139903
                        • Opcode ID: 804ab883aa849c89fbc16415d6af5b69fa8c999b6e08ab4796f6f940312e62fd
                        • Instruction ID: 30c5360565c059c0d62ebd23ad3f3cf093dedcba6a60e973a9e9d01f25426f8e
                        • Opcode Fuzzy Hash: 804ab883aa849c89fbc16415d6af5b69fa8c999b6e08ab4796f6f940312e62fd
                        • Instruction Fuzzy Hash: 41F036313401014FC618E769D49596EB7E7DBC9350354492DE4198B768EF60FD4A87A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4'^q
                        • API String ID: 0-1614139903
                        • Opcode ID: ec35cc4d3a20141a3c95b5f2470502da57225830d407f3cd4f82ca5cdf7a1a23
                        • Instruction ID: 958d8e3bf6617e612576b24b74e4306170b2183e6855789fd1ac8aa8000ba4f5
                        • Opcode Fuzzy Hash: ec35cc4d3a20141a3c95b5f2470502da57225830d407f3cd4f82ca5cdf7a1a23
                        • Instruction Fuzzy Hash: 3BF04F30A02209EFCF54EFB8E59955CBBF2FB84300B1045A9D40A9B754DF305E88DB51
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e104865d3ef11637ee14f76504900e89489fe7abd643ef919c1bcbe54289251c
                        • Instruction ID: 72aa05b4b9456caa198cb266293f3505ab192f0e945e8b09986a9e26304bf3a2
                        • Opcode Fuzzy Hash: e104865d3ef11637ee14f76504900e89489fe7abd643ef919c1bcbe54289251c
                        • Instruction Fuzzy Hash: E7522634B402159FCB44CF69C994EAEBBF6FF89704F10809AE606DB3A1DA71ED458B50
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 11401cf9cb5482dfed235a30fb1a03c4165252f2ca1047a78f3c91a43b32ccec
                        • Instruction ID: 0d87c3482aa5ddcee13b7cdce2d1f89899a2e1c49d5cd2f61df5b714516faedd
                        • Opcode Fuzzy Hash: 11401cf9cb5482dfed235a30fb1a03c4165252f2ca1047a78f3c91a43b32ccec
                        • Instruction Fuzzy Hash: 834289307406298FCB65AF689550A2EBBF2FBC5704B50495CD5039F3A1CFB6ED068B86
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3b67401f0a78d01334cb6dc545edebd3484d05cee33ce4dabd150475609eecbb
                        • Instruction ID: d660800f67e3f0f18d8585daa1a9f68601a971b21aded51976ca4f12ac7b87ce
                        • Opcode Fuzzy Hash: 3b67401f0a78d01334cb6dc545edebd3484d05cee33ce4dabd150475609eecbb
                        • Instruction Fuzzy Hash: 2F02BC30B402258FDB55AB64C954A2EBBF6FF89B04F604459D5029F3A1CFB6EC468B81
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 22e491abd4259e55521c2f2016feba41234608979c5ea9a02c9d5684c7749d56
                        • Instruction ID: 34934cc9b59f48eb5fa1d8b6dfde6997e6991d02ca363d29a217252f91f071b9
                        • Opcode Fuzzy Hash: 22e491abd4259e55521c2f2016feba41234608979c5ea9a02c9d5684c7749d56
                        • Instruction Fuzzy Hash: 26E1BE30B402258FEB459B64C954A2A7BF6FF89B04F60445AE5029F3A1CF76EC46CB91
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3240cdb185617272ef78e07a2f6b420b3c6098d16a870419932008026256bfae
                        • Instruction ID: 17343b73df475963e417fe2329671cd6a77a2ce1f01f47d690a9062db9beb6dd
                        • Opcode Fuzzy Hash: 3240cdb185617272ef78e07a2f6b420b3c6098d16a870419932008026256bfae
                        • Instruction Fuzzy Hash: DED19F30B402259FEB459B64C958B2A7BF6FF89B04F60405AE5028B3A1CF76DC46CB91
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b99968fdc8c2bac8d8c98e2e49a67021c0c4c0eaecddb42d39ac9de864abf319
                        • Instruction ID: 6086c9e565cfcc9453c12ec101a94f8ec6b4a331774fb81120fb68bc6b71d95c
                        • Opcode Fuzzy Hash: b99968fdc8c2bac8d8c98e2e49a67021c0c4c0eaecddb42d39ac9de864abf319
                        • Instruction Fuzzy Hash: 3FC19F30B402159FEB459B64C958B6A7BF6FF89B04F608056E602DB3A1CF76DC42CB91
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4fd7e9bac95a1082089204cf93aab489764281f0c1d8d367983f1a3528aeb6ac
                        • Instruction ID: 3fe86649b19393798f93a65ef921fcd861e59eb430e5b4ea763e5ff0da639790
                        • Opcode Fuzzy Hash: 4fd7e9bac95a1082089204cf93aab489764281f0c1d8d367983f1a3528aeb6ac
                        • Instruction Fuzzy Hash: DDC17C34B00605CFDB45DF69C585AAABBF2FF88301B1585AAE506DB366DB30EC45CB60
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ce611a3b7bb4c4bce2f2c7f46acb4bf5c2ab36d682fc73aa13ed56b85660d756
                        • Instruction ID: 2dea7f5675777698c26819d766e76d1fbeb25dbc6c4349b53759f52e0a57da73
                        • Opcode Fuzzy Hash: ce611a3b7bb4c4bce2f2c7f46acb4bf5c2ab36d682fc73aa13ed56b85660d756
