Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1563392
MD5:9c433a245d7737ca7fa17490e460f14e
SHA1:31e6388f4e45a97a97ac0f34c26a9858ef8dcdb9
SHA256:0b6604d2e6086f7322c634ab925bdc381fe720a2a12f254e5b63b42f89b680f7
Tags:exeuser-Bitsight
Infos:

Detection

Poverty Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected Poverty Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking mutex)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 1472 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 9C433A245D7737CA7FA17490E460F14E)
    • conhost.exe (PID: 1220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • file.exe (PID: 2172 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 9C433A245D7737CA7FA17490E460F14E)
  • cleanup
{"C2 url": "185.244.212.106:2227"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
    00000000.00000002.2015603073.000000000026E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
      Process Memory Space: file.exe PID: 1472JoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
        Process Memory Space: file.exe PID: 2172JoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
          SourceRuleDescriptionAuthorStrings
          0.2.file.exe.299de8.0.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
            3.2.file.exe.400000.1.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
              3.2.file.exe.400000.1.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                0.2.file.exe.299de8.0.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-26T22:50:04.835240+010020487361A Network Trojan was detected192.168.2.549706185.244.212.1062227TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: file.exeAvira: detected
                  Source: 3.2.file.exe.400000.1.raw.unpackMalware Configuration Extractor: Poverty Stealer {"C2 url": "185.244.212.106:2227"}
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.4% probability
                  Source: file.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00401D21 CryptUnprotectData,CryptProtectData,3_2_00401D21
                  Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                  Source: Binary string: ntkrnlmp.pdbOc source: file.exe, 00000003.00000002.2148083936.000000000A98C000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb/ source: file.exe, 00000003.00000002.2138518387.000000000A19F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb"?^ source: file.exe, 00000003.00000002.2157022064.000000000B232000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb1 source: file.exe, 00000003.00000002.2253873303.000000000F0A4000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb( source: file.exe, 00000003.00000002.2138518387.000000000A19F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: file.exe, 00000003.00000002.2192045605.000000000CCD8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2192045605.000000000CCE5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2205178427.000000000D62B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2131509698.0000000009ADA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2179146915.000000000C405000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2253873303.000000000F0A2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2167304501.000000000BB30000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2127622104.00000000095A1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2138518387.000000000A19F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb& source: file.exe, 00000003.00000002.2220603331.000000000DEF3000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb%![ source: file.exe, 00000003.00000002.2157022064.000000000B232000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdbMo{ source: file.exe, 00000003.00000002.2148083936.000000000A98C000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdbx source: file.exe, 00000003.00000002.2192045605.000000000CCD8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2220044017.000000000DED3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2148083936.000000000A98C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2205178427.000000000D62B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2131509698.0000000009ADA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2179146915.000000000C405000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2236350550.000000000E7E8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2253873303.000000000F0A2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2167304501.000000000BB30000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2128471220.000000000972C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2127622104.00000000095A1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2138518387.000000000A19F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2157022064.000000000B232000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb source: file.exe, 00000003.00000002.2192045605.000000000CCE5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2236350550.000000000E7E8000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdbI'" source: file.exe, 00000003.00000002.2167304501.000000000BB30000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb") source: file.exe, 00000003.00000002.2128471220.000000000972C000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb&% source: file.exe, 00000003.00000002.2205178427.000000000D62B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb! source: file.exe, 00000003.00000002.2220603331.000000000DEF3000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb%' source: file.exe, 00000003.00000002.2205178427.000000000D62B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb$#T source: file.exe, 00000003.00000002.2157022064.000000000B232000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb,S source: file.exe, 00000003.00000002.2179146915.000000000C405000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdbH!# source: file.exe, 00000003.00000002.2167304501.000000000BB30000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdbI source: file.exe, 00000003.00000002.2220044017.000000000DED3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2236350550.000000000E7E8000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdbHa source: file.exe, 00000003.00000002.2148083936.000000000A98C000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb0 source: file.exe, 00000003.00000002.2253873303.000000000F0A4000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdbM source: file.exe, 00000003.00000002.2236350550.000000000E7E8000.00000004.00000020.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003B2CB9 FindFirstFileExW,0_2_003B2CB9
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003B2D6A FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_003B2D6A
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003B2CB9 FindFirstFileExW,3_2_003B2CB9
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003B2D6A FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_003B2D6A
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00401000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,3_2_00401000
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00401DC9 FindFirstFileW,FindNextFileW,3_2_00401DC9
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00404EB2 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,3_2_00404EB2
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00404145 FindFirstFileW,FindNextFileW,3_2_00404145
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00403F87 FindFirstFileW,FindNextFileW,3_2_00403F87
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2048736 - Severity 1 - ET MALWARE LUMAR Stealer Exfiltration M2 : 192.168.2.5:49706 -> 185.244.212.106:2227
                  Source: Malware configuration extractorURLs: 185.244.212.106:2227
                  Source: global trafficTCP traffic: 192.168.2.5:49706 -> 185.244.212.106:2227
                  Source: Joe Sandbox ViewIP Address: 185.244.212.106 185.244.212.106
                  Source: Joe Sandbox ViewASN Name: M247GB M247GB
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: unknownTCP traffic detected without corresponding DNS query: 185.244.212.106
                  Source: file.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: file.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                  Source: file.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                  Source: file.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
                  Source: file.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
                  Source: file.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                  Source: file.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                  Source: file.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
                  Source: file.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
                  Source: file.exeString found in binary or memory: http://ocsp.comodoca.com0
                  Source: file.exeString found in binary or memory: http://ocsp.sectigo.com0
                  Source: file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: file.exeString found in binary or memory: https://sectigo.com/CPS0
                  Source: file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00404C2D GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetDC,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateDIBSection,SelectObject,BitBlt,DeleteObject,DeleteDC,ReleaseDC,3_2_00404C2D
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A20300_2_003A2030
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A32200_2_003A3220
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A42700_2_003A4270
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A34800_2_003A3480
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A86700_2_003A8670
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A10000_2_003A1000
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A58700_2_003A5870
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A70F00_2_003A70F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A99100_2_003A9910
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A39000_2_003A3900
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A19D00_2_003A19D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003BA2620_2_003BA262
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A2A800_2_003A2A80
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A6B300_2_003A6B30
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A5B400_2_003A5B40
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A63D00_2_003A63D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A4CB00_2_003A4CB0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A54F00_2_003A54F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A96000_2_003A9600
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A5EB00_2_003A5EB0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A26800_2_003A2680
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A8E800_2_003A8E80
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A2F100_2_003A2F10
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A77700_2_003A7770
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A7F500_2_003A7F50
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A20303_2_003A2030
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A10003_2_003A1000
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A58703_2_003A5870
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A70F03_2_003A70F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A99103_2_003A9910
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A39003_2_003A3900
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A19D03_2_003A19D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A32203_2_003A3220
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A42703_2_003A4270
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003BA2623_2_003BA262
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A2A803_2_003A2A80
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A6B303_2_003A6B30
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A5B403_2_003A5B40
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A63D03_2_003A63D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A4CB03_2_003A4CB0
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A34803_2_003A3480
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A54F03_2_003A54F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A96003_2_003A9600
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A86703_2_003A8670
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A5EB03_2_003A5EB0
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A26803_2_003A2680
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A8E803_2_003A8E80
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A2F103_2_003A2F10
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A77703_2_003A7770
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A7F503_2_003A7F50
                  Source: C:\Users\user\Desktop\file.exeCode function: String function: 003ADB61 appears 40 times
                  Source: C:\Users\user\Desktop\file.exeCode function: String function: 003AB060 appears 84 times
                  Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: file.exeStatic PE information: Section: .ROL ZLIB complexity 1.0005296610169492
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/0@0/1
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1220:120:WilError_03
                  Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\085f229d-d27d-4fc1-9dc1-8958125ccbd9
                  Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
                  Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                  Source: Binary string: ntkrnlmp.pdbOc source: file.exe, 00000003.00000002.2148083936.000000000A98C000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb/ source: file.exe, 00000003.00000002.2138518387.000000000A19F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb"?^ source: file.exe, 00000003.00000002.2157022064.000000000B232000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb1 source: file.exe, 00000003.00000002.2253873303.000000000F0A4000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb( source: file.exe, 00000003.00000002.2138518387.000000000A19F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: file.exe, 00000003.00000002.2192045605.000000000CCD8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2192045605.000000000CCE5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2205178427.000000000D62B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2131509698.0000000009ADA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2179146915.000000000C405000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2253873303.000000000F0A2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2167304501.000000000BB30000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2127622104.00000000095A1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2138518387.000000000A19F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb& source: file.exe, 00000003.00000002.2220603331.000000000DEF3000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb%![ source: file.exe, 00000003.00000002.2157022064.000000000B232000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdbMo{ source: file.exe, 00000003.00000002.2148083936.000000000A98C000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdbx source: file.exe, 00000003.00000002.2192045605.000000000CCD8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2220044017.000000000DED3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2148083936.000000000A98C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2205178427.000000000D62B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2131509698.0000000009ADA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2179146915.000000000C405000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2236350550.000000000E7E8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2253873303.000000000F0A2000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2167304501.000000000BB30000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2128471220.000000000972C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2127622104.00000000095A1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2138518387.000000000A19F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2157022064.000000000B232000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb source: file.exe, 00000003.00000002.2192045605.000000000CCE5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2236350550.000000000E7E8000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdbI'" source: file.exe, 00000003.00000002.2167304501.000000000BB30000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb") source: file.exe, 00000003.00000002.2128471220.000000000972C000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb&% source: file.exe, 00000003.00000002.2205178427.000000000D62B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb! source: file.exe, 00000003.00000002.2220603331.000000000DEF3000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb%' source: file.exe, 00000003.00000002.2205178427.000000000D62B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb$#T source: file.exe, 00000003.00000002.2157022064.000000000B232000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb,S source: file.exe, 00000003.00000002.2179146915.000000000C405000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdbH!# source: file.exe, 00000003.00000002.2167304501.000000000BB30000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdbI source: file.exe, 00000003.00000002.2220044017.000000000DED3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2236350550.000000000E7E8000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdbHa source: file.exe, 00000003.00000002.2148083936.000000000A98C000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb0 source: file.exe, 00000003.00000002.2253873303.000000000F0A4000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdbM source: file.exe, 00000003.00000002.2236350550.000000000E7E8000.00000004.00000020.00020000.00000000.sdmp
                  Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: file.exeStatic PE information: section name: .10cfg
                  Source: file.exeStatic PE information: section name: .ROL
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A82E0 push eax; mov dword ptr [esp], ecx0_2_003A82E5
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A7CF3 push eax; mov dword ptr [esp], ecx0_2_003A7D15
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AA54F push ecx; ret 0_2_003AA562
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A82E0 push eax; mov dword ptr [esp], ecx3_2_003A82E5
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A7CF3 push eax; mov dword ptr [esp], ecx3_2_003A7D15
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003AA54F push ecx; ret 3_2_003AA562
                  Source: file.exeStatic PE information: section name: .text entropy: 6.911514343507659
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AA74D GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_003AA74D

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\file.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_3-13251
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003B2CB9 FindFirstFileExW,0_2_003B2CB9
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003B2D6A FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_003B2D6A
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003B2CB9 FindFirstFileExW,3_2_003B2CB9
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003B2D6A FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_003B2D6A
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00401000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,3_2_00401000
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00401DC9 FindFirstFileW,FindNextFileW,3_2_00401DC9
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00404EB2 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,3_2_00404EB2
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00404145 FindFirstFileW,FindNextFileW,3_2_00404145
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_00403F87 FindFirstFileW,FindNextFileW,3_2_00403F87
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_004020E1 GetCurrentHwProfileA,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,3_2_004020E1
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Adobe\AcroCef\DC\Acrobat\Cache\Network\CookiesJump to behavior
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                  Source: file.exe, 00000003.00000002.2239949570.000000000EA04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PasswordVMware20,11696428e
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                  Source: file.exe, 00000003.00000002.2149426980.000000000AB68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,116964286558ar
                  Source: file.exe, 00000003.00000002.2239949570.000000000EA04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                  Source: file.exe, 00000003.00000002.2239949570.000000000EA04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PasswordVMware20,11696428en-GBh
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                  Source: file.exe, 00000003.00000002.2180758455.000000000C624000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,116964286558
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                  Source: file.exe, 00000003.00000002.2139392308.000000000A2C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655?
                  Source: file.exe, 00000003.00000002.2175318807.000000000C18C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                  Source: file.exe, 00000003.00000002.2193812997.000000000CF0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655?%
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                  Source: file.exe, 00000003.00000002.2169058190.000000000BD2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AAEE2 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003AAEE2
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003C31A4 mov edi, dword ptr fs:[00000030h]0_2_003C31A4
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A2680 mov edi, dword ptr fs:[00000030h]0_2_003A2680
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A2680 mov edi, dword ptr fs:[00000030h]0_2_003A2680
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003A2680 mov edi, dword ptr fs:[00000030h]0_2_003A2680
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A2680 mov edi, dword ptr fs:[00000030h]3_2_003A2680
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A2680 mov edi, dword ptr fs:[00000030h]3_2_003A2680
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003A2680 mov edi, dword ptr fs:[00000030h]3_2_003A2680
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003B05C6 GetProcessHeap,0_2_003B05C6
                  Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AAEE2 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003AAEE2
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AAED6 SetUnhandledExceptionFilter,0_2_003AAED6
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AA722 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_003AA722
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AD7CC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003AD7CC
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003AAEE2 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_003AAEE2
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003AAED6 SetUnhandledExceptionFilter,3_2_003AAED6
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003AA722 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_003AA722
                  Source: C:\Users\user\Desktop\file.exeCode function: 3_2_003AD7CC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_003AD7CC

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003C31A4 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_003C31A4
                  Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AACA0 cpuid 0_2_003AACA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_003AB341 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_003AB341

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.file.exe.299de8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.file.exe.400000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.file.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.299de8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2015603073.000000000026E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 1472, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 2172, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Local StateJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\Login DataJump to behavior

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.file.exe.299de8.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.file.exe.400000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.file.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.file.exe.299de8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2015603073.000000000026E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 1472, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 2172, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Native API
                  1
                  DLL Side-Loading
                  211
                  Process Injection
                  211
                  Process Injection
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services1
                  Screen Capture
                  2
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory21
                  Security Software Discovery
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Data from Local System
                  1
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                  Software Packing
                  NTDS14
                  System Information Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  file.exe100%AviraHEUR/AGEN.1304889
                  file.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  185.244.212.106:22270%Avira URL Cloudsafe
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  185.244.212.106:2227true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://ac.ecosia.org/autocomplete?q=file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/chrome_newtabfile.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0file.exefalse
                        high
                        https://duckduckgo.com/ac/?q=file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://sectigo.com/CPS0file.exefalse
                            high
                            http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#file.exefalse
                              high
                              https://www.google.com/images/branding/product/ico/googleg_lodp.icofile.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yfile.exefalse
                                  high
                                  http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0file.exefalse
                                    high
                                    http://ocsp.sectigo.com0file.exefalse
                                      high
                                      http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zfile.exefalse
                                        high
                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchfile.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#file.exefalse
                                            high
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#file.exefalse
                                                  high
                                                  https://www.ecosia.org/newtab/file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=file.exe, 00000003.00000003.2043675219.00000000095EC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000003.00000002.2130535521.00000000099FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#file.exefalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        185.244.212.106
                                                        unknownRomania
                                                        9009M247GBtrue
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1563392
                                                        Start date and time:2024-11-26 22:49:05 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 4m 41s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:6
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:file.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@4/0@0/1
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 99%
                                                        • Number of executed functions: 43
                                                        • Number of non-executed functions: 77
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size getting too big, too many NtOpenFile calls found.
                                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                        • VT rate limit hit for: file.exe
                                                        No simulations
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        185.244.212.106file.exeGet hashmaliciousPoverty StealerBrowse
                                                          file.exeGet hashmaliciousPoverty StealerBrowse
                                                            j95Whg3AY1.exeGet hashmaliciousPoverty StealerBrowse
                                                              F7fahhucBo.exeGet hashmaliciousPoverty StealerBrowse
                                                                IxE6TjWjRM.exeGet hashmaliciousPoverty StealerBrowse
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  M247GBhttps://cad7f0f6.db98e6271a22556409a87203.workers.devGet hashmaliciousCorporateDataTheft, HTMLPhisherBrowse
                                                                  • 45.11.180.22
                                                                  file.exeGet hashmaliciousPoverty StealerBrowse
                                                                  • 185.244.212.106
                                                                  file.exeGet hashmaliciousPoverty StealerBrowse
                                                                  • 185.244.212.106
                                                                  file.exeGet hashmaliciousNetSupport RATBrowse
                                                                  • 45.61.128.74
                                                                  la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                                  • 93.120.123.217
                                                                  file.exeGet hashmaliciousNetSupport RATBrowse
                                                                  • 45.61.128.74
                                                                  loligang.ppc.elfGet hashmaliciousMiraiBrowse
                                                                  • 104.224.90.41
                                                                  comprobante.exeGet hashmaliciousRemcosBrowse
                                                                  • 176.10.80.43
                                                                  7jBzTH9FXQ.exeGet hashmaliciousUnknownBrowse
                                                                  • 95.174.64.138
                                                                  fACYdCvub8.exeGet hashmaliciousUnknownBrowse
                                                                  • 95.174.66.19
                                                                  No context
                                                                  No context
                                                                  No created / dropped files found
                                                                  File type:PE32 executable (console) Intel 80386, for MS Windows
                                                                  Entropy (8bit):7.072516985415119
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:file.exe
                                                                  File size:189'568 bytes
                                                                  MD5:9c433a245d7737ca7fa17490e460f14e
                                                                  SHA1:31e6388f4e45a97a97ac0f34c26a9858ef8dcdb9
                                                                  SHA256:0b6604d2e6086f7322c634ab925bdc381fe720a2a12f254e5b63b42f89b680f7
                                                                  SHA512:edaf8ff778db40dfcacd7c8cb5cef598dc7c13ebfb6b4f8e828c0697b24115f637ac510c945d31b1c4873d39fca7d8be7b03ba6dc64e665def6bf2d058a00c95
                                                                  SSDEEP:3072:1VUaad8eqre/E0fYSB0ih9FHax2OdA1hBB/1lQaejhvltBNTE63yMnHpeGlI4yBt:3Dad8trC7f710UOdc/0bBNTE63yxcXqt
                                                                  TLSH:F304BF1570C0D0B2E9531831A8B4C6B16A3EFA615F208EEF7798977E4F253D18A3587B
                                                                  File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L...K.Eg..........................................@.......................... ............@.................................X...(..