                        • Instruction Fuzzy Hash: 485156B1E00258CFEB55DFA9C981BDEBBF6AF48300F24852AD415AB350DB349846CF80
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f444446b88eb82f6cd073c5819e492f7004bb1baff43d2193fe418a6d47b0509
                        • Instruction ID: 8278c12dcfa72880cba9a89b6863a9779781d4b1b450250a8466d255030920f8
                        • Opcode Fuzzy Hash: f444446b88eb82f6cd073c5819e492f7004bb1baff43d2193fe418a6d47b0509
                        • Instruction Fuzzy Hash: EA517935A00606CFDB15DF59C8809AAFBF2FF88310B15C9AAE5599B365D731F805CB90
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6580954193e3b1e88160c0dae2a474eadf697f4e91f1eb14194b2725e83e52f0
                        • Instruction ID: c56c3ebf5f3fd25b20ab93882d26c17a147931fda3134ae56099568b47fa57d9
                        • Opcode Fuzzy Hash: 6580954193e3b1e88160c0dae2a474eadf697f4e91f1eb14194b2725e83e52f0
                        • Instruction Fuzzy Hash: FC5169B1D00258DFEB55DFA9C985BDEBBF5AF48304F24852AE405AB380DB749846CF80
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 13a328091e2de9a07773d52d1621713b818d22f9cf3364764448d7b394f306b2
                        • Instruction ID: 91e0fea4c7152bc06e34ee738793f0566cc39e3cc894f6e4f9b44c635e13b4ef
                        • Opcode Fuzzy Hash: 13a328091e2de9a07773d52d1621713b818d22f9cf3364764448d7b394f306b2
                        • Instruction Fuzzy Hash: 53318D75B012109FCB0ADF38D88496EBFB2BF89301B00846AE906CB365DB31DD05CB90
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e3cd87bc97da3ce925e37e69e6f0c13148eae8b43278c670ce87252bc3584ce2
                        • Instruction ID: 7e11081e3ce5ac97ba3c7d5105ef35dae1d2f02cefc7e6c1fb2f1c7d872b7528
                        • Opcode Fuzzy Hash: e3cd87bc97da3ce925e37e69e6f0c13148eae8b43278c670ce87252bc3584ce2
                        • Instruction Fuzzy Hash: 91315A35B016149FDB19DF38D88496EBBB2FF89340B50846AE906CB365DB31ED05CB90
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dc898972f022c2a26112aecb85e06f4c1cca6d9da6f821f7d63df30fd9063c42
                        • Instruction ID: 32f2cdbf7112c0a44f747b9677feb6562d20eac07f22c0441491f1401022a107
                        • Opcode Fuzzy Hash: dc898972f022c2a26112aecb85e06f4c1cca6d9da6f821f7d63df30fd9063c42
                        • Instruction Fuzzy Hash: B54102B1D01248DFDB54DFAAD951ADEFBF6AF88310F20802AE415BB250DB30A945CF90
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cfcc10bc8aa372b80c39d67ec1d75f57ef3e98c4402200a24d92e5a8e1a7ed6e
                        • Instruction ID: b45e73d699d81d59a35ff843ecd089bc2ebce4ea55495e1d363884461cd8aa5f
                        • Opcode Fuzzy Hash: cfcc10bc8aa372b80c39d67ec1d75f57ef3e98c4402200a24d92e5a8e1a7ed6e
                        • Instruction Fuzzy Hash: 2F3113B1D002489FDB14DFAAC995ADEBFF6AF88300F24802AE405BB250DB359945CF90
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d9cec580529e045100bb0e41998639a1e2f514a9962203218fda9aa3cd73c7ef
                        • Instruction ID: 92e6f203c43202ec67ec58aff91b5ca4d7c2ba33fbc517cdd6f39c660c2a1142
                        • Opcode Fuzzy Hash: d9cec580529e045100bb0e41998639a1e2f514a9962203218fda9aa3cd73c7ef
                        • Instruction Fuzzy Hash: 49215C35B400159FCB54DF69C884DAABBB2FF88714F5180A5E90A9B3A5DA31EC05CB10
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886778396.0000000006420000.00000040.00000800.00020000.00000000.sdmp, Offset: 06420000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6420000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9e0b515448453e40b47229f84da9b7bfddd9d6d7587ecd0dfcd214fc072b3b83
                        • Instruction ID: 83bb17c2355788f04c4cb60a9972b3d59b8d846b026204dd25ddad0913e54dfa
                        • Opcode Fuzzy Hash: 9e0b515448453e40b47229f84da9b7bfddd9d6d7587ecd0dfcd214fc072b3b83
                        • Instruction Fuzzy Hash: 93216035B40014AFCB54DF69D984EAABBB2FF88714F5180A5E9159B3B6CB31EC05CB50
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c509245795e34cc2550eba0aa2db39efcb8f7ec27e80f27946bd81224e74f263
                        • Instruction ID: 33600a25498b631f05925c8c310b23406dcff6f5680785d67b8633618bcc2b0c
                        • Opcode Fuzzy Hash: c509245795e34cc2550eba0aa2db39efcb8f7ec27e80f27946bd81224e74f263
                        • Instruction Fuzzy Hash: C63112B1D01298DFDB14DFA9D895BDEBBF5AF48310F24842AE405B7240CB34A945CB90
                        Memory Dump Source