                                                                  Icon Hash:00928e8e8686b000
                                                                  Entrypoint:0x40b2ec
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:true
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows cui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_ISOLATION, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x6745D64B [Tue Nov 26 14:08:11 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:6
                                                                  OS Version Minor:0
                                                                  File Version Major:6
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:6
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:0d65a10b5fab1eb2208e888615c975f3
                                                                  Signature Valid:
                                                                  Signature Issuer:
                                                                  Signature Validation Error:
                                                                  Error Number:
                                                                  Not Before, Not After
                                                                    Subject Chain
                                                                      Version:
                                                                      Thumbprint MD5:
                                                                      Thumbprint SHA-1:
                                                                      Thumbprint SHA-256:
                                                                      Serial:
                                                                      Instruction
                                                                      call 00007FA4246CAFBAh
                                                                      jmp 00007FA4246CAE29h
                                                                      mov ecx, dword ptr [004235D8h]
                                                                      push esi
                                                                      push edi
                                                                      mov edi, BB40E64Eh
                                                                      mov esi, FFFF0000h
                                                                      cmp ecx, edi
                                                                      je 00007FA4246CAFB6h
                                                                      test esi, ecx
                                                                      jne 00007FA4246CAFD8h
                                                                      call 00007FA4246CAFE1h
                                                                      mov ecx, eax
                                                                      cmp ecx, edi
                                                                      jne 00007FA4246CAFB9h
                                                                      mov ecx, BB40E64Fh
                                                                      jmp 00007FA4246CAFC0h
                                                                      test esi, ecx
                                                                      jne 00007FA4246CAFBCh
                                                                      or eax, 00004711h
                                                                      shl eax, 10h
                                                                      or ecx, eax
                                                                      mov dword ptr [004235D8h], ecx
                                                                      not ecx
                                                                      pop edi
                                                                      mov dword ptr [004235D4h], ecx
                                                                      pop esi
                                                                      ret
                                                                      push ebp
                                                                      mov ebp, esp
                                                                      sub esp, 14h
                                                                      and dword ptr [ebp-0Ch], 00000000h
                                                                      lea eax, dword ptr [ebp-0Ch]
                                                                      and dword ptr [ebp-08h], 00000000h
                                                                      push eax
                                                                      call dword ptr [0042134Ch]
                                                                      mov eax, dword ptr [ebp-08h]
                                                                      xor eax, dword ptr [ebp-0Ch]
                                                                      mov dword ptr [ebp-04h], eax
                                                                      call dword ptr [00421314h]
                                                                      xor dword ptr [ebp-04h], eax
                                                                      call dword ptr [00421310h]
                                                                      xor dword ptr [ebp-04h], eax
                                                                      lea eax, dword ptr [ebp-14h]
                                                                      push eax
                                                                      call dword ptr [00421388h]
                                                                      mov eax, dword ptr [ebp-10h]
                                                                      lea ecx, dword ptr [ebp-04h]
                                                                      xor eax, dword ptr [ebp-14h]
                                                                      xor eax, dword ptr [ebp-04h]
                                                                      xor eax, ecx
                                                                      leave
                                                                      ret
                                                                      mov eax, 00004000h
                                                                      ret
                                                                      push 00424998h
                                                                      call dword ptr [00421368h]
                                                                      ret
                                                                      mov al, 01h
                                                                      ret
                                                                      push 00030000h
                                                                      push 00010000h
                                                                      push 00000000h
                                                                      call 00007FA4246CCCB3h
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x211580x28.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x310000x10.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x2bc000x2e80.ROL
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x270000x1620.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1b7c00xc0.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x212b00x130.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000x199400x19a00eece2ebfa0e1eac007d9a18fb7cf3122False0.5988185975609757data6.911514343507659IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0x1b0000x72440x740008f7fc137d9ee1d7930fb5afd5858e48False0.4047346443965517data4.780789647051548IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0x230000x20940x1000727c8d47eb17616234df54f9202d6ad2False0.481201171875data5.041175769024138IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .10cfg0x260000x80x20032b4303d1745a694ee1cbc28035c59d7False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x270000x16200x1800045b3e5d880e10085db2a35a5d8b6aa4False0.7600911458333334data6.362329400431381IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      .ROL0x290000x76000x76005de6ca81d504e18ec07ba4c128144c16False1.0005296610169492data7.994779917365839IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .rsrc0x310000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      DLLImport
                                                                      KERNEL32.dllCloseHandle, CompareStringW, CreateFileW, CreateThread, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileType, GetLastError, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, RtlUnwind, SetEndOfFile, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-11-26T22:50:04.835240+01002048736ET MALWARE LUMAR Stealer Exfiltration M21192.168.2.549706185.244.212.1062227TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 26, 2024 22:50:04.592123032 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.712430000 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.712503910 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.714937925 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.715117931 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.834965944 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.835021973 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.835194111 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.835215092 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.835239887 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.835262060 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.835361004 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.835371017 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.835417986 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.835449934 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.835489988 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.835494995 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.835535049 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.835592031 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.835649014 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.835670948 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.835716009 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.954688072 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.954890013 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.955003977 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.955051899 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.955204964 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.955224037 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.955248117 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.955255985 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.955267906 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.955300093 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.955377102 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.955387115 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.955426931 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:04.998394966 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:04.998492002 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.118335962 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.118422031 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.166426897 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.166492939 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.282356977 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.378354073 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.378408909 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.631928921 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.631983995 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.738100052 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.738280058 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.738339901 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.752006054 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.752062082 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.858367920 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858390093 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858429909 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.858453035 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.858481884 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858493090 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858536005 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.858623028 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858632088 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858643055 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858696938 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.858710051 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858736992 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858746052 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858776093 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.858798981 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.858829975 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858908892 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.858923912 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.858952999 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.859080076 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.859138012 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.859181881 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.859191895 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.859251022 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.859258890 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.859307051 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.859343052 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.859458923 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.859483004 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.859597921 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.859606028 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.859648943 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.859735966 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.859787941 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.859952927 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.860176086 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.860239983 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.860276937 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.860455036 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.860512972 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.860523939 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.860563040 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.872363091 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.872416019 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.978889942 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.978969097 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.979070902 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.979118109 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.979201078 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.979258060 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.979289055 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.979371071 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.979432106 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.979567051 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.979693890 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.979749918 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.979794979 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.979944944 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.979998112 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980053902 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980170965 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980221987 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980230093 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980235100 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980240107 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980268002 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980273008 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980282068 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980326891 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980339050 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980355024 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980381012 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980396032 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980477095 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980485916 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980494022 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980534077 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980586052 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980635881 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980652094 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980660915 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980668068 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980710030 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980725050 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980739117 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980768919 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980813980 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980823040 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980837107 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980865955 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980866909 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980911016 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.980931997 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.980982065 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981003046 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981053114 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981081009 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981089115 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981092930 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981153011 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981178999 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981187105 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981240988 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981281996 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981323957 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981327057 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981336117 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981350899 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981375933 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981393099 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981401920 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981447935 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981465101 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981473923 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981497049 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981517076 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981570959 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981580973 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981607914 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981617928 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981622934 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981642962 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981667995 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981803894 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981812000 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981820107 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981822968 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981865883 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981894016 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981903076 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981940985 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.981950045 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981957912 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.981997967 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.982043028 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.982459068 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.992424011 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.992511034 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:05.992532015 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:05.992577076 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.099462032 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.099482059 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.099529982 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.099548101 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.099739075 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.099787951 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.099946976 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.099993944 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.100097895 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.100111961 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.100156069 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.100208044 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.100220919 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.100263119 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.100312948 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.100363016 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.100395918 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.100444078 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.100541115 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.100591898 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.100629091 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.100677967 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.100894928 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.100949049 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.100989103 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.101062059 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.101298094 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.101356983 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.101404905 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.101450920 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.101490974 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.101536989 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.101636887 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.101689100 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.101771116 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.101819992 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.101829052 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.101877928 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102071047 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102118969 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102281094 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102327108 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102330923 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102339029 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102376938 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102411985 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102463961 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102495909 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102510929 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102540016 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102555990 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102576017 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102648020 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102662086 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102710009 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102736950 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102751017 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102786064 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102797031 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102835894 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102854013 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.102878094 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102907896 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.102982998 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103009939 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103049040 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103082895 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103132010 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103152037 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103183031 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103199959 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103203058 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103250027 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103271008 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103308916 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103332996 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103348970 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103432894 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103445053 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103460073 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103492975 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103513956 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103560925 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103574038 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103621006 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103642941 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103693008 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103795052 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.103837967 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.103987932 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.104036093 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.104063988 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.104110003 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.104250908 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.104264975 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.104299068 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.104319096 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.104365110 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.104412079 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.104487896 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.104535103 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.104578972 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.104626894 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.104768991 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.104782104 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.104825974 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.104847908 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.104895115 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105089903 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105104923 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105142117 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105159998 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105189085 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105238914 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105273962 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105295897 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105312109 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105326891 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105344057 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105365038 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105508089 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105521917 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105545998 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105576992 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105619907 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105650902 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105663061 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105685949 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105695009 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105699062 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105710030 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105711937 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105736971 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105753899 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105787992 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105837107 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105878115 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105890989 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105902910 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105921984 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105923891 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105935097 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105937004 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105947971 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.105962992 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.105983973 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106127024 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106139898 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106152058 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106173038 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106193066 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106281042 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106292963 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106323004 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106338024 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106434107 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106479883 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106548071 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106561899 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106586933 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106594086 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106607914 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106630087 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106662035 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106674910 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106720924 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106720924 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106776953 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106812000 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106825113 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106847048 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106862068 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106863022 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106873035 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106874943 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.106879950 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106910944 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.106970072 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107028008 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.107059002 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107070923 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107112885 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.107114077 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107126951 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107140064 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107153893 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.107167006 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107187986 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.107207060 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.107218027 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107229948 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107261896 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.107266903 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107341051 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.107469082 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107481003 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107522964 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.107614994 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107685089 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.107769966 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107783079 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107798100 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.107817888 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.107848883 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.108015060 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108063936 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.108150959 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108165026 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108189106 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108202934 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.108233929 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108237028 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.108247042 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108274937 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.108285904 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.108302116 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108349085 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.108432055 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108447075 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108479023 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108479977 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.108501911 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.108513117 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.108530998 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108573914 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.108601093 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108613968 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.108652115 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.112442017 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.112503052 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.112504959 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.112555027 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.112591982 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.112639904 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.112705946 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.112771034 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.219750881 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.219769001 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.219782114 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.219805956 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.219825983 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.219871044 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.219882965 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.219907999 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.219919920 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.219923973 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.219949007 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.219949961 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.219970942 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.219990969 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.220145941 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220159054 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220170021 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220190048 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.220201969 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.220216990 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.220295906 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220340014 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.220366955 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220415115 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.220650911 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220664024 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220675945 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220690966 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220696926 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.220721006 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.220746040 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.220758915 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220802069 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.220844984 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220856905 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220869064 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.220904112 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221054077 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221066952 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221079111 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221107960 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221122026 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221132040 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221143961 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221154928 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221184969 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221199989 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221230030 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221357107 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221396923 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221402884 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221440077 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221514940 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221566916 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221595049 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221617937 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221630096 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221635103 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221662998 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221668005 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221674919 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221705914 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221765995 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221779108 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221790075 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221832037 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221873999 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221896887 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.221927881 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.221940994 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222140074 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222168922 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222188950 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222218990 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222383022 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222407103 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222453117 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222553015 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222564936 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222577095 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222589016 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222616911 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222630024 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222634077 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222646952 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222659111 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222680092 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222697020 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222709894 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222712040 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222748041 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222774029 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222785950 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222820044 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222841024 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222888947 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222901106 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222913027 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.222945929 CET497062227192.168.2.5185.244.212.106