                        • Source File: 00000003.00000002.1878340563.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_c9d000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: af0009a1b73e5c7d148d686684d5b568ed15a8740fb9c9fdd65617d349e18e8d
                        • Instruction ID: a0d8474415536a0f4d0b4ede495a54058cbb6167b4a67050a5b6890caf4b3e50
                        • Opcode Fuzzy Hash: af0009a1b73e5c7d148d686684d5b568ed15a8740fb9c9fdd65617d349e18e8d
                        • Instruction Fuzzy Hash: 39216A71100200DFDF00DF04C9C8B26BF65FB94314F20C169E90A6F216C336E856CBA2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c66a16c410f5ef6f372a4a14eb2a59d195a0fe4a4e676848ad5015139dcba40e
                        • Instruction ID: 54e0300d9b6216928684cd62e66138ead664cf62f6ea90abfe5c0d84d0a92c15
                        • Opcode Fuzzy Hash: c66a16c410f5ef6f372a4a14eb2a59d195a0fe4a4e676848ad5015139dcba40e
                        • Instruction Fuzzy Hash: 4E21FEB4D0524ADFDB40DFA8D4816EEBBB1EB48301F2040AAE515A7351D7349A82CF90
                        Memory Dump Source
                        • Source File: 00000003.00000002.1879193335.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_eed000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: db0bb524cd42a0941907a2d4add9c112f816a952755e0af5c8a61f9018ec9381
                        • Instruction ID: cf76afde69e2c3de8af002cf72cd38f5b70b7b6601e07add18034eaadbf2249c
                        • Opcode Fuzzy Hash: db0bb524cd42a0941907a2d4add9c112f816a952755e0af5c8a61f9018ec9381
                        • Instruction Fuzzy Hash: 95210471608288DFCB14DF15DDC4B26BFA6FB84318F28C56DD8095B256C33AD847CA61
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 631b4cbec4bcbce6aaeaa5628309892b2a270745bb601d57b43ee241d06c0b8c
                        • Instruction ID: 5b53cdbf194850188b202ee4ff5ff17955960c1e33aea903b15c989f173928c6
                        • Opcode Fuzzy Hash: 631b4cbec4bcbce6aaeaa5628309892b2a270745bb601d57b43ee241d06c0b8c
                        • Instruction Fuzzy Hash: 9C2126B1D00298DFDB14DFA9C895BDEBFF9AB08310F24842AE405BB340CB759945CB94
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ddde788d31639e700828e0bbbbd196dfcc9afadcd070add9720d84138b919930
                        • Instruction ID: 9664aebc7ae74a70a760a2bec002975602846cc5310c542e00cde25993324905
                        • Opcode Fuzzy Hash: ddde788d31639e700828e0bbbbd196dfcc9afadcd070add9720d84138b919930
                        • Instruction Fuzzy Hash: D81129636081D41FCB534AA99C51AAA3FE8DB4A121B1D4197F9C4D7342C019C91597B0
                        Memory Dump Source
                        • Source File: 00000003.00000002.1879193335.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_eed000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 28e825ba22a0c256512cf52dc43d5d49fe1f8b141f09a9212473cd82ac64e43f
                        • Instruction ID: 93ebf0fc8fad7bed78e7c0e9839e65951041cdab9aba222be897fd1c23188d61
                        • Opcode Fuzzy Hash: 28e825ba22a0c256512cf52dc43d5d49fe1f8b141f09a9212473cd82ac64e43f
                        • Instruction Fuzzy Hash: 372171755093C48FDB02CF24D994715BF71EB46218F28C5EAD8498B657C33A980ACB62
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5c55e0ce996102b693e3d7598f0999aa9e3f0e5b3cda2590888218ce00979c7d
                        • Instruction ID: 0fa56eff95389a874802e079016c09e205a5fb8bc37400c414a5b42f7c4d0671
                        • Opcode Fuzzy Hash: 5c55e0ce996102b693e3d7598f0999aa9e3f0e5b3cda2590888218ce00979c7d
                        • Instruction Fuzzy Hash: 981108312012045FCBA5AB78E85997EBBE7EFC1250B144429E107C77D0CE30BD4E97A5
                        Memory Dump Source
                        • Source File: 00000003.00000002.1878340563.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_c9d000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                        • Instruction ID: fcecab0aa14c4f643a6a1267812d81dcc586604c51195c1ed15c6a8b71ce258f
                        • Opcode Fuzzy Hash: ce69cba98bfff612cefda2c4877fe7df6cc59bd7a6ce96c012d28fad0f514114
                        • Instruction Fuzzy Hash: 2A110372404280CFCF02CF00D9C4B16BF71FB94324F24C6A9D80A1B616C33AE95ACBA1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f53d7959ec7a1b65eda87742a42c1d3e1262b15f4047ae4596047b63cf44ab62
                        • Instruction ID: 780cf5ef5b366cdb3021a4b1942975414e666f9aef9a2c88f95d6914766a0d0f
                        • Opcode Fuzzy Hash: f53d7959ec7a1b65eda87742a42c1d3e1262b15f4047ae4596047b63cf44ab62
                        • Instruction Fuzzy Hash: CA0104302056058FD321EF74E40866B7BE3EFC5315F108A2AE04687789CF749D0E8BA1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9a6978214c39755ff169e87e8a44b1117d77ea03f8f45e2ae57f3349f895d398
                        • Instruction ID: 4f4e743e160a6ff0ab1e550c8944b912ad5ba556138d26c3d71731ccb35e609a
                        • Opcode Fuzzy Hash: 9a6978214c39755ff169e87e8a44b1117d77ea03f8f45e2ae57f3349f895d398
                        • Instruction Fuzzy Hash: 91017131B102199FDF10DEA9AC45ABFFBBAEBC4651B14803BE504D3340DF31A91587A1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ce70ab05524d27def81edd7e2b8ef7bc9216f084e5441d4d6feacf12659dc313
                        • Instruction ID: ea7aa4f2a8ed3e4f85709422af2b2995254ba642cb08b524e518da6499b5bd6b
                        • Opcode Fuzzy Hash: ce70ab05524d27def81edd7e2b8ef7bc9216f084e5441d4d6feacf12659dc313
                        • Instruction Fuzzy Hash: 1101B1312001014F8AA4BB78E55952EBBE3FFC0250B444828E1078B7D4DE30BD8E9795
                        Memory Dump Source
                        • Source File: 00000003.00000002.1878340563.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_c9d000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3a4858a9999e073ee1dbb49b6af59beed36726a0391ed737505c4305f76cc994
                        • Instruction ID: fdac553bf9d7fb4fb6f2896c459a8afb3836bbd55bd7938bcfbf4c699c0d157a
                        • Opcode Fuzzy Hash: 3a4858a9999e073ee1dbb49b6af59beed36726a0391ed737505c4305f76cc994
                        • Instruction Fuzzy Hash: 220126310093409BEF108F2ACD88B67FFD8DF41725F18C92AED1A6B286C638D880D671
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 74fe4af94a2f62b18d8773f5bd8b8db90ed3c7324ff8e92217d962fb1844d28d
                        • Instruction ID: 725f5ca7fa3aa2e462f0a613a055ee87655f56c6ab4f71d5f80b18c9774f72ce
                        • Opcode Fuzzy Hash: 74fe4af94a2f62b18d8773f5bd8b8db90ed3c7324ff8e92217d962fb1844d28d
                        • Instruction Fuzzy Hash: C601D6346053489FCB12AB78DC1486A7FBAEF86300B1484EAE501CB362DA32DD05D791
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fe1cb685ae63ff25830e893b2fe3a58232c7c6fb0a0df7afc7c5bcdba81092cd
                        • Instruction ID: fda25ab984ada828dce798e4cd99b52dc39beddfd721aa15e591f7552257771c
                        • Opcode Fuzzy Hash: fe1cb685ae63ff25830e893b2fe3a58232c7c6fb0a0df7afc7c5bcdba81092cd
                        • Instruction Fuzzy Hash: 4C011675E002599FDB44DFA9E8046EDBBF2FB89311F14912BE414B3350E7344959CBA4
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 556a5421c9e1208d767dd202a32e526470fe987ed9080c00f5b97e1a10a256ac
                        • Instruction ID: 5e0dea5c6f099fcf4a9a417fd33e283c42ea10b80c9326878fe6647be06adf00
                        • Opcode Fuzzy Hash: 556a5421c9e1208d767dd202a32e526470fe987ed9080c00f5b97e1a10a256ac
                        • Instruction Fuzzy Hash: 9C019A302016058FD324EFB4E40862ABBE3EBC9315F108A28D15B87788CF74A90E9B91
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: aa80fd44cbceddd267a77c593a9e5760496753ecd57bb7ff21021d845adf30e1
                        • Instruction ID: b5811c128455390694abc85a3d7f15edaf6aa803b110289782c9198544df0400
                        • Opcode Fuzzy Hash: aa80fd44cbceddd267a77c593a9e5760496753ecd57bb7ff21021d845adf30e1
                        • Instruction Fuzzy Hash: 10018130A11712CFEFAEAA39A506637B7F7BF84205754883EE4068671CDE75E485CB90
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 342ed40ca359fb4006bb21e74e6c483d164075324300ae08b4b221b075c9f2ff
                        • Instruction ID: 69d8f685cd979167a96ddc6254c2adfe21cdabf05f6596d63d96108a778ad15c
                        • Opcode Fuzzy Hash: 342ed40ca359fb4006bb21e74e6c483d164075324300ae08b4b221b075c9f2ff
                        • Instruction Fuzzy Hash: 7801D131106B059FD331EF61F808562BBFAFB89300700C61AE48B86650CB30A94ECFA4
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1d38cec468661ba4e889196c52bb4dfe5159187e27aee5f3eb61714789ca8854
                        • Instruction ID: c7e1af5016143cfbe8e302681680753918194f5ff709e48d643b9924d9d9075f
                        • Opcode Fuzzy Hash: 1d38cec468661ba4e889196c52bb4dfe5159187e27aee5f3eb61714789ca8854
                        • Instruction Fuzzy Hash: AFF082312052416FC7112B69B899AAFBFEAEBCB764B04406DF10AC7283CA615C4987B5
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 502e7c2db4a1f81e97b44c14cd394bc5c52a1eeaeb0914cfdd70553a80c37566
                        • Instruction ID: d0b902f2a29775795672f37902c4d2317ea03aa9ba954e61924efcd47e4c8ba1