                                                                      Nov 26, 2024 22:50:06.222975969 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223073006 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223094940 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223107100 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223187923 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223212004 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223223925 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223253012 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223335028 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223416090 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223428965 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223439932 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223453999 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223551989 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223563910 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223575115 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223618984 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223704100 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223716974 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223728895 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223788977 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223866940 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223879099 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.223948002 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224030018 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224142075 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224164963 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224258900 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224271059 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224282980 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224406004 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224417925 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224430084 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224445105 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224575996 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224587917 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224598885 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224613905 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224693060 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224705935 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224718094 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224781990 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224793911 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224806070 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224850893 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224929094 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224941015 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.224951982 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225044012 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225055933 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225111961 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225122929 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225174904 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225188017 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225253105 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225333929 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225420952 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225435019 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225457907 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225469112 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225481033 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225492001 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225632906 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225709915 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225780010 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225791931 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225804090 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225815058 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225886106 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225898027 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225984097 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.225996017 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226006985 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226011992 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226053953 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226066113 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226088047 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226142883 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226304054 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226360083 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226372004 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226386070 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226474047 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226485968 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226502895 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226618052 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226630926 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226641893 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226694107 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226756096 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226768017 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226787090 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226809025 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226820946 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226943970 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.226983070 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227049112 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227086067 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227097988 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227109909 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227221012 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227232933 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227246046 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227277994 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227291107 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227302074 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227407932 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227420092 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227432013 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227468014 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227633953 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227647066 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227658987 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227669954 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227682114 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227705002 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227716923 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227727890 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227823019 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.227844954 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.228003025 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.228015900 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.228027105 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.228044033 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.228172064 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.232527971 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.232541084 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.232553005 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.232568026 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.232614040 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.232625961 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.232645988 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.339750051 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.339931965 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.339943886 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.339955091 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.339977980 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340090990 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340102911 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340116024 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340157986 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340308905 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340321064 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340332985 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340444088 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340466976 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340538025 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340643883 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340656042 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340717077 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340878010 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340929031 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340940952 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.340964079 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341054916 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341067076 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341276884 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341289043 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341300011 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341315985 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341666937 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341679096 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341691017 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341713905 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341748953 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341870070 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341926098 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341948032 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.341991901 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.342216969 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.342273951 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.342360973 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.342412949 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.342425108 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.342696905 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.342709064 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.342720985 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.342771053 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.342782974 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343038082 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343050003 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343061924 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343085051 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343209028 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343414068 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343521118 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343533993 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343547106 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343940973 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343952894 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.343965054 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344003916 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344016075 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344100952 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344144106 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344345093 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344367027 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344594002 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344607115 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344624996 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344646931 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344883919 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344896078 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.344907045 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345042944 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345066071 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345244884 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345321894 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345334053 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345345974 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345469952 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345482111 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345493078 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345851898 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345947027 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345958948 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.345971107 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.346096992 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.346162081 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.346312046 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.346421957 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.346548080 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.346592903 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.346755028 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.346766949 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.346779108 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.346808910 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347053051 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347181082 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347193003 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347244978 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347336054 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347440958 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347496033 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347508907 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347649097 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347661018 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347671986 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347682953 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347786903 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347809076 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347934961 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.347974062 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.348143101 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.348155022 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.348283052 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.348294973 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.348412991 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.348467112 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.348757029 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.348965883 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.348978043 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.348989010 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349436045 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349447966 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349459887 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349544048 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349617958 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349630117 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349701881 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349716902 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349858999 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349870920 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349883080 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349971056 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349982977 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.349994898 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.350213051 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.350225925 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.350236893 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.350249052 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.350260973 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.350342035 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.350353956 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.350363970 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351146936 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351159096 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351171017 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351181984 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351260900 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351273060 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351284981 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351295948 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351308107 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351325035 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351336956 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351350069 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351361990 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351372957 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351383924 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351396084 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351407051 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351418018 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351429939 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351440907 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351453066 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351464033 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351475954 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351488113 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351497889 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351516008 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351527929 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.351540089 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352375031 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352386951 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352400064 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352411032 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352422953 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352435112 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352447987 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352458954 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352471113 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352482080 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352493048 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.352498055 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.368015051 CET222749706185.244.212.106192.168.2.5
                                                                      Nov 26, 2024 22:50:06.368088961 CET497062227192.168.2.5185.244.212.106

                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:16:49:52
                                                                      Start date:26/11/2024
                                                                      Path:C:\Users\user\Desktop\file.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                                      Imagebase:0x3a0000
                                                                      File size:189'568 bytes
                                                                      MD5 hash:9C433A245D7737CA7FA17490E460F14E
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000000.00000002.2015603073.000000000026E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:1
                                                                      Start time:16:49:52
                                                                      Start date:26/11/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff6d64d0000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:3
                                                                      Start time:16:49:53
                                                                      Start date:26/11/2024
                                                                      Path:C:\Users\user\Desktop\file.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                                      Imagebase:0x3a0000
                                                                      File size:189'568 bytes
                                                                      MD5 hash:9C433A245D7737CA7FA17490E460F14E
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:10.5%
                                                                        Dynamic/Decrypted Code Coverage:0.4%
                                                                        Signature Coverage:3.1%
                                                                        Total number of Nodes:1907
                                                                        Total number of Limit Nodes:29