                        • Opcode Fuzzy Hash: 502e7c2db4a1f81e97b44c14cd394bc5c52a1eeaeb0914cfdd70553a80c37566
                        • Instruction Fuzzy Hash: 4801C0B4D0525AEFDB44EFA9D9456AEBBF2FB48301F1080AAA815B3350E7745A41CF90
                        Memory Dump Source
                        • Source File: 00000003.00000002.1878340563.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_c9d000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3f17e849d76ca6ba9d705ad8229fd86ab823661d67d282a16a6b57ad6ed126c5
                        • Instruction ID: 83dcf8142d5b48d1baa970370b35d3d49c860e93b5a4d2d3fff52730d5dcf713
                        • Opcode Fuzzy Hash: 3f17e849d76ca6ba9d705ad8229fd86ab823661d67d282a16a6b57ad6ed126c5
                        • Instruction Fuzzy Hash: 6BF0C2720043809BEB108E16CC88B62FFA8EF50735F18C45AED085B286C2799880CA70
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bd9f579fdab099ff6f8c8f976ce502a1f6885477698af388309b85efe69ac9c0
                        • Instruction ID: 3e1388b1160e3bb9e3f9da1560172e9d8f2531ee0fffaf406b4f3e570fa8dbfd
                        • Opcode Fuzzy Hash: bd9f579fdab099ff6f8c8f976ce502a1f6885477698af388309b85efe69ac9c0
                        • Instruction Fuzzy Hash: C3F01475E042188BDB44DFAAE844AEDBBF5AB8D310F00912AE404B7350DB345948CBA4
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 01e7a724b1ba11d03ff464200af10b9c136f40a665dc891e9a8cf64971f19439
                        • Instruction ID: 0eec0cfa699c2961ffe873d9a1d65b979b672f81f5947b0d365a81670a325d42
                        • Opcode Fuzzy Hash: 01e7a724b1ba11d03ff464200af10b9c136f40a665dc891e9a8cf64971f19439
                        • Instruction Fuzzy Hash: A4F059712081A21FC32227396C190BE3FA6E9C3651308009BE142C7295CA14494AD3E5
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 553280fe9e2a0ec523fb5a5816061b71ed374607f30c41441cdd43352b8398d0
                        • Instruction ID: 78fed92e442161c556d7d479906ace09a3049bf8fe843ab7ac6d74f9bea37c5f
                        • Opcode Fuzzy Hash: 553280fe9e2a0ec523fb5a5816061b71ed374607f30c41441cdd43352b8398d0
                        • Instruction Fuzzy Hash: 1AF02B3114A7D44FC332D739F81969B7FF6DF82214B04045AE182CB253CA615D4887A1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 46939df6144623a67b905f5b8b0fa1237838e927f94b82a84d52065ebab7e139
                        • Instruction ID: c530fe48c462588b5bffd70ee4eb209a81a7f50a05b8fd4262e98d9628b55883
                        • Opcode Fuzzy Hash: 46939df6144623a67b905f5b8b0fa1237838e927f94b82a84d52065ebab7e139
                        • Instruction Fuzzy Hash: C1F012662041E83F8B514E9A5C15CFB7FEDDB8E2617084156FE98D2241C429C921ABB0
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9986d473a0a02ea3685758dcbb7b27af355a2dd08ca87a9b3881d787f32a50aa
                        • Instruction ID: e26e2bb0faab4bbaf375a944cb958db893243d5a66d4d453bec0c1cb6c3d59cb
                        • Opcode Fuzzy Hash: 9986d473a0a02ea3685758dcbb7b27af355a2dd08ca87a9b3881d787f32a50aa
                        • Instruction Fuzzy Hash: 79F02E31B413008FD7219BA8E806F92BFE1AB42311F128227F210CF2E2D3B1E80A8740
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a4e5583596d37251b18c9dbe0e757a9d2f62a3cf3cf5cc5e4943f1e52d659c07
                        • Instruction ID: 0b8f2e5ba115ef35eccdbb7d79d896c4044b0577080a78b68b134589f95b2de6
                        • Opcode Fuzzy Hash: a4e5583596d37251b18c9dbe0e757a9d2f62a3cf3cf5cc5e4943f1e52d659c07
                        • Instruction Fuzzy Hash: E0F08232B142195BCF11BA69AC45AAFBFF9EBC5261F19443BE554D3200EB31E401C792
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4d0f9e5f8b7796e7393a059af4ea893ca2f9832690b1b01dd4ecde3294397d34
                        • Instruction ID: bfee64d819ed9f7263285e0e8cae1bca2aa8ce96d50efed92e60012e298faa67
                        • Opcode Fuzzy Hash: 4d0f9e5f8b7796e7393a059af4ea893ca2f9832690b1b01dd4ecde3294397d34
                        • Instruction Fuzzy Hash: 62F0CDB0C09159DFEB00DFA0D8465AEBFB1FB5A201F0041D7E402E7351E7398A02CB40
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 90a4c9ba79db2603dbf634c84b1e887409f045bcd4dbf58571bc65bbab28c962
                        • Instruction ID: 73a1a3c09d68b1e4e1f7f9bc8cd65177779a017b79c0b7f8e859a532c0cd9a49
                        • Opcode Fuzzy Hash: 90a4c9ba79db2603dbf634c84b1e887409f045bcd4dbf58571bc65bbab28c962
                        • Instruction Fuzzy Hash: 3BF024319007018FEFA9DA75E50277BFBB2BF80314F08C86ED04642A28CA74E485CF40
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 88a6962867c4b82b968effdd9c2112d8758bdc1bde09b82da2e4cd90d2f26039
                        • Instruction ID: c5a63129b271c2d5e9cafc75bc556da22c1d2f4677666a64cbb3e75f07486a2c
                        • Opcode Fuzzy Hash: 88a6962867c4b82b968effdd9c2112d8758bdc1bde09b82da2e4cd90d2f26039
                        • Instruction Fuzzy Hash: 49E092312001126FC7202A5AB449A9EBAEAEBCA361B00403CF20EC3282CA715C0957A9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00be3cf288d5f07f915a430e060e9089660bcd0481e1666084b56b5a0f282998
                        • Instruction ID: 6cbcdd75255fafd9470ae2e6b5f5552c6f1cb56bb222b42d7bc2c655f8431ed9
                        • Opcode Fuzzy Hash: 00be3cf288d5f07f915a430e060e9089660bcd0481e1666084b56b5a0f282998
                        • Instruction Fuzzy Hash: 8AF09035502B018FD735DF66E408512BBF6FB88301B00C62EE54B82A50DB70A949CF84
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ea8c69431beb2376ebf4fbc415de3d9f5c8c471178009c9df1f31f28ffee41e1
                        • Instruction ID: ec3e13819530de5398d22b0ab544b6eaf089f2d1cfd7e2bed6409b8d4d3c2d98
                        • Opcode Fuzzy Hash: ea8c69431beb2376ebf4fbc415de3d9f5c8c471178009c9df1f31f28ffee41e1
                        • Instruction Fuzzy Hash: D1E0D83321B2506FD612AB14F8419DABF52D783751B005162E106CB746DA300D4D87F2
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3adbc6e1e06688af344fa55198fe0de2a8fbe6a37777ab5cf6f35ae184c4ebb5
                        • Instruction ID: 972b023767cc5f864bda4fc74504c9c3a7e536c29151665f1aed604e43217301
                        • Opcode Fuzzy Hash: 3adbc6e1e06688af344fa55198fe0de2a8fbe6a37777ab5cf6f35ae184c4ebb5
                        • Instruction Fuzzy Hash: 5BF03935D0120CFFCB11DFB4EA488CDBFB9EB44200F1042A6E805E3284EA315B49DB91
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b4866ae2ce414fbcea181f7ccfe8cc8cdcf25345dcb45438f442556f71ebbafd
                        • Instruction ID: 113a3e179f52125d7a77c0affa47168b2f467b9973bcff75cc14cd136f06ebab
                        • Opcode Fuzzy Hash: b4866ae2ce414fbcea181f7ccfe8cc8cdcf25345dcb45438f442556f71ebbafd
                        • Instruction Fuzzy Hash: 63E0A030201B514FC731E72DE50979E7BE6DF85314F040429E24687742CBA1A8098795
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4ab95281351eea442d23e03272722a3170c37fae060feca434cea9dd7bc67ee1
                        • Instruction ID: 32786e91f52835cf18a3142acb60ea2e3340ee43b86e95a2992b5edbbb6828b4
                        • Opcode Fuzzy Hash: 4ab95281351eea442d23e03272722a3170c37fae060feca434cea9dd7bc67ee1
                        • Instruction Fuzzy Hash: 98E0207101A380FFE712B324F4469A67F76DB433107051056E8468FA45E7304E85C3F1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d0c90a0c06ed7c9c50f69d8bbd8bccd3e64ec7dfd4dc7a03e44b91e21f000487
                        • Instruction ID: 712924570988c33ff672abaed53cc0c9ab57fb96eea59a8c4064401f65b0603b
                        • Opcode Fuzzy Hash: d0c90a0c06ed7c9c50f69d8bbd8bccd3e64ec7dfd4dc7a03e44b91e21f000487
                        • Instruction Fuzzy Hash: ADE06DB210D2019FD305DB24E8448967BE4EB91210B01C86FE48187241E731E841CBA5
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3d92ec4e0c4c9b45683114aafe19e67eab7b34594845b4bb6be4a22a03ca169e
                        • Instruction ID: 7fd0742c167ac4ab12e5d0d1259bf09434a99720bf7845b4352e6fe28a35d7c0
                        • Opcode Fuzzy Hash: 3d92ec4e0c4c9b45683114aafe19e67eab7b34594845b4bb6be4a22a03ca169e
                        • Instruction Fuzzy Hash: 45E0123A116248AFD7029B54DC40CA73F7DEF89A5431440C6F5418F172C6229D21DBB1
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8a9dd03133d02489751a0e87f3b573fb55efa658c143d5062a5930c7df4cc683
                        • Instruction ID: 8ce66fb54845ae7c7a110e2f3ee74c1f714c0ac85bc90f0ea8406149204b20f8
                        • Opcode Fuzzy Hash: 8a9dd03133d02489751a0e87f3b573fb55efa658c143d5062a5930c7df4cc683
                        • Instruction Fuzzy Hash: E9E0D83100A7415FDB11FB14FC42995B7A2F746700B010045D8065F2AADB744E4997E5
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 26ce8bb0e465d69aef88032fef9a294e1d238dc273282965988c225031bf89ed
                        • Instruction ID: fe9b80d39ba8184c33db1aab7990c5a49d95fe8079de46939ea65469ec19fa2e
                        • Opcode Fuzzy Hash: 26ce8bb0e465d69aef88032fef9a294e1d238dc273282965988c225031bf89ed
                        • Instruction Fuzzy Hash: B1E0D871A45244FFCB11DB64E80159E7BB1DB82200B2441D6D405D72D1D6300F149B92