                                                                        execution_graph 13148 3b1231 13151 3adb61 LeaveCriticalSection 13148->13151 13150 3b1238 13151->13150 12437 3c31a4 12438 3c31da 12437->12438 12439 3c3327 GetPEB 12438->12439 12440 3c3339 CreateProcessW VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 12438->12440 12439->12440 12440->12438 12441 3c33e0 WriteProcessMemory 12440->12441 12442 3c3425 12441->12442 12443 3c342a WriteProcessMemory 12442->12443 12444 3c3467 WriteProcessMemory Wow64SetThreadContext ResumeThread 12442->12444 12443->12442 13217 3aef25 13218 3aef2f 13217->13218 13220 3aef3c 13217->13220 13218->13220 13221 3ae3c8 13218->13221 13222 3b165a ___free_lconv_mon 14 API calls 13221->13222 13223 3ae3e0 13222->13223 13223->13220 13233 3a9c1d 13238 3aa5bc 13233->13238 13239 3aa5cc 13238->13239 13240 3a9c27 13238->13240 13239->13240 13245 3aac58 InitializeCriticalSectionEx 13239->13245 13242 3aaa07 13240->13242 13246 3aaa1c 13242->13246 13245->13239 13247 3aaa2b 13246->13247 13248 3aaa32 13246->13248 13252 3ad1ab 13247->13252 13255 3ad13a 13248->13255 13251 3a9c31 13253 3ad13a 42 API calls 13252->13253 13254 3ad1bd 13253->13254 13254->13251 13258 3ad39d 13255->13258 13259 3ad3a9 __FrameHandler3::FrameUnwindToState 13258->13259 13266 3adb4a EnterCriticalSection 13259->13266 13261 3ad3b7 13267 3ad1c1 13261->13267 13263 3ad3c4 13277 3ad3ec 13263->13277 13266->13261 13268 3ad1dc 13267->13268 13269 3ad24f _unexpected 13267->13269 13268->13269 13270 3ad22f 13268->13270 13272 3b3653 42 API calls 13268->13272 13269->13263 13270->13269 13271 3b3653 42 API calls 13270->13271 13273 3ad245 13271->13273 13274 3ad225 13272->13274 13276 3b165a ___free_lconv_mon 14 API calls 13273->13276 13275 3b165a ___free_lconv_mon 14 API calls 13274->13275 13275->13270 13276->13269 13280 3adb61 LeaveCriticalSection 13277->13280 13279 3ad16b 13279->13251 13280->13279 13281 3acd12 13284 3acd39 13281->13284 13285 3acd45 __FrameHandler3::FrameUnwindToState 13284->13285 13292 3adb4a EnterCriticalSection 13285->13292 13287 3acd7d 13293 3acd9b 13287->13293 13288 3acd4f 13288->13287 13291 3b2789 __strnicoll 14 API calls 13288->13291 13291->13288 13292->13288 13296 3adb61 LeaveCriticalSection 13293->13296 13295 3acd37 13296->13295 13303 3b0c0a 13304 3b0c16 __FrameHandler3::FrameUnwindToState 13303->13304 13315 3adb4a EnterCriticalSection 13304->13315 13306 3b0c1d 13316 3b3f6d 13306->13316 13309 3b0c3b 13335 3b0c61 13309->13335 13314 3b0d4c 2 API calls 13314->13309 13315->13306 13317 3b3f79 __FrameHandler3::FrameUnwindToState 13316->13317 13318 3b3fa3 13317->13318 13319 3b3f82 13317->13319 13338 3adb4a EnterCriticalSection 13318->13338 13321 3b1ce6 __dosmaperr 14 API calls 13319->13321 13323 3b3f87 13321->13323 13322 3b3faf 13326 3b3fdb 13322->13326 13328 3b3ebd __wsopen_s 15 API calls 13322->13328 13324 3ad76b __fread_nolock 39 API calls 13323->13324 13325 3b0c2c 13324->13325 13325->13309 13329 3b0c96 GetStartupInfoW 13325->13329 13339 3b4002 13326->13339 13328->13322 13330 3b0c36 13329->13330 13331 3b0cb3 13329->13331 13330->13314 13331->13330 13332 3b3f6d 40 API calls 13331->13332 13333 3b0cdb 13332->13333 13333->13330 13334 3b0d0b GetFileType 13333->13334 13334->13333 13343 3adb61 LeaveCriticalSection 13335->13343 13337 3b0c4c 13338->13322 13342 3adb61 LeaveCriticalSection 13339->13342 13341 3b4009 13341->13325 13342->13341 13343->13337 12445 3a3900 12452 3a3220 12445->12452 12447 3a3480 46 API calls 12450 3a3926 12447->12450 12448 3a3d3b 12449 3a5b40 std::_Throw_Cpp_error 41 API calls 12449->12450 12450->12447 12450->12448 12450->12449 12451 3a4cb0 std::_Throw_Cpp_error 39 API calls 12450->12451 12451->12450 12462 3adfe6 12452->12462 12455 3a337d 12455->12450 12457 3adfe6 92 API calls 12460 3a3234 12457->12460 12458 3aed5b ___std_exception_copy 15 API calls 12458->12460 12460->12455 12460->12457 12460->12458 12461 3ade91 69 API calls 12460->12461 12465 3ae3e3 12460->12465 12471 3ae706 12460->12471 12477 3ae1d2 12460->12477 12461->12460 12480 3adffd 12462->12480 12466 3ae3f6 __fread_nolock 12465->12466 12872 3ae65c 12466->12872 12469 3ad9d9 __fread_nolock 39 API calls 12470 3ae418 12469->12470 12470->12460 12472 3ae719 __fread_nolock 12471->12472 12964 3aecdb 12472->12964 12475 3ad9d9 __fread_nolock 39 API calls 12476 3ae731 12475->12476 12476->12460 12997 3ae135 12477->12997 12482 3ae009 __FrameHandler3::FrameUnwindToState 12480->12482 12481 3ae010 12483 3b1ce6 __dosmaperr 14 API calls 12481->12483 12482->12481 12484 3ae030 12482->12484 12485 3ae015 12483->12485 12486 3ae042 12484->12486 12487 3ae035 12484->12487 12488 3ad76b __fread_nolock 39 API calls 12485->12488 12499 3b4292 12486->12499 12489 3b1ce6 __dosmaperr 14 API calls 12487->12489 12498 3adff8 12488->12498 12489->12498 12492 3ae05f 12507 3b43f8 12492->12507 12493 3ae052 12494 3b1ce6 __dosmaperr 14 API calls 12493->12494 12494->12498 12498->12460 12500 3b429e __FrameHandler3::FrameUnwindToState 12499->12500 12517 3adb4a EnterCriticalSection 12500->12517 12502 3b42ac 12518 3b4336 12502->12518 12508 3b4517 12507->12508 12543 3b459a 12508->12543 12511 3ae074 12513 3ae09d 12511->12513 12514 3ae0a1 12513->12514 12871 3ac52a LeaveCriticalSection 12514->12871 12516 3ae0b2 12516->12498 12517->12502 12525 3b4359 12518->12525 12519 3b43b1 12520 3b1d96 _unexpected 14 API calls 12519->12520 12521 3b43ba 12520->12521 12523 3b165a ___free_lconv_mon 14 API calls 12521->12523 12524 3b43c3 12523->12524 12527 3b42b9 12524->12527 12536 3b024c 12524->12536 12525->12519 12525->12525 12525->12527 12534 3ac516 EnterCriticalSection 12525->12534 12535 3ac52a LeaveCriticalSection 12525->12535 12531 3b42f2 12527->12531 12542 3adb61 LeaveCriticalSection 12531->12542 12533 3ae04b 12533->12492 12533->12493 12534->12525 12535->12525 12537 3b04d9 _unexpected 5 API calls 12536->12537 12538 3b0268 12537->12538 12539 3b0286 InitializeCriticalSectionAndSpinCount 12538->12539 12540 3b0271 12538->12540 12539->12540 12541 3ac516 EnterCriticalSection 12540->12541 12541->12527 12542->12533 12544 3b45b9 12543->12544 12545 3b45cc 12544->12545 12549 3b45e1 12544->12549 12546 3b1ce6 __dosmaperr 14 API calls 12545->12546 12547 3b45d1 12546->12547 12548 3ad76b __fread_nolock 39 API calls 12547->12548 12551 3b452d 12548->12551 12550 3b4701 12549->12550 12563 3b7511 12549->12563 12550->12551 12552 3b1ce6 __dosmaperr 14 API calls 12550->12552 12551->12511 12560 3b7649 12551->12560 12553 3b47b2 12552->12553 12554 3ad76b __fread_nolock 39 API calls 12553->12554 12554->12551 12556 3b4751 12556->12550 12557 3b7511 39 API calls 12556->12557 12558 3b476f 12557->12558 12558->12550 12559 3b7511 39 API calls 12558->12559 12559->12550 12577 3b7a01 12560->12577 12564 3b7568 12563->12564 12565 3b7520 12563->12565 12566 3b757e __strnicoll 39 API calls 12564->12566 12567 3b7526 12565->12567 12569 3b7543 12565->12569 12574 3b7536 12566->12574 12568 3b1ce6 __dosmaperr 14 API calls 12567->12568 12570 3b752b 12568->12570 12572 3b1ce6 __dosmaperr 14 API calls 12569->12572 12576 3b7561 12569->12576 12571 3ad76b __fread_nolock 39 API calls 12570->12571 12571->12574 12573 3b7552 12572->12573 12575 3ad76b __fread_nolock 39 API calls 12573->12575 12574->12556 12575->12574 12576->12556 12580 3b7a0d __FrameHandler3::FrameUnwindToState 12577->12580 12578 3b7a14 12579 3b1ce6 __dosmaperr 14 API calls 12578->12579 12581 3b7a19 12579->12581 12580->12578 12582 3b7a3f 12580->12582 12583 3ad76b __fread_nolock 39 API calls 12581->12583 12588 3b7669 12582->12588 12585 3b7664 12583->12585 12585->12511 12589 3b2803 __wsopen_s 39 API calls 12588->12589 12590 3b768b 12589->12590 12591 3b289b __wsopen_s 17 API calls 12590->12591 12592 3b7698 12591->12592 12593 3b769f 12592->12593 12601 3b76d7 12592->12601 12595 3b76d1 12593->12595 12596 3b165a ___free_lconv_mon 14 API calls 12593->12596 12597 3b7a96 12595->12597 12596->12595 12598 3b7ada 12597->12598 12599 3b7a9c 12597->12599 12598->12585 12870 3b402e LeaveCriticalSection 12599->12870 12648 3b7b71 12601->12648 12604 3b7709 12606 3b1cf9 __dosmaperr 14 API calls 12604->12606 12605 3b7722 12666 3b3c87 12605->12666 12618 3b770e 12606->12618 12609 3b7730 12613 3b1cf9 __dosmaperr 14 API calls 12609->12613 12610 3b7747 12679 3b7adc CreateFileW 12610->12679 12612 3b1ce6 __dosmaperr 14 API calls 12617 3b771b 12612->12617 12614 3b7735 12613->12614 12615 3b1ce6 __dosmaperr 14 API calls 12614->12615 12615->12618 12616 3b77fd GetFileType 12621 3b7808 GetLastError 12616->12621 12622 3b784f 12616->12622 12617->12593 12618->12612 12619 3b7780 12619->12616 12620 3b77d2 GetLastError 12619->12620 12680 3b7adc CreateFileW 12619->12680 12623 3b1d0c __dosmaperr 14 API calls 12620->12623 12624 3b1d0c __dosmaperr 14 API calls 12621->12624 12681 3b3e2b 12622->12681 12623->12618 12625 3b7816 CloseHandle 12624->12625 12625->12618 12627 3b783f 12625->12627 12630 3b1ce6 __dosmaperr 14 API calls 12627->12630 12629 3b77c5 12629->12616 12629->12620 12632 3b7844 12630->12632 12632->12618 12633 3b78bc 12638 3b78c3 12633->12638 12711 3b7d95 12633->12711 12637 3b78ff 12637->12617 12640 3b797b CloseHandle 12637->12640 12705 3b408e 12638->12705 12738 3b7adc CreateFileW 12640->12738 12642 3b79a6 12643 3b79dc 12642->12643 12644 3b79b0 GetLastError 12642->12644 12643->12617 12645 3b1d0c __dosmaperr 14 API calls 12644->12645 12646 3b79bc 12645->12646 12739 3b3d9a 12646->12739 12649 3b7b92 12648->12649 12654 3b7bac 12648->12654 12651 3b1ce6 __dosmaperr 14 API calls 12649->12651 12649->12654 12652 3b7ba1 12651->12652 12653 3ad76b __fread_nolock 39 API calls 12652->12653 12653->12654 12748 3b7b01 12654->12748 12655 3b7be4 12656 3b7c13 12655->12656 12658 3b1ce6 __dosmaperr 14 API calls 12655->12658 12663 3b76f4 12656->12663 12755 3add10 12656->12755 12660 3b7c08 12658->12660 12659 3b7c61 12661 3b7cde 12659->12661 12659->12663 12662 3ad76b __fread_nolock 39 API calls 12660->12662 12664 3ad798 __wsopen_s 11 API calls 12661->12664 12662->12656 12663->12604 12663->12605 12665 3b7cea 12664->12665 12667 3b3c93 __FrameHandler3::FrameUnwindToState 12666->12667 12762 3adb4a EnterCriticalSection 12667->12762 12670 3b3cbf 12766 3b3ebd 12670->12766 12671 3b3c9a 12671->12670 12675 3b3d2e EnterCriticalSection 12671->12675 12678 3b3ce1 12671->12678 12677 3b3d3b LeaveCriticalSection 12675->12677 12675->12678 12677->12671 12763 3b3d91 12678->12763 12679->12619 12680->12629 12682 3b3e3a 12681->12682 12683 3b3ea3 12681->12683 12682->12683 12689 3b3e60 __wsopen_s 12682->12689 12684 3b1ce6 __dosmaperr 14 API calls 12683->12684 12685 3b3ea8 12684->12685 12686 3b1cf9 __dosmaperr 14 API calls 12685->12686 12687 3b3e90 12686->12687 12687->12633 12690 3b7ceb 12687->12690 12688 3b3e8a SetStdHandle 12688->12687 12689->12687 12689->12688 12691 3b7d13 12690->12691 12704 3b7d45 12690->12704 12691->12704 12774 3b52de 12691->12774 12694 3b7d49 12780 3b48dd 12694->12780 12695 3b7d33 12696 3b1cf9 __dosmaperr 14 API calls 12695->12696 12698 3b7d38 12696->12698 12702 3b1ce6 __dosmaperr 14 API calls 12698->12702 12698->12704 12700 3b7d71 12700->12698 12701 3b52de __fread_nolock 41 API calls 12700->12701 12701->12698 12702->12704 12704->12633 12706 3b40a1 __fread_nolock 12705->12706 12851 3b40be 12706->12851 12708 3b40ad 12709 3ad9d9 __fread_nolock 39 API calls 12708->12709 12710 3b40b9 12709->12710 12710->12617 12712 3b7dc6 12711->12712 12734 3b78f1 12711->12734 12713 3add10 __wsopen_s 39 API calls 12712->12713 12716 3b7de6 12712->12716 12714 3b7ddd 12713->12714 12715 3b7fe0 12714->12715 12714->12716 12717 3ad798 __wsopen_s 11 API calls 12715->12717 12720 3b52de __fread_nolock 41 API calls 12716->12720 12721 3b7ea7 12716->12721 12716->12734 12736 3b7ed6 12716->12736 12718 3b7fea 12717->12718 12719 3b48dd __fread_nolock 51 API calls 12725 3b7f06 12719->12725 12722 3b7ec0 12720->12722 12724 3b7ee0 12721->12724 12721->12734 12864 3b5e16 12721->12864 12722->12721 12727 3b7ecb 12722->12727 12730 3b1ce6 __dosmaperr 14 API calls 12724->12730 12724->12734 12725->12724 12726 3b7f71 12725->12726 12728 3b7f4b 12725->12728 12729 3b7f3e 12725->12729 12725->12734 12735 3b52de __fread_nolock 41 API calls 12726->12735 12731 3b52de __fread_nolock 41 API calls 12727->12731 12728->12726 12733 3b7f53 12728->12733 12732 3b1ce6 __dosmaperr 14 API calls 12729->12732 12730->12734 12731->12736 12732->12724 12737 3b52de __fread_nolock 41 API calls 12733->12737 12734->12637 12734->12638 12735->12724 12736->12719 12736->12724 12736->12734 12737->12724 12738->12642 12740 3b3da9 12739->12740 12741 3b3e10 12739->12741 12740->12741 12747 3b3dd3 __wsopen_s 12740->12747 12742 3b1ce6 __dosmaperr 14 API calls 12741->12742 12743 3b3e15 12742->12743 12744 3b1cf9 __dosmaperr 14 API calls 12743->12744 12745 3b3e00 12744->12745 12745->12643 12746 3b3dfa SetStdHandle 12746->12745 12747->12745 12747->12746 12751 3b7b19 12748->12751 12749 3b7b34 12749->12655 12750 3b1ce6 __dosmaperr 14 API calls 12752 3b7b58 12750->12752 12751->12749 12751->12750 12753 3ad76b __fread_nolock 39 API calls 12752->12753 12754 3b7b63 12753->12754 12754->12655 12756 3add1c 12755->12756 12757 3add31 12755->12757 12758 3b1ce6 __dosmaperr 14 API calls 12756->12758 12757->12659 12759 3add21 12758->12759 12760 3ad76b __fread_nolock 39 API calls 12759->12760 12761 3add2c 12760->12761 12761->12659 12762->12671 12764 3adb61 __FrameHandler3::FrameUnwindToState LeaveCriticalSection 12763->12764 12765 3b3d01 12764->12765 12765->12609 12765->12610 12767 3b1d96 _unexpected 14 API calls 12766->12767 12768 3b3ecf 12767->12768 12770 3b024c __wsopen_s 6 API calls 12768->12770 12772 3b3edc 12768->12772 12769 3b165a ___free_lconv_mon 14 API calls 12771 3b3cc4 12769->12771 12770->12768 12771->12678 12773 3b400b EnterCriticalSection 12771->12773 12772->12769 12773->12678 12775 3b52f2 __fread_nolock 12774->12775 12776 3b547f __fread_nolock 41 API calls 12775->12776 12777 3b5307 12776->12777 12778 3ad9d9 __fread_nolock 39 API calls 12777->12778 12779 3b5316 12778->12779 12779->12694 12779->12695 12781 3b48ef 12780->12781 12782 3b4907 12780->12782 12783 3b1cf9 __dosmaperr 14 API calls 12781->12783 12784 3b4c49 12782->12784 12789 3b494a 12782->12789 12785 3b48f4 12783->12785 12786 3b1cf9 __dosmaperr 14 API calls 12784->12786 12787 3b1ce6 __dosmaperr 14 API calls 12785->12787 12788 3b4c4e 12786->12788 12790 3b48fc 12787->12790 12791 3b1ce6 __dosmaperr 14 API calls 12788->12791 12789->12790 12792 3b4955 12789->12792 12798 3b4985 12789->12798 12790->12700 12845 3b8691 12790->12845 12799 3b4962 12791->12799 12793 3b1cf9 __dosmaperr 14 API calls 12792->12793 12794 3b495a 12793->12794 12796 3b1ce6 __dosmaperr 14 API calls 12794->12796 12795 3ad76b __fread_nolock 39 API calls 12795->12790 12796->12799 12797 3b499e 12800 3b49ab 12797->12800 12805 3b49c7 12797->12805 12798->12797 12798->12800 12801 3b49d9 12798->12801 12799->12795 12802 3b1cf9 __dosmaperr 14 API calls 12800->12802 12803 3b21d4 __strnicoll 15 API calls 12801->12803 12804 3b49b0 12802->12804 12806 3b49ea 12803->12806 12807 3b1ce6 __dosmaperr 14 API calls 12804->12807 12808 3b691c __fread_nolock 39 API calls 12805->12808 12809 3b165a ___free_lconv_mon 14 API calls 12806->12809 12810 3b49b7 12807->12810 12811 3b4b25 12808->12811 12812 3b49f3 12809->12812 12813 3ad76b __fread_nolock 39 API calls 12810->12813 12814 3b4b99 12811->12814 12817 3b4b3e GetConsoleMode 12811->12817 12815 3b165a ___free_lconv_mon 14 API calls 12812->12815 12842 3b49c2 __fread_nolock 12813->12842 12816 3b4b9d ReadFile 12814->12816 12818 3b49fa 12815->12818 12819 3b4c11 GetLastError 12816->12819 12820 3b4bb5 12816->12820 12817->12814 12821 3b4b4f 12817->12821 12822 3b4a1f 12818->12822 12823 3b4a04 12818->12823 12824 3b4c1e 12819->12824 12825 3b4b75 12819->12825 12820->12819 12826 3b4b8e 12820->12826 12821->12816 12827 3b4b55 ReadConsoleW 12821->12827 12832 3b52de __fread_nolock 41 API calls 12822->12832 12830 3b1ce6 __dosmaperr 14 API calls 12823->12830 12831 3b1ce6 __dosmaperr 14 API calls 12824->12831 12833 3b1d0c __dosmaperr 14 API calls 12825->12833 12825->12842 12838 3b4bda 12826->12838 12839 3b4bf1 12826->12839 12826->12842 12827->12826 12828 3b4b6f GetLastError 12827->12828 12828->12825 12829 3b165a ___free_lconv_mon 14 API calls 12829->12790 12834 3b4a09 12830->12834 12835 3b4c23 12831->12835 12832->12805 12833->12842 12836 3b1cf9 __dosmaperr 14 API calls 12834->12836 12837 3b1cf9 __dosmaperr 14 API calls 12835->12837 12836->12842 12837->12842 12840 3b4ce6 __fread_nolock 44 API calls 12838->12840 12841 3b4c0a 12839->12841 12839->12842 12840->12842 12843 3b4f8a __fread_nolock 42 API calls 12841->12843 12842->12829 12844 3b4c0f 12843->12844 12844->12842 12846 3b86a4 __fread_nolock 12845->12846 12847 3b86c8 __wsopen_s 64 API calls 12846->12847 12848 3b86b6 12847->12848 12849 3ad9d9 __fread_nolock 39 API calls 12848->12849 12850 3b86c3 12849->12850 12850->12700 12852 3b3c1d __fread_nolock 39 API calls 12851->12852 12855 3b40ce 12852->12855 12853 3b40d4 12854 3b3d9a __wsopen_s 15 API calls 12853->12854 12863 3b412c __fread_nolock 12854->12863 12855->12853 12856 3b4106 12855->12856 12857 3b3c1d __fread_nolock 39 API calls 12855->12857 12856->12853 12858 3b3c1d __fread_nolock 39 API calls 12856->12858 12859 3b40fd 12857->12859 12860 3b4112 CloseHandle 12858->12860 12861 3b3c1d __fread_nolock 39 API calls 12859->12861 12860->12853 12862 3b411e GetLastError 12860->12862 12861->12856 12862->12853 12863->12708 12865 3b5e29 __fread_nolock 12864->12865 12866 3b6069 __wsopen_s 64 API calls 12865->12866 12867 3b5e3b 12866->12867 12868 3ad9d9 __fread_nolock 39 API calls 12867->12868 12869 3b5e48 12868->12869 12869->12721 12870->12598 12871->12516 12874 3ae668 __FrameHandler3::FrameUnwindToState 12872->12874 12873 3ae66e 12875 3ad914 __fread_nolock 29 API calls 12873->12875 12874->12873 12877 3ae6b1 12874->12877 12876 3ae40b 12875->12876 12876->12469 12883 3ac516 EnterCriticalSection 12877->12883 12879 3ae6bd 12884 3ae570 12879->12884 12881 3ae6d3 12895 3ae6fc 12881->12895 12883->12879 12885 3ae583 12884->12885 12886 3ae596 12884->12886 12885->12881 12898 3ae497 12886->12898 12888 3ae5b9 12889 3ae5d4 12888->12889 12894 3ae647 12888->12894 12905 3ae736 12888->12905 12890 3b1aa4 ___scrt_uninitialize_crt 64 API calls 12889->12890 12892 3ae5e7 12890->12892 12902 3b531e 12892->12902 12894->12881 12963 3ac52a LeaveCriticalSection 12895->12963 12897 3ae704 12897->12876 12899 3ae4a8 12898->12899 12901 3ae500 12898->12901 12900 3b52de __fread_nolock 41 API calls 12899->12900 12899->12901 12900->12901 12901->12888 12919 3b547f 12902->12919 12904 3b5337 12904->12894 12906 3aeb08 12905->12906 12907 3aeb3f 12906->12907 12908 3aeb17 12906->12908 12910 3b4067 __fread_nolock 39 API calls 12907->12910 12909 3ad914 __fread_nolock 29 API calls 12908->12909 12918 3aeb32 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 12909->12918 12911 3aeb48 12910->12911 12925 3b533c 12911->12925 12914 3aebf2 12928 3ae792 12914->12928 12916 3aec09 12916->12918 12940 3ae93d 12916->12940 12918->12889 12920 3b3c1d __fread_nolock 39 API calls 12919->12920 12921 3b5491 12920->12921 12922 3b54ad SetFilePointerEx 12921->12922 12923 3b5499 __fread_nolock 12921->12923 12922->12923 12924 3b54c5 GetLastError 12922->12924 12923->12904 12924->12923 12947 3b535a 12925->12947 12929 3ae7a1 __wsopen_s 12928->12929 12930 3b4067 __fread_nolock 39 API calls 12929->12930 12932 3ae7bd __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 12930->12932 12931 3aa4a2 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12933 3ae93b 12931->12933 12934 3b533c 43 API calls 12932->12934 12939 3ae7c9 12932->12939 12933->12918 12935 3ae81d 12934->12935 12936 3ae84f ReadFile 12935->12936 12935->12939 12937 3ae876 12936->12937 12936->12939 12938 3b533c 43 API calls 12937->12938 12938->12939 12939->12931 12941 3b4067 __fread_nolock 39 API calls 12940->12941 12942 3ae950 12941->12942 12943 3b533c 43 API calls 12942->12943 12946 3ae99a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 12942->12946 12944 3ae9f7 12943->12944 12945 3b533c 43 API calls 12944->12945 12944->12946 12945->12946 12946->12918 12949 3b5366 __FrameHandler3::FrameUnwindToState 12947->12949 12948 3b53a9 12951 3ad914 __fread_nolock 29 API calls 12948->12951 12949->12948 12950 3b53ef 12949->12950 12957 3aeb66 12949->12957 12958 3b400b EnterCriticalSection 12950->12958 12951->12957 12953 3b53f5 12954 3b5416 12953->12954 12955 3b547f __fread_nolock 41 API calls 12953->12955 12959 3b5477 12954->12959 12955->12954 12957->12914 12957->12916 12957->12918 12958->12953 12962 3b402e LeaveCriticalSection 12959->12962 12961 3b547d 12961->12957 12962->12961 12963->12897 12965 3aece7 __FrameHandler3::FrameUnwindToState 12964->12965 12966 3aecee 12965->12966 12967 3aed0f 12965->12967 12968 3ad914 __fread_nolock 29 API calls 12966->12968 12975 3ac516 EnterCriticalSection 12967->12975 12970 3ae725 12968->12970 12970->12475 12971 3aed1a 12976 3aeca9 12971->12976 12975->12971 12982 3aeb08 12976->12982 12978 3aecbb 12979 3aed51 12978->12979 12996 3ac52a LeaveCriticalSection 12979->12996 12981 3aed59 12981->12970 12983 3aeb3f 12982->12983 12984 3aeb17 12982->12984 12986 3b4067 __fread_nolock 39 API calls 12983->12986 12985 3ad914 __fread_nolock 29 API calls 12984->12985 12995 3aeb32 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 12985->12995 12987 3aeb48 12986->12987 12988 3b533c 43 API calls 12987->12988 12989 3aeb66 12988->12989 12990 3aebf2 12989->12990 12992 3aec09 12989->12992 12989->12995 12991 3ae792 44 API calls 12990->12991 12993 3aec01 12991->12993 12994 3ae93d 43 API calls 12992->12994 12992->12995 12993->12995 12994->12995 12995->12978 12996->12981 12998 3ae141 __FrameHandler3::FrameUnwindToState 12997->12998 12999 3ae179 12998->12999 13000 3ae18b 12998->13000 13001 3ae154 __fread_nolock 12998->13001 12999->12460 13010 3ac516 EnterCriticalSection 13000->13010 13004 3b1ce6 __dosmaperr 14 API calls 13001->13004 13003 3ae195 13011 3ae1ef 13003->13011 13006 3ae16e 13004->13006 13008 3ad76b __fread_nolock 39 API calls 13006->13008 13008->12999 13010->13003 13013 3ae201 __fread_nolock 13011->13013 13018 3ae1ac 13011->13018 13012 3ae20e 13014 3b1ce6 __dosmaperr 14 API calls 13012->13014 13013->13012 13013->13018 13023 3ae25f 13013->13023 13015 3ae213 13014->13015 13016 3ad76b __fread_nolock 39 API calls 13015->13016 13016->13018 13025 3ae1ca 13018->13025 13019 3ae38a __fread_nolock 13021 3b1ce6 __dosmaperr 14 API calls 13019->13021 13020 3ae0b4 __fread_nolock 39 API calls 13020->13023 13021->13015 13022 3b4067 __fread_nolock 39 API calls 13022->13023 13023->13018 13023->13019 13023->13020 13023->13022 13024 3b48dd __fread_nolock 51 API calls 13023->13024 13028 3b5144 13023->13028 13024->13023 13089 3ac52a LeaveCriticalSection 13025->13089 13027 3ae1d0 13027->12999 13029 3b514f 13028->13029 13030 3b515c 13029->13030 13033 3b5174 13029->13033 13031 3b1ce6 __dosmaperr 14 API calls 13030->13031 13032 3b5161 13031->13032 13034 3ad76b __fread_nolock 39 API calls 13032->13034 13035 3b51d3 13033->13035 13043 3b516c 13033->13043 13079 3b7feb 13033->13079 13034->13043 13037 3b4067 __fread_nolock 39 API calls 13035->13037 13038 3b51ec 13037->13038 13049 3b47c4 13038->13049 13041 3b4067 __fread_nolock 39 API calls 13042 3b5225 13041->13042 13042->13043 13044 3b4067 __fread_nolock 39 API calls 13042->13044 13043->13023 13045 3b5233 13044->13045 13045->13043 13046 3b4067 __fread_nolock 39 API calls 13045->13046 13047 3b5241 13046->13047 13048 3b4067 __fread_nolock 39 API calls 13047->13048 13048->13043 13050 3b47d0 __FrameHandler3::FrameUnwindToState 13049->13050 13051 3b47d8 13050->13051 13055 3b47f3 13050->13055 13052 3b1cf9 __dosmaperr 14 API calls 13051->13052 13053 3b47dd 13052->13053 13056 3b1ce6 __dosmaperr 14 API calls 13053->13056 13054 3b480a 13057 3b1cf9 __dosmaperr 14 API calls 13054->13057 13055->13054 13058 3b4845 13055->13058 13062 3b47e5 13056->13062 13059 3b480f 13057->13059 13060 3b484e 13058->13060 13061 3b4863 13058->13061 13064 3b1ce6 __dosmaperr 14 API calls 13059->13064 13065 3b1cf9 __dosmaperr 14 API calls 13060->13065 13084 3b400b EnterCriticalSection 13061->13084 13062->13041 13062->13043 13067 3b4817 13064->13067 13068 3b4853 13065->13068 13066 3b4869 13069 3b4888 13066->13069 13070 3b489d 13066->13070 13073 3ad76b __fread_nolock 39 API calls 13067->13073 13071 3b1ce6 __dosmaperr 14 API calls 13068->13071 13072 3b1ce6 __dosmaperr 14 API calls 13069->13072 13074 3b48dd __fread_nolock 51 API calls 13070->13074 13071->13067 13075 3b488d 13072->13075 13073->13062 13076 3b4898 13074->13076 13077 3b1cf9 __dosmaperr 14 API calls 13075->13077 13085 3b48d5 13076->13085 13077->13076 13080 3b1d96 _unexpected 14 API calls 13079->13080 13081 3b8008 13080->13081 13082 3b165a ___free_lconv_mon 14 API calls 13081->13082 13083 3b8012 13082->13083 13083->13035 13084->13066 13088 3b402e LeaveCriticalSection 13085->13088 13087 3b48db 13087->13062 13088->13087 13089->13027 13356 3ac606 13357 3b1a36 ___scrt_uninitialize_crt 68 API calls 13356->13357 13358 3ac60e 13357->13358 13366 3b1df3 13358->13366 13360 3ac613 13376 3b1e9e 13360->13376 13363 3ac63d 13364 3b165a ___free_lconv_mon 14 API calls 13363->13364 13365 3ac648 13364->13365 13367 3b1dff __FrameHandler3::FrameUnwindToState 13366->13367 13380 3adb4a EnterCriticalSection 13367->13380 13369 3b1e76 13387 3b1e95 13369->13387 13371 3b1e0a 13371->13369 13373 3b1e4a DeleteCriticalSection 13371->13373 13381 3ade91 13371->13381 13374 3b165a ___free_lconv_mon 14 API calls 13373->13374 13374->13371 13377 3ac622 DeleteCriticalSection 13376->13377 13378 3b1eb5 13376->13378 13377->13360 13377->13363 13378->13377 13379 3b165a ___free_lconv_mon 14 API calls 13378->13379 13379->13377 13380->13371 13382 3adea4 __fread_nolock 13381->13382 13390 3adf4f 13382->13390 13384 3adeb0 13385 3ad9d9 __fread_nolock 39 API calls 13384->13385 13386 3adebc 13385->13386 13386->13371 13440 3adb61 LeaveCriticalSection 13387->13440 13389 3b1e82 13389->13360 13391 3adf5b __FrameHandler3::FrameUnwindToState 13390->13391 13392 3adf88 13391->13392 13393 3adf65 13391->13393 13394 3adf80 13392->13394 13401 3ac516 EnterCriticalSection 13392->13401 13395 3ad914 __fread_nolock 29 API calls 13393->13395 13394->13384 13395->13394 13397 3adfa6 13402 3adec1 13397->13402 13399 3adfb3 13416 3adfde 13399->13416 13401->13397 13403 3adece 13402->13403 13404 3adef1 13402->13404 13405 3ad914 __fread_nolock 29 API calls 13403->13405 13406 3adee9 13404->13406 13407 3b1aa4 ___scrt_uninitialize_crt 64 API calls 13404->13407 13405->13406 13406->13399 13408 3adf09 13407->13408 13409 3b1e9e 14 API calls 13408->13409 13410 3adf11 13409->13410 13411 3b4067 __fread_nolock 39 API calls 13410->13411 13412 3adf1d 13411->13412 13419 3b415e 13412->13419 13415 3b165a ___free_lconv_mon 14 API calls 13415->13406 13439 3ac52a LeaveCriticalSection 13416->13439 13418 3adfe4 13418->13394 13420 3b4187 13419->13420 13425 3adf24 13419->13425 13421 3b41d6 13420->13421 13423 3b41ae 13420->13423 13422 3ad914 __fread_nolock 29 API calls 13421->13422 13422->13425 13426 3b4201 13423->13426 13425->13406 13425->13415 13427 3b420d __FrameHandler3::FrameUnwindToState 13426->13427 13434 3b400b EnterCriticalSection 13427->13434 13429 3b421b 13430 3b424c 13429->13430 13431 3b40be __wsopen_s 42 API calls 13429->13431 13435 3b4286 13430->13435 13431->13430 13434->13429 13438 3b402e LeaveCriticalSection 13435->13438 13437 3b426f 13437->13425 13438->13437 13439->13418 13440->13389 10971 3ab16a 10972 3ab176 __FrameHandler3::FrameUnwindToState 10971->10972 10997 3aab2c 10972->10997 10974 3ab17d 10975 3ab2d6 10974->10975 10984 3ab1a7 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState ___scrt_release_startup_lock 10974->10984 11042 3aaee2 IsProcessorFeaturePresent 10975->11042 10977 3ab2dd 11021 3ac8e1 10977->11021 10982 3ab1c6 10984->10982 10987 3ab247 10984->10987 11024 3ac92b 10984->11024 10986 3ab24d 11012 3a41d0 10986->11012 11008 3ad458 10987->11008 10992 3ab272 10993 3ab27b 10992->10993 11033 3ac90d 10992->11033 11036 3aab65 10993->11036 10998 3aab35 10997->10998 11049 3aaca0 IsProcessorFeaturePresent 10998->11049 11002 3aab46 11007 3aab4a 11002->11007 11059 3ac487 11002->11059 11005 3aab61 11005->10974 11007->10974 11009 3ad466 11008->11009 11010 3ad461 11008->11010 11009->10986 11131 3ad581 11010->11131 12049 3a9c33 11012->12049 11018 3a4203 11020 3a4238 11018->11020 12075 3a4ab0 11018->12075 11031 3aae8c GetModuleHandleW 11020->11031 12219 3aca2c 11021->12219 11025 3aedfb __FrameHandler3::FrameUnwindToState 11024->11025 11026 3ac941 _unexpected 11024->11026 11027 3b0627 _unexpected 39 API calls 11025->11027 11026->10987 11028 3aee0c 11027->11028 11029 3ade42 __FrameHandler3::FrameUnwindToState 39 API calls 11028->11029 11030 3aee36 11029->11030 11032 3aae98 11031->11032 11032->10977 11032->10992 11034 3aca2c __FrameHandler3::FrameUnwindToState 21 API calls 11033->11034 11035 3ac918 11034->11035 11035->10993 11037 3aab71 11036->11037 11038 3aab87 11037->11038 12292 3ac499 11037->12292 11038->10982 11040 3aab7f 11041 3abb1a ___scrt_uninitialize_crt 7 API calls 11040->11041 11041->11038 11043 3aaef8 __fread_nolock __FrameHandler3::FrameUnwindToState 11042->11043 11044 3aafa3 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11043->11044 11045 3aafee __FrameHandler3::FrameUnwindToState 11044->11045 11045->10977 11046 3ac8f7 11047 3aca2c __FrameHandler3::FrameUnwindToState 21 API calls 11046->11047 11048 3ab2eb 11047->11048 11050 3aab41 11049->11050 11051 3abafb 11050->11051 11068 3afd56 11051->11068 11054 3abb04 11054->11002 11056 3abb0c 11057 3abb17 11056->11057 11082 3afd92 11056->11082 11057->11002 11122 3b1694 11059->11122 11062 3abb1a 11063 3abb2d 11062->11063 11064 3abb23 11062->11064 11063->11007 11065 3aee6a ___vcrt_uninitialize_ptd 6 API calls 11064->11065 11066 3abb28 11065->11066 11067 3afd92 ___vcrt_uninitialize_locks DeleteCriticalSection 11066->11067 11067->11063 11069 3afd5f 11068->11069 11071 3afd88 11069->11071 11073 3abb00 11069->11073 11086 3b56da 11069->11086 11072 3afd92 ___vcrt_uninitialize_locks DeleteCriticalSection 11071->11072 11072->11073 11073->11054 11074 3aee37 11073->11074 11103 3b55eb 11074->11103 11079 3aee67 11079->11056 11081 3aee4c 11081->11056 11083 3afd9d 11082->11083 11085 3afdbc 11082->11085 11084 3afda7 DeleteCriticalSection 11083->11084 11084->11084 11084->11085 11085->11054 11091 3b576c 11086->11091 11089 3b5712 InitializeCriticalSectionAndSpinCount 11090 3b56fd 11089->11090 11090->11069 11092 3b56f4 11091->11092 11095 3b578d 11091->11095 11092->11089 11092->11090 11093 3b57f5 GetProcAddress 11093->11092 11095->11092 11095->11093 11096 3b57e6 11095->11096 11098 3b5721 LoadLibraryExW 11095->11098 11096->11093 11097 3b57ee FreeLibrary 11096->11097 11097->11093 11099 3b5768 11098->11099 11100 3b5738 GetLastError 11098->11100 11099->11095 11100->11099 11101 3b5743 ___vcrt_FlsSetValue 11100->11101 11101->11099 11102 3b5759 LoadLibraryExW 11101->11102 11102->11095 11104 3b576c ___vcrt_FlsSetValue 5 API calls 11103->11104 11105 3b5605 11104->11105 11106 3b561e TlsAlloc 11105->11106 11107 3aee41 11105->11107 11107->11081 11108 3b569c 11107->11108 11109 3b576c ___vcrt_FlsSetValue 5 API calls 11108->11109 11110 3b56b6 11109->11110 11111 3b56d1 TlsSetValue 11110->11111 11112 3aee5a 11110->11112 11111->11112 11112->11079 11113 3aee6a 11112->11113 11114 3aee7a 11113->11114 11115 3aee74 11113->11115 11114->11081 11117 3b5626 11115->11117 11118 3b576c ___vcrt_FlsSetValue 5 API calls 11117->11118 11119 3b5640 11118->11119 11120 3b5658 TlsFree 11119->11120 11121 3b564c 11119->11121 11120->11121 11121->11114 11123 3b16a4 11122->11123 11124 3aab53 11122->11124 11123->11124 11126 3b0d4c 11123->11126 11124->11005 11124->11062 11127 3b0d53 11126->11127 11128 3b0d96 GetStdHandle 11127->11128 11129 3b0df8 11127->11129 11130 3b0da9 GetFileType 11127->11130 11128->11127 11129->11123 11130->11127 11132 3ad58a 11131->11132 11135 3ad5a0 11131->11135 11132->11135 11137 3ad4c2 11132->11137 11134 3ad597 11134->11135 11154 3ad68f 11134->11154 11135->11009 11138 3ad4cb 11137->11138 11139 3ad4ce 11137->11139 11138->11134 11163 3b0e0f 11139->11163 11144 3ad4eb 11196 3ad5ad 11144->11196 11145 3ad4df 11190 3b165a 11145->11190 11150 3b165a ___free_lconv_mon 14 API calls 11151 3ad50f 11150->11151 11152 3b165a ___free_lconv_mon 14 API calls 11151->11152 11153 3ad515 11152->11153 11153->11134 11155 3ad700 11154->11155 11156 3ad69e 11154->11156 11155->11135 11156->11155 11157 3b1d96 _unexpected 14 API calls 11156->11157 11158 3ad704 11156->11158 11160 3b36c0 WideCharToMultiByte __wsopen_s 11156->11160 11162 3b165a ___free_lconv_mon 14 API calls 11156->11162 11768 3b3893 11156->11768 11157->11156 11159 3b165a ___free_lconv_mon 14 API calls 11158->11159 11159->11155 11160->11156 11162->11156 11164 3b0e18 11163->11164 11165 3ad4d4 11163->11165 11218 3b06e2 11164->11218 11169 3b37bc GetEnvironmentStringsW 11165->11169 11170 3b37d4 11169->11170 11183 3ad4d9 11169->11183 11171 3b36c0 __wsopen_s WideCharToMultiByte 11170->11171 11172 3b37f1 11171->11172 11173 3b37fb FreeEnvironmentStringsW 11172->11173 11174 3b3806 11172->11174 11173->11183 11175 3b21d4 __strnicoll 15 API calls 11174->11175 11176 3b380d 11175->11176 11177 3b3826 11176->11177 11178 3b3815 11176->11178 11180 3b36c0 __wsopen_s WideCharToMultiByte 11177->11180 11179 3b165a ___free_lconv_mon 14 API calls 11178->11179 11181 3b381a FreeEnvironmentStringsW 11179->11181 11182 3b3836 11180->11182 11181->11183 11184 3b383d 11182->11184 11185 3b3845 11182->11185 11183->11144 11183->11145 11186 3b165a ___free_lconv_mon 14 API calls 11184->11186 11187 3b165a ___free_lconv_mon 14 API calls 11185->11187 11188 3b3843 FreeEnvironmentStringsW 11186->11188 11187->11188 11188->11183 11191 3ad4e5 11190->11191 11192 3b1665 RtlFreeHeap 11190->11192 11191->11134 11192->11191 11193 3b167a GetLastError 11192->11193 11194 3b1687 __dosmaperr 11193->11194 11195 3b1ce6 __dosmaperr 12 API calls 11194->11195 11195->11191 11197 3ad5c2 11196->11197 11198 3b1d96 _unexpected 14 API calls 11197->11198 11199 3ad5e9 11198->11199 11200 3ad5fb 11199->11200 11201 3ad5f1 11199->11201 11204 3ad658 11200->11204 11206 3b1d96 _unexpected 14 API calls 11200->11206 11207 3ad667 11200->11207 11212 3ad682 11200->11212 11214 3b165a ___free_lconv_mon 14 API calls 11200->11214 11749 3afcfc 11200->11749 11202 3b165a ___free_lconv_mon 14 API calls 11201->11202 11203 3ad4f2 11202->11203 11203->11150 11205 3b165a ___free_lconv_mon 14 API calls 11204->11205 11205->11203 11206->11200 11758 3ad552 11207->11758 11211 3b165a ___free_lconv_mon 14 API calls 11213 3ad674 11211->11213 11764 3ad798 IsProcessorFeaturePresent 11212->11764 11216 3b165a ___free_lconv_mon 14 API calls 11213->11216 11214->11200 11216->11203 11217 3ad68e 11219 3b06ed 11218->11219 11220 3b06f3 11218->11220 11265 3b01cb 11219->11265 11239 3b06f9 11220->11239 11270 3b020a 11220->11270 11228 3b073a 11231 3b020a _unexpected 6 API calls 11228->11231 11229 3b0725 11230 3b020a _unexpected 6 API calls 11229->11230 11240 3b0731 11230->11240 11232 3b0746 11231->11232 11233 3b074a 11232->11233 11234 3b0759 11232->11234 11237 3b020a _unexpected 6 API calls 11233->11237 11284 3b0938 11234->11284 11236 3b165a ___free_lconv_mon 14 API calls 11236->11239 11237->11240 11242 3b06fe 11239->11242 11289 3ade42 11239->11289 11240->11236 11241 3b165a ___free_lconv_mon 14 API calls 11241->11242 11243 3b1252 11242->11243 11244 3b127c 11243->11244 11570 3b10de 11244->11570 11247 3b1295 11247->11165 11250 3b12ae 11252 3b165a ___free_lconv_mon 14 API calls 11250->11252 11251 3b12bc 11584 3b0ed9 11251->11584 11252->11247 11255 3b12f4 11256 3b1ce6 __dosmaperr 14 API calls 11255->11256 11257 3b12f9 11256->11257 11259 3b165a ___free_lconv_mon 14 API calls 11257->11259 11258 3b133b 11261 3b1384 11258->11261 11595 3b160d 11258->11595 11259->11247 11260 3b130f 11260->11258 11263 3b165a ___free_lconv_mon 14 API calls 11260->11263 11262 3b165a ___free_lconv_mon 14 API calls 11261->11262 11262->11247 11263->11258 11300 3b04d9 11265->11300 11268 3b0202 TlsGetValue 11269 3b01f0 11269->11220 11271 3b04d9 _unexpected 5 API calls 11270->11271 11272 3b0226 11271->11272 11273 3b022f 11272->11273 11274 3b0244 TlsSetValue 11272->11274 11273->11239 11275 3b1d96 11273->11275 11276 3b1da3 11275->11276 11277 3b1de3 11276->11277 11278 3b1dce HeapAlloc 11276->11278 11282 3b1db7 _unexpected 11276->11282 11318 3b1ce6 11277->11318 11279 3b1de1 11278->11279 11278->11282 11281 3b071d 11279->11281 11281->11228 11281->11229 11282->11277 11282->11278 11315 3acc13 11282->11315 11355 3b0a9e 11284->11355 11457 3b174b 11289->11457 11293 3ade5c IsProcessorFeaturePresent 11294 3ade68 11293->11294 11487 3ad7cc 11294->11487 11295 3ac8f7 __FrameHandler3::FrameUnwindToState 21 API calls 11298 3ade85 11295->11298 11296 3ade52 11296->11293 11299 3ade7b 11296->11299 11299->11295 11301 3b0509 11300->11301 11305 3b01e7 11300->11305 11301->11305 11307 3b040e 11301->11307 11304 3b0523 GetProcAddress 11304->11305 11306 3b0533 _unexpected 11304->11306 11305->11268 11305->11269 11306->11305 11313 3b041f ___vcrt_FlsSetValue 11307->11313 11308 3b04b5 11308->11304 11308->11305 11309 3b043d LoadLibraryExW 11310 3b0458 GetLastError 11309->11310 11311 3b04bc 11309->11311 11310->11313 11311->11308 11312 3b04ce FreeLibrary 11311->11312 11312->11308 11313->11308 11313->11309 11314 3b048b LoadLibraryExW 11313->11314 11314->11311 11314->11313 11321 3acc4e 11315->11321 11332 3b0778 GetLastError 11318->11332 11320 3b1ceb 11320->11281 11322 3acc5a __FrameHandler3::FrameUnwindToState 11321->11322 11327 3adb4a EnterCriticalSection 11322->11327 11324 3acc65 __FrameHandler3::FrameUnwindToState 11328 3acc9c 11324->11328 11327->11324 11331 3adb61 LeaveCriticalSection 11328->11331 11330 3acc1e 11330->11282 11331->11330 11333 3b078e 11332->11333 11336 3b0794 11332->11336 11335 3b01cb _unexpected 6 API calls 11333->11335 11334 3b020a _unexpected 6 API calls 11337 3b07b0 11334->11337 11335->11336 11336->11334 11352 3b0798 SetLastError 11336->11352 11339 3b1d96 _unexpected 12 API calls 11337->11339 11337->11352 11340 3b07c5 11339->11340 11341 3b07de 11340->11341 11342 3b07cd 11340->11342 11344 3b020a _unexpected 6 API calls 11341->11344 11343 3b020a _unexpected 6 API calls 11342->11343 11345 3b07db 11343->11345 11346 3b07ea 11344->11346 11349 3b165a ___free_lconv_mon 12 API calls 11345->11349 11347 3b07ee 11346->11347 11348 3b0805 11346->11348 11351 3b020a _unexpected 6 API calls 11347->11351 11350 3b0938 _unexpected 12 API calls 11348->11350 11349->11352 11353 3b0810 11350->11353 11351->11345 11352->11320 11354 3b165a ___free_lconv_mon 12 API calls 11353->11354 11354->11352 11356 3b0aaa __FrameHandler3::FrameUnwindToState 11355->11356 11369 3adb4a EnterCriticalSection 11356->11369 11358 3b0ab4 11370 3b0ae4 11358->11370 11361 3b0af0 11362 3b0afc __FrameHandler3::FrameUnwindToState 11361->11362 11374 3adb4a EnterCriticalSection 11362->11374 11364 3b0b06 11375 3b08ed 11364->11375 11366 3b0b1e 11379 3b0b3e 11366->11379 11369->11358 11373 3adb61 LeaveCriticalSection 11370->11373 11372 3b09a6 11372->11361 11373->11372 11374->11364 11376 3b0923 __strnicoll 11375->11376 11377 3b08fc __strnicoll 11375->11377 11376->11366 11377->11376 11382 3b253d 11377->11382 11456 3adb61 LeaveCriticalSection 11379->11456 11381 3b0764 11381->11241 11387 3b2553 11382->11387 11404 3b25bd 11382->11404 11384 3b165a ___free_lconv_mon 14 API calls 11386 3b25df 11384->11386 11385 3b2586 11388 3b25a8 11385->11388 11396 3b165a ___free_lconv_mon 14 API calls 11385->11396 11389 3b165a ___free_lconv_mon 14 API calls 11386->11389 11387->11385 11390 3b165a ___free_lconv_mon 14 API calls 11387->11390 11387->11404 11392 3b165a ___free_lconv_mon 14 API calls 11388->11392 11391 3b25f2 11389->11391 11395 3b257b 11390->11395 11397 3b165a ___free_lconv_mon 14 API calls 11391->11397 11393 3b25b2 11392->11393 11398 3b165a ___free_lconv_mon 14 API calls 11393->11398 11394 3b2679 11399 3b165a ___free_lconv_mon 14 API calls 11394->11399 11410 3b1f64 11395->11410 11402 3b259d 11396->11402 11403 3b2600 11397->11403 11398->11404 11405 3b267f 11399->11405 11400 3b165a 14 API calls ___free_lconv_mon 11406 3b2619 11400->11406 11438 3b2062 11402->11438 11408 3b165a ___free_lconv_mon 14 API calls 11403->11408 11404->11384 11409 3b260b 11404->11409 11405->11376 11406->11394 11406->11400 11408->11409 11450 3b26d7 11409->11450 11411 3b1f75 11410->11411 11437 3b205e 11410->11437 11412 3b1f86 11411->11412 11414 3b165a ___free_lconv_mon 14 API calls 11411->11414 11413 3b1f98 11412->11413 11415 3b165a ___free_lconv_mon 14 API calls 11412->11415 11416 3b1faa 11413->11416 11417 3b165a ___free_lconv_mon 14 API calls 11413->11417 11414->11412 11415->11413 11418 3b165a ___free_lconv_mon 14 API calls 11416->11418 11420 3b1fbc 11416->11420 11417->11416 11418->11420 11419 3b1fe0 11424 3b1ff2 11419->11424 11425 3b165a ___free_lconv_mon 14 API calls 11419->11425 11421 3b165a ___free_lconv_mon 14 API calls 11420->11421 11422 3b1fce 11420->11422 11421->11422 11422->11419 11423 3b165a ___free_lconv_mon 14 API calls 11422->11423 11423->11419 11426 3b2004 11424->11426 11427 3b165a ___free_lconv_mon 14 API calls 11424->11427 11425->11424 11428 3b2016 11426->11428 11430 3b165a ___free_lconv_mon 14 API calls 11426->11430 11427->11426 11429 3b2028 11428->11429 11431 3b165a ___free_lconv_mon 14 API calls 11428->11431 11432 3b203a 11429->11432 11433 3b165a ___free_lconv_mon 14 API calls 11429->11433 11430->11428 11431->11429 11434 3b204c 11432->11434 11435 3b165a ___free_lconv_mon 14 API calls 11432->11435 11433->11432 11436 3b165a ___free_lconv_mon 14 API calls 11434->11436 11434->11437 11435->11434 11436->11437 11437->11385 11439 3b206f 11438->11439 11449 3b20c7 11438->11449 11440 3b207f 11439->11440 11441 3b165a ___free_lconv_mon 14 API calls 11439->11441 11442 3b2091 11440->11442 11443 3b165a ___free_lconv_mon 14 API calls 11440->11443 11441->11440 11444 3b20a3 11442->11444 11446 3b165a ___free_lconv_mon 14 API calls 11442->11446 11443->11442 11445 3b20b5 11444->11445 11447 3b165a ___free_lconv_mon 14 API calls 11444->11447 11448 3b165a ___free_lconv_mon 14 API calls 11445->11448 11445->11449 11446->11444 11447->11445 11448->11449 11449->11388 11451 3b2703 11450->11451 11452 3b26e4 11450->11452 11451->11406 11452->11451 11453 3b20cb __strnicoll 14 API calls 11452->11453 11454 3b26fd 11453->11454 11455 3b165a ___free_lconv_mon 14 API calls 11454->11455 11455->11451 11456->11381 11493 3b19ce 11457->11493 11460 3b1772 11461 3b177e __FrameHandler3::FrameUnwindToState 11460->11461 11462 3b17e0 __FrameHandler3::FrameUnwindToState 11461->11462 11463 3b0778 __dosmaperr 14 API calls 11461->11463 11464 3b17ce 11461->11464 11469 3b17af __FrameHandler3::FrameUnwindToState 11461->11469 11471 3b1816 __FrameHandler3::FrameUnwindToState 11462->11471 11507 3adb4a EnterCriticalSection 11462->11507 11463->11469 11465 3b1ce6 __dosmaperr 14 API calls 11464->11465 11466 3b17d3 11465->11466 11504 3ad76b 11466->11504 11469->11462 11469->11464 11470 3b17b8 11469->11470 11470->11296 11473 3b1853 11471->11473 11474 3b1950 11471->11474 11484 3b1881 11471->11484 11473->11484 11508 3b0627 GetLastError 11473->11508 11476 3b195b 11474->11476 11539 3adb61 LeaveCriticalSection 11474->11539 11478 3ac8f7 __FrameHandler3::FrameUnwindToState 21 API calls 11476->11478 11479 3b1963 11478->11479 11481 3b0627 _unexpected 39 API calls 11485 3b18d6 11481->11485 11483 3b0627 _unexpected 39 API calls 11483->11484 11535 3b18fc 11484->11535 11485->11470 11486 3b0627 _unexpected 39 API calls 11485->11486 11486->11470 11488 3ad7e8 __fread_nolock __FrameHandler3::FrameUnwindToState 11487->11488 11489 3ad814 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11488->11489 11490 3ad8e5 __FrameHandler3::FrameUnwindToState 11489->11490 11562 3aa4a2 11490->11562 11492 3ad903 11492->11299 11494 3b19da __FrameHandler3::FrameUnwindToState 11493->11494 11499 3adb4a EnterCriticalSection 11494->11499 11496 3b19e8 11500 3b1a2a 11496->11500 11499->11496 11503 3adb61 LeaveCriticalSection 11500->11503 11502 3ade47 11502->11296 11502->11460 11503->11502 11540 3adaa1 11504->11540 11507->11471 11509 3b063d 11508->11509 11510 3b0643 11508->11510 11511 3b01cb _unexpected 6 API calls 11509->11511 11512 3b020a _unexpected 6 API calls 11510->11512 11514 3b0647 SetLastError 11510->11514 11511->11510 11513 3b065f 11512->11513 11513->11514 11516 3b1d96 _unexpected 14 API calls 11513->11516 11518 3b06dc 11514->11518 11519 3b06d7 11514->11519 11517 3b0674 11516->11517 11520 3b068d 11517->11520 11521 3b067c 11517->11521 11522 3ade42 __FrameHandler3::FrameUnwindToState 37 API calls 11518->11522 11519->11483 11524 3b020a _unexpected 6 API calls 11520->11524 11523 3b020a _unexpected 6 API calls 11521->11523 11525 3b06e1 11522->11525 11533 3b068a 11523->11533 11526 3b0699 11524->11526 11527 3b069d 11526->11527 11528 3b06b4 11526->11528 