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 46f0abee62faae8234ab73249c149a8e038370e0bfba7f38082e24d2bcbaed58
                        • Instruction ID: afd5501d3fc6437f7644cb3568a96ad90ab793507dca3d989b3ae5ed099cd05e
                        • Opcode Fuzzy Hash: 46f0abee62faae8234ab73249c149a8e038370e0bfba7f38082e24d2bcbaed58
                        • Instruction Fuzzy Hash: 5ED05E3130012A5B8A25276AF45C4AE7BEBEBC6672704012AE60BC3340CF656D4A97D9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 338a47da66077b27a524a19062e813752261c4ea159b15bba0e9b06504c236f6
                        • Instruction ID: 81b9dd52b24c6482ee4f7877676498eecffcc72891bc2142895ed873902ffd10
                        • Opcode Fuzzy Hash: 338a47da66077b27a524a19062e813752261c4ea159b15bba0e9b06504c236f6
                        • Instruction Fuzzy Hash: 5AE09275E0120CEFCB50DFE4E9448DDBBB9EB48201F1082AAD909A3240EB306B59DF80
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f937a3ccd4ddf9c8f497b6bc94804bc6f6d6aba77d05d213359f300675b61fea
                        • Instruction ID: 2234d001fd07fe0e43ae4bf2e3d95d52ab32b31e3f92c203e9574050752188ee
                        • Opcode Fuzzy Hash: f937a3ccd4ddf9c8f497b6bc94804bc6f6d6aba77d05d213359f300675b61fea
                        • Instruction Fuzzy Hash: 43D05EB1A0120CFFCB40EFA8E90195DB7FAEB85304B2041A9D409E7380EB316F04AB91
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f4d127c09dcb189608872720ed6c90a4091dbabf0e03f9bb1ee13bea045dfaf3
                        • Instruction ID: 4961adf6bfb3660679b20643cd06bf6bd16ad4c606bca7fb7f8335922b152cdc
                        • Opcode Fuzzy Hash: f4d127c09dcb189608872720ed6c90a4091dbabf0e03f9bb1ee13bea045dfaf3
                        • Instruction Fuzzy Hash: 0EC012727001200B06A4A66CB02507E66E7D3C82E3395003BF60EC3388EE618C4A5386
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0505c4fe2605bd977a4fc3d9f8a4915a45d542def409201db7cdeb0a59742cd9
                        • Instruction ID: 551f22d74623b3c26a6b7c77d9e18cd0f014aac3e29ccea44c79be6ffdd41d97
                        • Opcode Fuzzy Hash: 0505c4fe2605bd977a4fc3d9f8a4915a45d542def409201db7cdeb0a59742cd9
                        • Instruction Fuzzy Hash: E7C08C7058E3808FC3024790380ED503E30ABA2B40F030083E2628F093D2950628C676
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c6ca14af5f4ee25ed7b262cdb08752b00cd9c327b3aa69366795c3e55459400d
                        • Instruction ID: 1c98d14204a27e5caee3356d4f3afcd4e5d4fdc1d0658016fc4b650dc625203b
                        • Opcode Fuzzy Hash: c6ca14af5f4ee25ed7b262cdb08752b00cd9c327b3aa69366795c3e55459400d
                        • Instruction Fuzzy Hash: 48C09B3158B7D45FDB060771DD0D8853F25AF5372571710C7E3418D0B7D6120085CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j
                        • API String ID: 0-3780336332
                        • Opcode ID: 3b8af41741e9e94ce7ba3ad32aff8adf20b68e0aec605b70d274135fee6cb837
                        • Instruction ID: 8bf06f7680a44da7509d0161605a08b0bee2843984a19223d3fc6cce55d5a79e
                        • Opcode Fuzzy Hash: 3b8af41741e9e94ce7ba3ad32aff8adf20b68e0aec605b70d274135fee6cb837
                        • Instruction Fuzzy Hash: 61D1AF32300701AFDB056AA5DC53A6DE653FBC6300B504438E1064FBAEDF75AD5E93A6
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j
                        • API String ID: 0-3780336332
                        • Opcode ID: 3f6b234967c7fa8601088a3cf64ad17e747ac851dc2f6a8da1f57214cdc8caba
                        • Instruction ID: be381910733df8f145a29822ea5c35f9a54c79a47e2fe7f2c345ff53b4cc1815
                        • Opcode Fuzzy Hash: 3f6b234967c7fa8601088a3cf64ad17e747ac851dc2f6a8da1f57214cdc8caba
                        • Instruction Fuzzy Hash: D9D1A031300701AFDA057AA5DC53A6DE253BBCA300B904438E1064FBAEDF75AD5E9396
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j
                        • API String ID: 0-2047240224
                        • Opcode ID: 32b01f3085514b634fc9eb118d633e19581cf79c912e486744a35f920a8f9d43
                        • Instruction ID: 2afa8c901e7e35828ad0cfddebf84f98a64324fa8f29b32f3c92b38eabee901c
                        • Opcode Fuzzy Hash: 32b01f3085514b634fc9eb118d633e19581cf79c912e486744a35f920a8f9d43
                        • Instruction Fuzzy Hash: 8A41B5323007016FDA056EA5DC4262DE653FBC6300B504538E20A4FB9ADF76AD5A83A7
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j
                        • API String ID: 0-2047240224