11530 3b020a _unexpected 6 API calls 11527->11530 11529 3b0938 _unexpected 14 API calls 11528->11529 11532 3b06bf 11529->11532 11530->11533 11531 3b165a ___free_lconv_mon 14 API calls 11531->11514 11534 3b165a ___free_lconv_mon 14 API calls 11532->11534 11533->11531 11534->11514 11536 3b18c8 11535->11536 11537 3b1900 11535->11537 11536->11470 11536->11481 11536->11485 11561 3adb61 LeaveCriticalSection 11537->11561 11539->11476 11541 3adab3 __fread_nolock 11540->11541 11546 3ad914 11541->11546 11547 3ad92b 11546->11547 11548 3ad924 11546->11548 11550 3ada78 __fread_nolock GetLastError SetLastError 11547->11550 11553 3ad939 11547->11553 11549 3ada32 __fread_nolock 16 API calls 11548->11549 11549->11547 11551 3ad960 11550->11551 11552 3ad798 __wsopen_s 11 API calls 11551->11552 11551->11553 11554 3ad990 11552->11554 11555 3ad9d9 11553->11555 11556 3ad9e5 11555->11556 11557 3ada15 __fread_nolock 39 API calls 11556->11557 11559 3ad9fc 11556->11559 11557->11559 11558 3ada15 __fread_nolock 39 API calls 11560 3ad777 11558->11560 11559->11558 11559->11560 11560->11470 11561->11536 11563 3aa4aa 11562->11563 11564 3aa4ab IsProcessorFeaturePresent 11562->11564 11563->11492 11566 3aa63d 11564->11566 11569 3aa722 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 11566->11569 11568 3aa720 11568->11492 11569->11568 11603 3b0e57 11570->11603 11573 3b10ff GetOEMCP 11576 3b1128 11573->11576 11574 3b1111 11575 3b1116 GetACP 11574->11575 11574->11576 11575->11576 11576->11247 11577 3b21d4 11576->11577 11578 3b2212 11577->11578 11583 3b21e2 _unexpected 11577->11583 11579 3b1ce6 __dosmaperr 14 API calls 11578->11579 11581 3b12a6 11579->11581 11580 3b21fd RtlAllocateHeap 11580->11581 11580->11583 11581->11250 11581->11251 11582 3acc13 _unexpected 2 API calls 11582->11583 11583->11578 11583->11580 11583->11582 11585 3b10de 41 API calls 11584->11585 11586 3b0ef9 11585->11586 11587 3b0ffe 11586->11587 11589 3b0f36 IsValidCodePage 11586->11589 11593 3b0f51 __fread_nolock 11586->11593 11588 3aa4a2 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11587->11588 11591 3b10dc 11588->11591 11589->11587 11590 3b0f48 11589->11590 11592 3b0f71 GetCPInfo 11590->11592 11590->11593 11591->11255 11591->11260 11592->11587 11592->11593 11643 3b1468 11593->11643 11596 3b1619 __FrameHandler3::FrameUnwindToState 11595->11596 11723 3adb4a EnterCriticalSection 11596->11723 11598 3b1623 11724 3b13a7 11598->11724 11604 3b0e6e 11603->11604 11605 3b0e75 11603->11605 11604->11573 11604->11574 11605->11604 11606 3b0627 _unexpected 39 API calls 11605->11606 11607 3b0e96 11606->11607 11611 3b5c2c 11607->11611 11612 3b5c3f 11611->11612 11613 3b0eac 11611->11613 11612->11613 11619 3b2708 11612->11619 11615 3b5c59 11613->11615 11616 3b5c6c 11615->11616 11617 3b5c81 11615->11617 11616->11617 11640 3b0dfc 11616->11640 11617->11604 11620 3b2714 __FrameHandler3::FrameUnwindToState 11619->11620 11621 3b0627 _unexpected 39 API calls 11620->11621 11622 3b271d 11621->11622 11623 3b2763 11622->11623 11632 3adb4a EnterCriticalSection 11622->11632 11623->11613 11625 3b273b 11633 3b2789 11625->11633 11630 3ade42 __FrameHandler3::FrameUnwindToState 39 API calls 11631 3b2788 11630->11631 11632->11625 11634 3b2797 __strnicoll 11633->11634 11636 3b274c 11633->11636 11635 3b253d __strnicoll 14 API calls 11634->11635 11634->11636 11635->11636 11637 3b2768 11636->11637 11638 3adb61 __FrameHandler3::FrameUnwindToState LeaveCriticalSection 11637->11638 11639 3b275f 11638->11639 11639->11623 11639->11630 11641 3b0627 _unexpected 39 API calls 11640->11641 11642 3b0e01 11641->11642 11642->11617 11644 3b1490 GetCPInfo 11643->11644 11653 3b1559 11643->11653 11650 3b14a8 11644->11650 11644->11653 11646 3aa4a2 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11648 3b160b 11646->11648 11648->11587 11654 3b227c 11650->11654 11652 3b59f4 44 API calls 11652->11653 11653->11646 11655 3b0e57 __strnicoll 39 API calls 11654->11655 11656 3b229c 11655->11656 11674 3b237d 11656->11674 11658 3b22c9 11659 3b2358 11658->11659 11660 3b2350 11658->11660 11663 3b21d4 __strnicoll 15 API calls 11658->11663 11665 3b22ee __fread_nolock __strnicoll 11658->11665 11661 3aa4a2 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11659->11661 11677 3b225c 11660->11677 11664 3b1510 11661->11664 11663->11665 11669 3b59f4 11664->11669 11665->11660 11666 3b237d __strnicoll MultiByteToWideChar 11665->11666 11667 3b2337 11666->11667 11667->11660 11668 3b233e GetStringTypeW 11667->11668 11668->11660 11670 3b0e57 __strnicoll 39 API calls 11669->11670 11671 3b5a07 11670->11671 11683 3b5a3d 11671->11683 11681 3b23a7 11674->11681 11678 3b2279 11677->11678 11679 3b2268 11677->11679 11678->11659 11679->11678 11680 3b165a ___free_lconv_mon 14 API calls 11679->11680 11680->11678 11682 3b2399 MultiByteToWideChar 11681->11682 11682->11658 11684 3b5a58 __strnicoll 11683->11684 11685 3b237d __strnicoll MultiByteToWideChar 11684->11685 11689 3b5a9c 11685->11689 11686 3b5c17 11687 3aa4a2 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11686->11687 11688 3b1531 11687->11688 11688->11652 11689->11686 11690 3b21d4 __strnicoll 15 API calls 11689->11690 11692 3b5ac2 __strnicoll 11689->11692 11703 3b5b6a 11689->11703 11690->11692 11691 3b225c __freea 14 API calls 11691->11686 11693 3b237d __strnicoll MultiByteToWideChar 11692->11693 11692->11703 11694 3b5b0b 11693->11694 11694->11703 11711 3b0297 11694->11711 11697 3b5b79 11699 3b5c02 11697->11699 11700 3b21d4 __strnicoll 15 API calls 11697->11700 11704 3b5b8b __strnicoll 11697->11704 11698 3b5b41 11702 3b0297 7 API calls 11698->11702 11698->11703 11701 3b225c __freea 14 API calls 11699->11701 11700->11704 11701->11703 11702->11703 11703->11691 11704->11699 11705 3b0297 7 API calls 11704->11705 11706 3b5bce 11705->11706 11706->11699 11720 3b36c0 11706->11720 11708 3b5be8 11708->11699 11709 3b5bf1 11708->11709 11710 3b225c __freea 14 API calls 11709->11710 11710->11703 11712 3b0592 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 11711->11712 11713 3b02a2 11712->11713 11714 3b02a8 LCMapStringEx 11713->11714 11715 3b02cf 11713->11715 11719 3b02ef 11714->11719 11716 3b02f4 __strnicoll 5 API calls 11715->11716 11718 3b02e8 LCMapStringW 11716->11718 11718->11719 11719->11697 11719->11698 11719->11703 11721 3b36d3 __wsopen_s 11720->11721 11722 3b3711 WideCharToMultiByte 11721->11722 11722->11708 11723->11598 11734 3ae0b4 11724->11734 11726 3b13c9 11727 3ae0b4 __fread_nolock 39 API calls 11726->11727 11728 3b13e8 11727->11728 11729 3b140f 11728->11729 11730 3b165a ___free_lconv_mon 14 API calls 11728->11730 11731 3b164e 11729->11731 11730->11729 11748 3adb61 LeaveCriticalSection 11731->11748 11733 3b163c 11733->11261 11735 3ae0c5 11734->11735 11744 3ae0c1 CatchIt 11734->11744 11736 3ae0cc 11735->11736 11740 3ae0df __fread_nolock 11735->11740 11737 3b1ce6 __dosmaperr 14 API calls 11736->11737 11738 3ae0d1 11737->11738 11739 3ad76b __fread_nolock 39 API calls 11738->11739 11739->11744 11741 3ae10d 11740->11741 11742 3ae116 11740->11742 11740->11744 11743 3b1ce6 __dosmaperr 14 API calls 11741->11743 11742->11744 11746 3b1ce6 __dosmaperr 14 API calls 11742->11746 11745 3ae112 11743->11745 11744->11726 11747 3ad76b __fread_nolock 39 API calls 11745->11747 11746->11745 11747->11744 11748->11733 11750 3afd0a 11749->11750 11751 3afd18 11749->11751 11750->11751 11756 3afd30 11750->11756 11752 3b1ce6 __dosmaperr 14 API calls 11751->11752 11753 3afd20 11752->11753 11754 3ad76b __fread_nolock 39 API calls 11753->11754 11755 3afd2a 11754->11755 11755->11200 11756->11755 11757 3b1ce6 __dosmaperr 14 API calls 11756->11757 11757->11753 11762 3ad57c 11758->11762 11763 3ad55f 11758->11763 11759 3ad576 11760 3b165a ___free_lconv_mon 14 API calls 11759->11760 11760->11762 11761 3b165a ___free_lconv_mon 14 API calls 11761->11763 11762->11211 11763->11759 11763->11761 11765 3ad7a4 11764->11765 11766 3ad7cc __FrameHandler3::FrameUnwindToState 8 API calls 11765->11766 11767 3ad7b9 GetCurrentProcess TerminateProcess 11766->11767 11767->11217 11769 3b389e 11768->11769 11770 3b38af 11769->11770 11772 3b38c2 ___from_strstr_to_strchr 11769->11772 11771 3b1ce6 __dosmaperr 14 API calls 11770->11771 11781 3b38b4 11771->11781 11773 3b3ad9 11772->11773 11775 3b38e2 11772->11775 11774 3b1ce6 __dosmaperr 14 API calls 11773->11774 11776 3b3ade 11774->11776 11831 3b3afe 11775->11831 11778 3b165a ___free_lconv_mon 14 API calls 11776->11778 11778->11781 11780 3b3926 11818 3b3912 11780->11818 11835 3b3b18 11780->11835 11781->11156 11782 3b3928 11786 3b1d96 _unexpected 14 API calls 11782->11786 11782->11818 11783 3b3904 11790 3b390d 11783->11790 11791 3b3921 11783->11791 11787 3b3936 11786->11787 11789 3b165a ___free_lconv_mon 14 API calls 11787->11789 11788 3b165a ___free_lconv_mon 14 API calls 11788->11781 11793 3b3941 11789->11793 11794 3b1ce6 __dosmaperr 14 API calls 11790->11794 11795 3b3afe 39 API calls 11791->11795 11792 3b399b 11796 3b165a ___free_lconv_mon 14 API calls 11792->11796 11793->11780 11800 3b1d96 _unexpected 14 API calls 11793->11800 11793->11818 11794->11818 11795->11780 11802 3b39a3 11796->11802 11797 3b39e6 11798 3b3653 42 API calls 11797->11798 11797->11818 11799 3b3a14 11798->11799 11801 3b165a ___free_lconv_mon 14 API calls 11799->11801 11803 3b395d 11800->11803 11808 3b39d0 11801->11808 11802->11808 11839 3b3653 11802->11839 11807 3b165a ___free_lconv_mon 14 API calls 11803->11807 11804 3b3ace 11805 3b165a ___free_lconv_mon 14 API calls 11804->11805 11805->11781 11807->11780 11808->11804 11808->11808 11811 3b1d96 _unexpected 14 API calls 11808->11811 11808->11818 11809 3b39c7 11810 3b165a ___free_lconv_mon 14 API calls 11809->11810 11810->11808 11812 3b3a5f 11811->11812 11813 3b3a6f 11812->11813 11814 3b3a67 11812->11814 11816 3afcfc ___std_exception_copy 39 API calls 11813->11816 11815 3b165a ___free_lconv_mon 14 API calls 11814->11815 11815->11818 11817 3b3a7b 11816->11817 11819 3b3af3 11817->11819 11820 3b3a82 11817->11820 11818->11788 11822 3ad798 __wsopen_s 11 API calls 11819->11822 11848 3b747c 11820->11848 11824 3b3afd 11822->11824 11825 3b3aa9 11827 3b1ce6 __dosmaperr 14 API calls 11825->11827 11826 3b3ac8 11828 3b165a ___free_lconv_mon 14 API calls 11826->11828 11829 3b3aae 11827->11829 11828->11804 11830 3b165a ___free_lconv_mon 14 API calls 11829->11830 11830->11818 11832 3b3b0b 11831->11832 11833 3b38ed 11831->11833 11863 3b3b6d 11832->11863 11833->11780 11833->11782 11833->11783 11836 3b398b 11835->11836 11838 3b3b2e 11835->11838 11836->11792 11836->11797 11838->11836 11878 3b738b 11838->11878 11840 3b367b 11839->11840 11841 3b3660 11839->11841 11844 3b368a 11840->11844 11978 3b71b8 11840->11978 11841->11840 11842 3b366c 11841->11842 11845 3b1ce6 __dosmaperr 14 API calls 11842->11845 11985 3b71eb 11844->11985 11847 3b3671 __fread_nolock 11845->11847 11847->11809 11997 3b2803 11848->11997 11853 3b74ef 11856 3b165a ___free_lconv_mon 14 API calls 11853->11856 11858 3b74fb 11853->11858 11854 3b2803 __wsopen_s 39 API calls 11855 3b74cc 11854->11855 11859 3b289b __wsopen_s 17 API calls 11855->11859 11856->11858 11857 3b3aa3 11857->11825 11857->11826 11858->11857 11860 3b165a ___free_lconv_mon 14 API calls 11858->11860 11861 3b74d9 11859->11861 11860->11857 11861->11853 11862 3b74e3 SetEnvironmentVariableW 11861->11862 11862->11853 11864 3b3b7b 11863->11864 11865 3b3b80 11863->11865 11864->11833 11866 3b1d96 _unexpected 14 API calls 11865->11866 11868 3b3b9d 11866->11868 11867 3b3c0b 11869 3ade42 __FrameHandler3::FrameUnwindToState 39 API calls 11867->11869 11868->11867 11871 3b3c10 11868->11871 11874 3b1d96 _unexpected 14 API calls 11868->11874 11875 3b165a ___free_lconv_mon 14 API calls 11868->11875 11876 3afcfc ___std_exception_copy 39 API calls 11868->11876 11877 3b3bfa 11868->11877 11869->11871 11870 3b165a ___free_lconv_mon 14 API calls 11870->11864 11872 3ad798 __wsopen_s 11 API calls 11871->11872 11873 3b3c1c 11872->11873 11874->11868 11875->11868 11876->11868 11877->11870 11879 3b7399 11878->11879 11880 3b739f 11878->11880 11882 3b7568 11879->11882 11883 3b7520 11879->11883 11896 3b73b4 11880->11896 11916 3b757e 11882->11916 11886 3b7526 11883->11886 11889 3b7543 11883->11889 11888 3b1ce6 __dosmaperr 14 API calls 11886->11888 11887 3b7536 11887->11838 11890 3b752b 11888->11890 11892 3b1ce6 __dosmaperr 14 API calls 11889->11892 11895 3b7561 11889->11895 11891 3ad76b __fread_nolock 39 API calls 11890->11891 11891->11887 11893 3b7552 11892->11893 11894 3ad76b __fread_nolock 39 API calls 11893->11894 11894->11887 11895->11838 11897 3b0e57 __strnicoll 39 API calls 11896->11897 11898 3b73ca 11897->11898 11899 3b73e6 11898->11899 11900 3b73fd 11898->11900 11914 3b73af 11898->11914 11901 3b1ce6 __dosmaperr 14 API calls 11899->11901 11903 3b7418 11900->11903 11904 3b7406 11900->11904 11902 3b73eb 11901->11902 11905 3ad76b __fread_nolock 39 API calls 11902->11905 11907 3b7438 11903->11907 11908 3b7425 11903->11908 11906 3b1ce6 __dosmaperr 14 API calls 11904->11906 11905->11914 11910 3b740b 11906->11910 11934 3b8345 11907->11934 11911 3b757e __strnicoll 39 API calls 11908->11911 11912 3ad76b __fread_nolock 39 API calls 11910->11912 11911->11914 11912->11914 11914->11838 11915 3b1ce6 __dosmaperr 14 API calls 11915->11914 11917 3b75a8 11916->11917 11918 3b758e 11916->11918 11919 3b75b0 11917->11919 11920 3b75c7 11917->11920 11921 3b1ce6 __dosmaperr 14 API calls 11918->11921 11922 3b1ce6 __dosmaperr 14 API calls 11919->11922 11923 3b75ea 11920->11923 11924 3b75d3 11920->11924 11925 3b7593 11921->11925 11926 3b75b5 11922->11926 11931 3b0e57 __strnicoll 39 API calls 11923->11931 11933 3b759e 11923->11933 11927 3b1ce6 __dosmaperr 14 API calls 11924->11927 11928 3ad76b __fread_nolock 39 API calls 11925->11928 11929 3ad76b __fread_nolock 39 API calls 11926->11929 11930 3b75d8 11927->11930 11928->11933 11929->11933 11932 3ad76b __fread_nolock 39 API calls 11930->11932 11931->11933 11932->11933 11933->11887 11935 3b0e57 __strnicoll 39 API calls 11934->11935 11936 3b8358 11935->11936 11939 3b838b 11936->11939 11941 3b83bf __strnicoll 11939->11941 11940 3aa4a2 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11942 3b744e 11940->11942 11943 3b8623 11941->11943 11945 3b842c GetCPInfo 11941->11945 11948 3b843f 11941->11948 11952 3b8443 11941->11952 11942->11914 11942->11915 11944 3b237d __strnicoll MultiByteToWideChar 11947 3b84c5 11944->11947 11945->11948 11945->11952 11946 3b8617 11949 3b225c __freea 14 API calls 11946->11949 11947->11946 11950 3b21d4 __strnicoll 15 API calls 11947->11950 11951 3b84ec __strnicoll 11947->11951 11947->11952 11948->11944 11948->11952 11949->11952 11950->11951 11951->11946 11953 3b237d __strnicoll MultiByteToWideChar 11951->11953 11952->11940 11952->11943 11954 3b8538 11953->11954 11954->11946 11955 3b237d __strnicoll MultiByteToWideChar 11954->11955 11956 3b8554 11955->11956 11956->11946 11957 3b8562 11956->11957 11958 3b85c5 11957->11958 11960 3b21d4 __strnicoll 15 API calls 11957->11960 11963 3b857b __strnicoll 11957->11963 11959 3b225c __freea 14 API calls 11958->11959 11961 3b85cb 11959->11961 11960->11963 11962 3b225c __freea 14 API calls 11961->11962 11962->11952 11963->11958 11964 3b237d __strnicoll MultiByteToWideChar 11963->11964 11965 3b85be 11964->11965 11965->11958 11966 3b85e7 11965->11966 11972 3b00f0 11966->11972 11969 3b225c __freea 14 API calls 11970 3b8607 11969->11970 11971 3b225c __freea 14 API calls 11970->11971 11971->11952 11973 3b0578 __strnicoll 5 API calls 11972->11973 11974 3b00fb 11973->11974 11975 3b02f4 __strnicoll 5 API calls 11974->11975 11977 3b0101 11974->11977 11976 3b0141 CompareStringW 11975->11976 11976->11977 11977->11969 11979 3b71d8 HeapSize 11978->11979 11980 3b71c3 11978->11980 11979->11844 11981 3b1ce6 __dosmaperr 14 API calls 11980->11981 11982 3b71c8 11981->11982 11983 3ad76b __fread_nolock 39 API calls 11982->11983 11984 3b71d3 11983->11984 11984->11844 11986 3b71f8 11985->11986 11987 3b7203 11985->11987 11988 3b21d4 __strnicoll 15 API calls 11986->11988 11989 3b720b 11987->11989 11995 3b7214 _unexpected 11987->11995 11993 3b7200 11988->11993 11990 3b165a ___free_lconv_mon 14 API calls 11989->11990 11990->11993 11991 3b7219 11994 3b1ce6 __dosmaperr 14 API calls 11991->11994 11992 3b723e HeapReAlloc 11992->11993 11992->11995 11993->11847 11994->11993 11995->11991 11995->11992 11996 3acc13 _unexpected 2 API calls 11995->11996 11996->11995 11998 3b0e57 __strnicoll 39 API calls 11997->11998 12000 3b2815 11998->12000 11999 3b2827 12002 3b289b 11999->12002 12000->11999 12005 3b00d1 12000->12005 12011 3b2a71 12002->12011 12008 3b055e 12005->12008 12009 3b04d9 _unexpected 5 API calls 12008->12009 12010 3b00d9 12009->12010 12010->11999 12012 3b2a99 12011->12012 12013 3b2a7f 12011->12013 12015 3b2abf 12012->12015 12016 3b2aa0 12012->12016 12029 3b2881 12013->12029 12017 3b237d __strnicoll MultiByteToWideChar 12015->12017 12028 3b28b3 12016->12028 12033 3b2842 12016->12033 12019 3b2ace 12017->12019 12020 3b2ad5 GetLastError 12019->12020 12022 3b2afb 12019->12022 12024 3b2842 __wsopen_s 15 API calls 12019->12024 12038 3b1d0c 12020->12038 12025 3b237d __strnicoll MultiByteToWideChar 12022->12025 12022->12028 12024->12022 12027 3b2b12 12025->12027 12026 3b1ce6 __dosmaperr 14 API calls 12026->12028 12027->12020 12027->12028 12028->11853 12028->11854 12030 3b288c 12029->12030 12032 3b2894 12029->12032 12031 3b165a ___free_lconv_mon 14 API calls 12030->12031 12031->12032 12032->12028 12034 3b2881 __wsopen_s 14 API calls 12033->12034 12035 3b2850 12034->12035 12043 3b27e4 12035->12043 12046 3b1cf9 12038->12046 12040 3b1d17 __dosmaperr 12041 3b1ce6 __dosmaperr 14 API calls 12040->12041 12042 3b1d2a 12041->12042 12042->12026 12044 3b21d4 __strnicoll 15 API calls 12043->12044 12045 3b27f1 12044->12045 12045->12028 12047 3b0778 __dosmaperr 14 API calls 12046->12047 12048 3b1cfe 12047->12048 12048->12040 12051 3a9c38 12049->12051 12052 3a41df 12051->12052 12053 3acc13 _unexpected 2 API calls 12051->12053 12055 3a9c54 std::_Throw_Cpp_error 12051->12055 12079 3aed5b 12051->12079 12059 3a4270 12052->12059 12053->12051 12054 3aa45f std::_Throw_Cpp_error 12056 3ab45d std::_Throw_Cpp_error RaiseException 12054->12056 12055->12054 12086 3ab45d 12055->12086 12058 3aa47c 12056->12058 12060 3a42fc 12059->12060 12061 3a41fb 12060->12061 12062 3a8670 52 API calls 12060->12062 12063 3a4860 12061->12063 12062->12060 12064 3a4880 12063->12064 12065 3a4a95 12064->12065 12066 3a4a8d 12064->12066 12068 3a48a4 GetCurrentThreadId 12064->12068 12069 3a4a79 12064->12069 12070 3a4a86 12064->12070 12089 3aa3f0 WaitForSingleObjectEx 12064->12089 12071 3a9f08 std::_Throw_Cpp_error 42 API calls 12065->12071 12066->11018 12068->12064 12073 3a9f08 std::_Throw_Cpp_error 42 API calls 12069->12073 12095 3a9f08 12070->12095 12071->12069 12074 3a4aa3 12073->12074 12076 3a4b60 12075->12076 12077 3a4c9e 12076->12077 12213 3aedfb 12076->12213 12077->11018 12084 3b21d4 _unexpected 12079->12084 12080 3b2212 12081 3b1ce6 __dosmaperr 14 API calls 12080->12081 12083 3b2210 12081->12083 12082 3b21fd RtlAllocateHeap 12082->12083 12082->12084 12083->12051 12084->12080 12084->12082 12085 3acc13 _unexpected 2 API calls 12084->12085 12085->12084 12087 3ab477 12086->12087 12088 3ab4a4 RaiseException 12086->12088 12087->12088 12088->12054 12090 3aa438 12089->12090 12091 3aa406 GetExitCodeThread 12089->12091 12090->12064 12091->12090 12092 3aa417 12091->12092 12093 3aa41e 12092->12093 12094 3aa423 CloseHandle 12092->12094 12093->12094 12094->12064 12096 3a9f1e std::_Throw_Cpp_error 12095->12096 12101 3aa13a 12096->12101 12102 3aa146 __EH_prolog3_GS 12101->12102 12111 3a9d1b 12102->12111 12104 3aa15a 12115 3aa06d 12104->12115 12112 3a9d27 __EH_prolog3 12111->12112 12131 3a9e77 12112->12131 12114 3a9d43 std::_Throw_Cpp_error 12114->12104 12139 3a9db4 12115->12139 12117 3aa09e 12143 3a9ffa 12117->12143 12120 3a4cb0 std::_Throw_Cpp_error 39 API calls 12121 3aa0c0 12120->12121 12122 3aa4a2 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12121->12122 12123 3aa0df 12122->12123 12124 3a4cb0 12123->12124 12126 3a4cf6 12124->12126 12125 3a4f61 12128 3aa563 12125->12128 12126->12125 12208 3a54f0 12126->12208 12129 3aa4a2 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12128->12129 12130 3aa56d 12129->12130 12130->12130 12132 3a9e81 12131->12132 12135 3a5b40 12132->12135 12136 3a5b68 std::_Throw_Cpp_error CatchIt 12135->12136 12137 3a5c88 12136->12137 12138 3a63d0 41 API calls std::_Throw_Cpp_error 12136->12138 12137->12114 12138->12136 12140 3a9dcc 12139->12140 12142 3a9dd3 CatchIt 12140->12142 12155 3a70f0 12140->12155 12142->12117 12144 3aa006 __EH_prolog3_GS 12143->12144 12146 3aa025 std::_Throw_Cpp_error 12144->12146 12187 3a9e21 12144->12187 12147 3a9e21 std::_Throw_Cpp_error 41 API calls 12146->12147 12148 3aa04a 12147->12148 12149 3a4cb0 std::_Throw_Cpp_error 39 API calls 12148->12149 12150 3aa052 std::_Throw_Cpp_error 12149->12150 12151 3a4cb0 std::_Throw_Cpp_error 39 API calls 12150->12151 12152 3aa065 12151->12152 12153 3aa563 std::_Throw_Cpp_error 5 API calls 12152->12153 12154 3aa06c std::domain_error::domain_error 12153->12154 12154->12120 12156 3a7124 12155->12156 12158 3a732d 12156->12158 12159 3a9c33 16 API calls std::_Throw_Cpp_error 12156->12159 12160 3a7770 12156->12160 12158->12142 12159->12156 12161 3a77ce 12160->12161 12162 3a7bf1 12161->12162 12163 3a9c33 std::_Throw_Cpp_error 16 API calls 12161->12163 12164 3a7bba 12161->12164 12166 3a7bbf 12161->12166 12174 3a7c00 12162->12174 12163->12161 12169 3ad77b 12164->12169 12166->12156 12170 3adaa1 __fread_nolock 39 API calls 12169->12170 12171 3ad78a 12170->12171 12172 3ad798 __wsopen_s 11 API calls 12171->12172 12173 3ad797 12172->12173 12175 3ab45d std::_Throw_Cpp_error RaiseException 12174->12175 12176 3a7c27 12175->12176 12179 3aba3d 12176->12179 12180 3aba4a 12179->12180 12181 3a7bf6 12179->12181 12180->12181 12182 3aed5b ___std_exception_copy 15 API calls 12180->12182 12183 3aba67 12182->12183 12184 3aba77 12183->12184 12185 3afcfc ___std_exception_copy 39 API calls 