                        • Opcode ID: d4020d3ac68a787e6b233c01f7d534ce419bb2d282db261c1ab68d17f854ee0b
                        • Instruction ID: 21af1a81117db6e6d75f5caf7fe7b9e325df948d226f39d8370cc67cb4d0c795
                        • Opcode Fuzzy Hash: d4020d3ac68a787e6b233c01f7d534ce419bb2d282db261c1ab68d17f854ee0b
                        • Instruction Fuzzy Hash: 3F41A4323007016FDA057EA5DC4762DE653FBCA300B504938E20A4FB9ADF75AD5A8796
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j
                        • API String ID: 0-2315863240
                        • Opcode ID: 03a2af2bafc51964fd06e882a96a0bd552fa2c3f949f48058fb64a9d49fad338
                        • Instruction ID: b5c43b187e04788dcf74fb9f2da613c8251f508e6ad7f5a5499baebe9d036f5f
                        • Opcode Fuzzy Hash: 03a2af2bafc51964fd06e882a96a0bd552fa2c3f949f48058fb64a9d49fad338
                        • Instruction Fuzzy Hash: E731B7327403016FDB016EA59C42A7DF657FBC6300B904538F10A4FB9ADF75AD5983A6
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: D6j$D6j$D6j$D6j$D6j$D6j$D6j$D6j
                        • API String ID: 0-2315863240
                        • Opcode ID: 76dfd7b83719ad65c728e6ec0e728ccfd381b76cba1a0ef1f0a6b6b34d8f5399
                        • Instruction ID: e3898ed039c940ca1d061b0b8d25b60bd3de416c21db298104f95f48e538fd77
                        • Opcode Fuzzy Hash: 76dfd7b83719ad65c728e6ec0e728ccfd381b76cba1a0ef1f0a6b6b34d8f5399
                        • Instruction Fuzzy Hash: A021A5327003016FDB056EA5DC43A2DE653FBC6700B904538E20A4FB9ECF75AD9983A6
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: D6j$D6j$D6j$D6j$D6j$D6j$D6j
                        • API String ID: 0-1746523011
                        • Opcode ID: 3ea391ec9958eb2e93cf9a4408905268bb3b742c351f5e4288fa65b876f76e4b
                        • Instruction ID: 570bfe4c2a32214cdc8b758ebfb29945238460a5c5adcc4081487dedf8657872
                        • Opcode Fuzzy Hash: 3ea391ec9958eb2e93cf9a4408905268bb3b742c351f5e4288fa65b876f76e4b
                        • Instruction Fuzzy Hash: C431C0323056826FDF012BA0ED4696D7B63FB863007105538F1068F6A9CFB05E9E8792
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: D6j$D6j$D6j$D6j$D6j$D6j$D6j
                        • API String ID: 0-1746523011
                        • Opcode ID: 2c196c9fc5a5314e386dbb4d99527bd72af8473a0f119ecd4bbdb593322928e9
                        • Instruction ID: ea798b59849076b8cca16e326c9e004776019e1775db7b44f5ae158f50cb9984
                        • Opcode Fuzzy Hash: 2c196c9fc5a5314e386dbb4d99527bd72af8473a0f119ecd4bbdb593322928e9
                        • Instruction Fuzzy Hash: B1218B32300642AFDF052BE4DD4696DBB63FB863007505438E1068F7A9CFB15E9E8B92
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: (_^q$(_^q$(_^q$(_^q$(_^q$(_^q
                        • API String ID: 0-2896069617
                        • Opcode ID: 942bc5cb87e55e5edc0e8196639c90c60168f8d3d218db184b4b9311c34e4d96
                        • Instruction ID: 441e492b6eb78a7f4dbf17a54a13aa100603fa42042e76dc525e859dd3e194d3
                        • Opcode Fuzzy Hash: 942bc5cb87e55e5edc0e8196639c90c60168f8d3d218db184b4b9311c34e4d96
                        • Instruction Fuzzy Hash: A1D1FD34B042449FDB55AF78C4155AE7BB2FFC6310F2481AAE906CB382DA31DE06CB91
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: D6j$D6j$D6j$D6j$D6j$D6j
                        • API String ID: 0-3168718324
                        • Opcode ID: 6b7c68a29beee7d26b667add870a057d4cddbb075961bb479564873bddb53514
                        • Instruction ID: 4c79a4414c0c0d8e11a4d1b4968f761d1a1c05f84a91df6e56b42d9847f38525
                        • Opcode Fuzzy Hash: 6b7c68a29beee7d26b667add870a057d4cddbb075961bb479564873bddb53514
                        • Instruction Fuzzy Hash: EB21F8327043406FDA016AA5AC42A6DE757EBC6704B504538F1064FB9ACF726D9D83A2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1886802091.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6440000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: D6j$D6j$D6j$D6j$D6j$D6j
                        • API String ID: 0-3168718324
                        • Opcode ID: 7c7126daf4054cd6ea7d395c536a38d25f5c40e6d8a89236339673e9829233ac
                        • Instruction ID: 45bd4313b7ba4789d3d0e177c579a4a061db6369ebdef23689e9d84ec04c285d
                        • Opcode Fuzzy Hash: 7c7126daf4054cd6ea7d395c536a38d25f5c40e6d8a89236339673e9829233ac
                        • Instruction Fuzzy Hash: D311A5327003016FDA056EA9DC52A2DE657FBC6700F504538E1064FB99DF72AD9983A6