12183->12185 12186 3ae3c8 ___vcrt_freefls@4 14 API calls 12184->12186 12185->12184 12186->12181 12188 3a9e38 CatchIt 12187->12188 12189 3a9e62 12187->12189 12188->12146 12191 3aa1ef 12189->12191 12192 3aa2aa 12191->12192 12193 3aa214 std::_Throw_Cpp_error 12191->12193 12198 3a6b20 12192->12198 12196 3a70f0 std::_Throw_Cpp_error 41 API calls 12193->12196 12197 3aa230 _Deallocate CatchIt 12196->12197 12197->12188 12201 3aa2f4 12198->12201 12202 3aa32f std::invalid_argument::invalid_argument 40 API calls 12201->12202 12203 3aa305 12202->12203 12204 3ab45d std::_Throw_Cpp_error RaiseException 12203->12204 12205 3aa313 12204->12205 12206 3a7cb0 std::bad_exception::bad_exception 40 API calls 12205->12206 12207 3a6b2a 12206->12207 12210 3a5570 _Deallocate 12208->12210 12209 3a585e 12209->12126 12210->12209 12211 3ad77b std::_Throw_Cpp_error 39 API calls 12210->12211 12212 3a586d 12211->12212 12214 3aee07 __FrameHandler3::FrameUnwindToState 12213->12214 12215 3b0627 _unexpected 39 API calls 12214->12215 12218 3aee0c 12215->12218 12216 3ade42 __FrameHandler3::FrameUnwindToState 39 API calls 12217 3aee36 12216->12217 12218->12216 12220 3aca6b 12219->12220 12221 3aca59 12219->12221 12231 3acbc6 12220->12231 12222 3aae8c __FrameHandler3::FrameUnwindToState GetModuleHandleW 12221->12222 12224 3aca5e 12222->12224 12224->12220 12246 3ac960 GetModuleHandleExW 12224->12246 12226 3ab2e3 12226->11046 12230 3acabd 12232 3acbd2 __FrameHandler3::FrameUnwindToState 12231->12232 12252 3adb4a EnterCriticalSection 12232->12252 12234 3acbdc 12253 3acac3 12234->12253 12236 3acbe9 12257 3acc07 12236->12257 12239 3ac9fb 12282 3ac9e2 12239->12282 12241 3aca05 12242 3aca19 12241->12242 12243 3aca09 GetCurrentProcess TerminateProcess 12241->12243 12244 3ac960 __FrameHandler3::FrameUnwindToState 3 API calls 12242->12244 12243->12242 12245 3aca21 ExitProcess 12244->12245 12247 3ac99f GetProcAddress 12246->12247 12248 3ac9c0 12246->12248 12247->12248 12249 3ac9b3 12247->12249 12250 3ac9cf 12248->12250 12251 3ac9c6 FreeLibrary 12248->12251 12249->12248 12250->12220 12251->12250 12252->12234 12255 3acacf __FrameHandler3::FrameUnwindToState 12253->12255 12254 3acb33 __FrameHandler3::FrameUnwindToState 12254->12236 12255->12254 12260 3ad16d 12255->12260 12281 3adb61 LeaveCriticalSection 12257->12281 12259 3acaa2 12259->12226 12259->12239 12261 3ad179 __EH_prolog3 12260->12261 12264 3ad3f8 12261->12264 12263 3ad1a0 std::_Throw_Cpp_error 12263->12254 12265 3ad404 __FrameHandler3::FrameUnwindToState 12264->12265 12272 3adb4a EnterCriticalSection 12265->12272 12267 3ad412 12273 3ad2c3 12267->12273 12272->12267 12274 3ad2da 12273->12274 12275 3ad2e2 12273->12275 12277 3ad447 12274->12277 12275->12274 12276 3b165a ___free_lconv_mon 14 API calls 12275->12276 12276->12274 12280 3adb61 LeaveCriticalSection 12277->12280 12279 3ad430 12279->12263 12280->12279 12281->12259 12285 3b1ede 12282->12285 12284 3ac9e7 __FrameHandler3::FrameUnwindToState 12284->12241 12286 3b1eed __FrameHandler3::FrameUnwindToState 12285->12286 12287 3b1efa 12286->12287 12289 3b038e 12286->12289 12287->12284 12290 3b04d9 _unexpected 5 API calls 12289->12290 12291 3b03aa 12290->12291 12291->12287 12293 3ac4a4 12292->12293 12295 3ac4b6 ___scrt_uninitialize_crt 12292->12295 12294 3ac4b2 12293->12294 12297 3b1a36 12293->12297 12294->11040 12295->11040 12300 3b1b61 12297->12300 12303 3b1c3a 12300->12303 12304 3b1c46 __FrameHandler3::FrameUnwindToState 12303->12304 12311 3adb4a EnterCriticalSection 12304->12311 12306 3b1cbc 12320 3b1cda 12306->12320 12307 3b1c50 ___scrt_uninitialize_crt 12307->12306 12312 3b1bae 12307->12312 12311->12307 12313 3b1bba __FrameHandler3::FrameUnwindToState 12312->12313 12323 3ac516 EnterCriticalSection 12313->12323 12315 3b1bc4 ___scrt_uninitialize_crt 12316 3b1bfd 12315->12316 12324 3b1a3f 12315->12324 12337 3b1c2e 12316->12337 12436 3adb61 LeaveCriticalSection 12320->12436 12322 3b1a3d 12322->12294 12323->12315 12325 3b1a54 __fread_nolock 12324->12325 12326 3b1a5b 12325->12326 12327 3b1a66 12325->12327 12329 3b1b61 ___scrt_uninitialize_crt 68 API calls 12326->12329 12340 3b1aa4 12327->12340 12331 3b1a61 12329->12331 12332 3ad9d9 __fread_nolock 39 API calls 12331->12332 12334 3b1a9e 12332->12334 12334->12316 12335 3b1a87 12353 3b5cf7 12335->12353 12435 3ac52a LeaveCriticalSection 12337->12435 12339 3b1c1c 12339->12307 12341 3b1abd 12340->12341 12342 3b1a70 12340->12342 12341->12342 12343 3b4067 __fread_nolock 39 API calls 12341->12343 12342->12331 12346 3b4067 12342->12346 12344 3b1ad9 12343->12344 12364 3b6069 12344->12364 12347 3b4088 12346->12347 12348 3b4073 12346->12348 12347->12335 12349 3b1ce6 __dosmaperr 14 API calls 12348->12349 12350 3b4078 12349->12350 12351 3ad76b __fread_nolock 39 API calls 12350->12351 12352 3b4083 12351->12352 12352->12335 12354 3b5d08 12353->12354 12356 3b5d15 12353->12356 12355 3b1ce6 __dosmaperr 14 API calls 12354->12355 12363 3b5d0d 12355->12363 12357 3b5d5e 12356->12357 12360 3b5d3c 12356->12360 12358 3b1ce6 __dosmaperr 14 API calls 12357->12358 12359 3b5d63 12358->12359 12361 3ad76b __fread_nolock 39 API calls 12359->12361 12405 3b5d74 12360->12405 12361->12363 12363->12331 12365 3b6075 __FrameHandler3::FrameUnwindToState 12364->12365 12366 3b60b6 12365->12366 12368 3b60fc 12365->12368 12374 3b607d 12365->12374 12367 3ad914 __fread_nolock 29 API calls 12366->12367 12367->12374 12375 3b400b EnterCriticalSection 12368->12375 12370 3b6102 12371 3b6120 12370->12371 12376 3b5e4d 12370->12376 12402 3b6172 12371->12402 12374->12342 12375->12370 12377 3b5e75 12376->12377 12400 3b5e98 __fread_nolock 12376->12400 12378 3b5e79 12377->12378 12381 3b5ed4 12377->12381 12379 3ad914 __fread_nolock 29 API calls 12378->12379 12379->12400 12380 3b5ef2 12383 3b617a __wsopen_s 40 API calls 12380->12383 12381->12380 12382 3b531e __wsopen_s 41 API calls 12381->12382 12382->12380 12384 3b5f04 12383->12384 12385 3b5f0a 12384->12385 12386 3b5f51 12384->12386 12389 3b5f39 12385->12389 12390 3b5f12 12385->12390 12387 3b5fba WriteFile 12386->12387 12388 3b5f65 12386->12388 12393 3b5fdc GetLastError 12387->12393 12387->12400 12391 3b5f6d 12388->12391 12392 3b5fa6 12388->12392 12394 3b61f7 __wsopen_s 45 API calls 12389->12394 12397 3b65be __wsopen_s 6 API calls 12390->12397 12390->12400 12395 3b5f92 12391->12395 12396 3b5f72 12391->12396 12398 3b6626 __wsopen_s 7 API calls 12392->12398 12393->12400 12394->12400 12399 3b67ea __wsopen_s 8 API calls 12395->12399 12396->12400 12401 3b6701 __wsopen_s 7 API calls 12396->12401 12397->12400 12398->12400 12399->12400 12400->12371 12401->12400 12403 3b402e __wsopen_s LeaveCriticalSection 12402->12403 12404 3b6178 12403->12404 12404->12374 12406 3b5d80 __FrameHandler3::FrameUnwindToState 12405->12406 12418 3b400b EnterCriticalSection 12406->12418 12408 3b5d8f 12409 3b5dd4 12408->12409 12419 3b3c1d 12408->12419 12411 3b1ce6 __dosmaperr 14 API calls 12409->12411 12413 3b5ddb 12411->12413 12412 3b5dbb FlushFileBuffers 12412->12413 12414 3b5dc7 GetLastError 12412->12414 12432 3b5e0a 12413->12432 12415 3b1cf9 __dosmaperr 14 API calls 12414->12415 12415->12409 12418->12408 12420 3b3c2a 12419->12420 12421 3b3c3f 12419->12421 12422 3b1cf9 __dosmaperr 14 API calls 12420->12422 12424 3b1cf9 __dosmaperr 14 API calls 12421->12424 12426 3b3c64 12421->12426 12423 3b3c2f 12422->12423 12425 3b1ce6 __dosmaperr 14 API calls 12423->12425 12427 3b3c6f 12424->12427 12428 3b3c37 12425->12428 12426->12412 12429 3b1ce6 __dosmaperr 14 API calls 12427->12429 12428->12412 12430 3b3c77 12429->12430 12431 3ad76b __fread_nolock 39 API calls 12430->12431 12431->12428 12433 3b402e __wsopen_s LeaveCriticalSection 12432->12433 12434 3b5df3 12433->12434 12434->12363 12435->12339 12436->12322 14322 3b08cc 14323 3b08e7 14322->14323 14324 3b08d7 14322->14324 14328 3b09d1 14324->14328 14327 3b165a ___free_lconv_mon 14 API calls 14327->14323 14329 3b09ec 14328->14329 14330 3b09e6 14328->14330 14332 3b165a ___free_lconv_mon 14 API calls 14329->14332 14331 3b165a ___free_lconv_mon 14 API calls 14330->14331 14331->14329 14333 3b09f8 14332->14333 14334 3b165a ___free_lconv_mon 14 API calls 14333->14334 14335 3b0a03 14334->14335 14336 3b165a ___free_lconv_mon 14 API calls 14335->14336 14337 3b0a0e 14336->14337 14338 3b165a ___free_lconv_mon 14 API calls 14337->14338 14339 3b0a19 14338->14339 14340 3b165a ___free_lconv_mon 14 API calls 14339->14340 14341 3b0a24 14340->14341 14342 3b165a ___free_lconv_mon 14 API calls 14341->14342 14343 3b0a2f 14342->14343 14344 3b165a ___free_lconv_mon 14 API calls 14343->14344 14345 3b0a3a 14344->14345 14346 3b165a ___free_lconv_mon 14 API calls 14345->14346 14347 3b0a45 14346->14347 14348 3b165a ___free_lconv_mon 14 API calls 14347->14348 14349 3b0a53 14348->14349 14354 3b0b4a 14349->14354 14355 3b0b56 __FrameHandler3::FrameUnwindToState 14354->14355 14370 3adb4a EnterCriticalSection 14355->14370 14358 3b0b60 14360 3b165a ___free_lconv_mon 14 API calls 14358->14360 14361 3b0b8a 14358->14361 14360->14361 14371 3b0ba9 14361->14371 14362 3b0bb5 14363 3b0bc1 __FrameHandler3::FrameUnwindToState 14362->14363 14375 3adb4a EnterCriticalSection 14363->14375 14365 3b0bcb 14366 3b08ed _unexpected 14 API calls 14365->14366 14367 3b0bde 14366->14367 14376 3b0bfe 14367->14376 14370->14358 14374 3adb61 LeaveCriticalSection 14371->14374 14373 3b0a79 14373->14362 14374->14373 14375->14365 14379 3adb61 LeaveCriticalSection 14376->14379 14378 3b08df 14378->14327 14379->14378

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,003C3116,003C3106), ref: 003C333A
                                                                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 003C334D
                                                                        • Wow64GetThreadContext.KERNEL32(000000A8,00000000), ref: 003C336B
                                                                        • ReadProcessMemory.KERNELBASE(0000009C,?,003C315A,00000004,00000000), ref: 003C338F
                                                                        • VirtualAllocEx.KERNELBASE(0000009C,?,?,00003000,00000040), ref: 003C33BA
                                                                        • WriteProcessMemory.KERNELBASE(0000009C,00000000,?,?,00000000,?), ref: 003C3412
                                                                        • WriteProcessMemory.KERNELBASE(0000009C,00400000,?,?,00000000,?,00000028), ref: 003C345D
                                                                        • WriteProcessMemory.KERNELBASE(0000009C,?,?,00000004,00000000), ref: 003C349B
                                                                        • Wow64SetThreadContext.KERNEL32(000000A8,003F0000), ref: 003C34D7
                                                                        • ResumeThread.KERNELBASE(000000A8), ref: 003C34E6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$CreateProcessW$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                        • API String ID: 2687962208-3857624555
                                                                        • Opcode ID: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                        • Instruction ID: f05cee4874952360fdd11c4cfb9b81266ab851ab42421b5823d6474efe4a6c42
                                                                        • Opcode Fuzzy Hash: 4d4c1a7e65f8d0d38951af6025ef960edc15c7aa7ffa2998c2434409f37e51df
                                                                        • Instruction Fuzzy Hash: 3EB1E57664028AAFDB60CF68CC80BDA73A5FF88714F158518EA08EB741D774FA518B94

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 224 3a2030-3a2070 call 3aed5b 227 3a212b-3a2130 224->227 228 3a2076 224->228 230 3a2132-3a2137 227->230 231 3a2170-3a2175 227->231 229 3a23c0-3a23c5 228->229 232 3a23cb-3a23d0 229->232 233 3a2560-3a2565 229->233 234 3a213d-3a2142 230->234 235 3a21c1-3a227b 230->235 236 3a237a-3a2396 231->236 237 3a217b-3a2180 231->237 242 3a2586-3a25aa 232->242 243 3a23d6-3a23db 232->243 239 3a256b-3a2570 233->239 240 3a25fe-3a263e 233->240 244 3a2148-3a214d 234->244 245 3a2356-3a2375 234->245 241 3a2280-3a2286 235->241 236->227 238 3a239c 236->238 246 3a239e-3a23b9 237->246 247 3a2186-3a218b 237->247 238->229 250 3a2649-3a265b 239->250 251 3a2576-3a257b 239->251 240->227 248 3a2644 240->248 252 3a2288-3a228e 241->252 253 3a22c0-3a22c6 241->253 249 3a25af-3a25b7 242->249 254 3a25c2-3a25d9 243->254 255 3a23e1-3a23e6 243->255 256 3a214f-3a2163 244->256 257 3a2120-3a2125 244->257 245->249 246->249 247->257 258 3a218d-3a21a4 call 3ac260 call 3ae3c8 247->258 248->229 249->227 265 3a25bd 249->265 250->227 260 3a2661 250->260 251->257 261 3a2581-3a2678 251->261 262 3a232d-3a234b 252->262 263 3a2294-3a229a 252->263 267 3a207b-3a2119 253->267 268 3a22cc-3a22d2 253->268 254->227 269 3a25df 254->269 255->257 264 3a23ec-3a248b 255->264 256->227 266 3a2165 256->266 257->227 257->229 283 3a21a9-3a21b6 258->283 260->229 262->252 270 3a2351 262->270 263->241 273 3a229c-3a22bd 263->273 274 3a2490-3a2496 264->274 265->229 266->229 267->257 268->241 275 3a22d4-3a2325 268->275 269->229 270->253 273->252 277 3a22bf 273->277 278 3a2498-3a249e 274->278 279 3a24d0-3a24d6 274->279 275->252 280 3a232b 275->280 277->253 284 3a252c-3a2549 278->284 285 3a24a4-3a24aa 278->285 281 3a24dc-3a24e2 279->281 282 3a25e4-3a25f3 279->282 280->253 281->274 286 3a24e4-3a2524 281->286 282->227 290 3a25f9 282->290 283->227 287 3a21bc 283->287 284->278 288 3a254f 284->288 285->274 289 3a24ac-3a24cc 285->289 286->278 291 3a252a 286->291 287->229 288->279 289->278 292 3a24ce 289->292 290->229 291->279 292->279
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: P*A$P*A$P*A$P*A$P*A
                                                                        • API String ID: 0-2583374703
                                                                        • Opcode ID: 51eebc9c8308472e3a21ebd7d56aaa8bab84dadaad1e8e1de1b0a9e5ac081cac
                                                                        • Instruction ID: 9e8eccfeb69b4073114f046957951195ac2647fd5b022bdebd82832a4ded4e3e
                                                                        • Opcode Fuzzy Hash: 51eebc9c8308472e3a21ebd7d56aaa8bab84dadaad1e8e1de1b0a9e5ac081cac
                                                                        • Instruction Fuzzy Hash: C3E1573560C3418FDB5A8A2D88E42AFBBD1DBD6314F155E2DE8CA93792C635CD48CB42

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 330 3a8670-3a86ee 331 3a86f0-3a86f5 330->331 332 3a86fb-3a8700 331->332 333 3a8a80-3a8a85 331->333 336 3a87d0-3a87d5 332->336 337 3a8706-3a870b 332->337 334 3a8a8b-3a8a90 333->334 335 3a8b40-3a8b45 333->335 338 3a8c3f-3a8c5d call 3a8e80 334->338 339 3a8a96-3a8a9b 334->339 340 3a8b4b-3a8b50 335->340 341 3a8c68-3a8cec call 3a8e80 335->341 344 3a87db-3a87e0 336->344 345 3a8d12-3a8d19 336->345 342 3a88cb-3a898f call 3a9c33 call 3a9450 337->342 343 3a8711-3a8716 337->343 338->332 361 3a8c63 338->361 339->331 346 3a8aa1-3a8b30 339->346 340->331 348 3a8b56-3a8b8e 340->348 341->332 362 3a8cf2 341->362 371 3a89f8-3a89fe 342->371 372 3a8991 342->372 349 3a871c-3a87c5 call 3a9c33 call 3a9450 343->349 350 3a8cf7-3a8cfc 343->350 344->331 353 3a87e6-3a87f4 344->353 354 3a8c2c-3a8c34 346->354 356 3a8b91-3a8b99 348->356 376 3a87cb 349->376 377 3a8878-3a887e 349->377 350->331 357 3a8d02-3a8d0d call 3a9f08 350->357 353->356 354->332 366 3a8c3a 354->366 356->332 363 3a8b9f 356->363 357->345 361->333 362->333 363->333 366->333 374 3a8993-3a89ed 371->374 375 3a8a00-3a8a06 371->375 373 3a8a10-3a8a16 372->373 382 3a8a18-3a8a1e 373->382 383 3a8a31-3a8a41 373->383 378 3a89f0-3a89f6 374->378 375->378 381 3a8a08-3a8bbd call 3ac6f4 375->381 384 3a88a0-3a88a6 376->384 379 3a87f9-3a886c 377->379 380 3a8884-3a888a 377->380 378->371 378->373 385 3a8870-3a8876 379->385 380->385 386 3a888c-3a8a6b call 3ac6f4 380->386 398 3a8bc2-3a8c27 381->398 382->378 390 3a8a20-3a8a2d 382->390 383->371 391 3a8a43 383->391 388 3a88a8-3a88ae 384->388 389 3a88bc-3a88c7 384->389 385->377 385->384 386->332 401 3a8a71-3a8a7b 386->401 388->385 393 3a88b0-3a88b8 388->393 389->384 396 3a88c9 389->396 390->371 394 3a8a2f 390->394 391->373 393->384 397 3a88ba 393->397 394->373 396->377 397->377 398->354 401->333
                                                                        APIs
                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 003A8D0D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Cpp_errorThrow_std::_
                                                                        • String ID: v22y$v22y
                                                                        • API String ID: 2134207285-685426704
                                                                        • Opcode ID: 46828ab6ea07d9b7446a1211e815f0fa63d8aedabcd947e8b56b6b3d0c6fab03
                                                                        • Instruction ID: 5149d64dd992e0280e367e711daf7fb9180ab890565625d24663522c32731b07
                                                                        • Opcode Fuzzy Hash: 46828ab6ea07d9b7446a1211e815f0fa63d8aedabcd947e8b56b6b3d0c6fab03
                                                                        • Instruction Fuzzy Hash: 55F16A36F111114FDF1A8B3888E67FE7BE6DB96310F29541AD806D72E1DE274C498B81

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 518 3a3480-3a3508 call 3a2680 call 3a19d0 FreeConsole call 3a2030 525 3a350a 518->525 526 3a352b-3a3530 518->526 527 3a35c0-3a35c5 525->527 528 3a3670-3a3675 526->528 529 3a3536-3a353b 526->529 530 3a35cb-3a35d0 527->530 531 3a36b0-3a36b5 527->531 534 3a367b-3a3680 528->534 535 3a350f-3a351e 528->535 532 3a36ff-3a3704 529->532 533 3a3541-3a3546 529->533 538 3a3756-3a3760 530->538 539 3a35d6-3a35db 530->539 540 3a36bb-3a36c0 531->540 541 3a3820-3a3892 531->541 545 3a370a-3a370f 532->545 546 3a38d3-3a38dd 532->546 543 3a371a-3a374b call 3a2030 call 3a19d0 533->543 544 3a354c-3a3551 533->544 536 3a3686-3a368b 534->536 537 3a37e7-3a3805 VirtualProtect 534->537 542 3a3520-3a3525 535->542 536->542 548 3a3691-3a36a4 call 3a2f10 536->548 537->542 559 3a380b-3a3815 537->559 538->526 551 3a3766 538->551 552 3a376b-3a37bb 539->552 553 3a35e1-3a35e6 539->553 554 3a38b9-3a38c8 540->554 555 3a36c6-3a36cb 540->555 549 3a3899-3a389d 541->549 550 3a3894 541->550 542->526 542->527 543->526 591 3a3751 543->591 544->542 557 3a3553-3a3599 544->557 545->542 558 3a3715-3a38fc 545->558 546->526 556 3a38e3 546->556 548->526 583 3a36aa 548->583 562 3a389f 549->562 563 3a38a4-3a38ae 549->563 550->549 551->527 571 3a37bd 552->571 572 3a37c2-3a37c6 552->572 553->542 570 3a35ec-3a3638 553->570 554->526 564 3a38ce 554->564 555->542 565 3a36d1-3a36f4 call 3a2a80 555->565 556->527 566 3a359b 557->566 567 3a35a0-3a35a4 557->567 559->526 560 3a381b 559->560 560->527 562->563 563->526 574 3a38b4 563->574 564->527 565->526 590 3a36fa 565->590 566->567 576 3a35a8-3a35aa 567->576 577 3a35a6 567->577 579 3a363a 570->579 580 3a363f-3a3643 570->580 571->572 581 3a37ca-3a37cc 572->581 582 3a37c8 572->582 574->527 576->542 585 3a35b0-3a35ba 576->585 577->576 579->580 587 3a3647-3a3649 580->587 588 3a3645 580->588 581->542 589 3a37d2-3a37dc 581->589 582->581 583->527 585->526 585->527 587->542 592 3a364f-3a3656 587->592 588->587 589->526 593 3a37e2 589->593 590->527 591->527 592->526 594 3a365c 592->594 593->527 594->527
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleFree
                                                                        • String ID:
                                                                        • API String ID: 771614528-0
                                                                        • Opcode ID: a7350402117e9aafca6f975a02429202b0e8775926c6290dd44c7da326e6512d
                                                                        • Instruction ID: 95700ca2ad1d83d6507af808c10e102754da08ad030ac26b3bdc3619beb4ac58
                                                                        • Opcode Fuzzy Hash: a7350402117e9aafca6f975a02429202b0e8775926c6290dd44c7da326e6512d
                                                                        • Instruction Fuzzy Hash: 1491787AA042008FCE1ED66C9CD5A7EF3D4DB57714F258C2AF445CB291E625CF489742
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __fread_nolock
                                                                        • String ID:
                                                                        • API String ID: 2638373210-0
                                                                        • Opcode ID: 21877e33c2bd9ddfa3d53474f0a599701eb0fa6dd5592eece685460a4cd5fda7
                                                                        • Instruction ID: c8a0193a16a15d02cfb50612d066a2eda1c5c8d7cc15144a22f66a998838dffe
                                                                        • Opcode Fuzzy Hash: 21877e33c2bd9ddfa3d53474f0a599701eb0fa6dd5592eece685460a4cd5fda7
                                                                        • Instruction Fuzzy Hash: 8F41A037B041005FDF1945289CD37AE778AEBE3354F29C82AF946CF2E5D9298F494282
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1a72b68720ac7db78e1a33fc260cb68a2b758f92a32dbf0e4bc32ead7a2aebc6
                                                                        • Instruction ID: f94a0ab2787ef2e4edb95ec503117c8f725905ebd74ce2b2e0dcd277c5f028ae
                                                                        • Opcode Fuzzy Hash: 1a72b68720ac7db78e1a33fc260cb68a2b758f92a32dbf0e4bc32ead7a2aebc6
                                                                        • Instruction Fuzzy Hash: 8BC1BD2E7982004F9E2D8428ACE72BF3792D7E2355F35C429E516DB6E0DA9ECC5D8341

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 003B7ADC: CreateFileW.KERNELBASE(00000000,00000000,?,003B7780,?,?,00000000,?,003B7780,00000000,0000000C), ref: 003B7AF9
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 003B77EB
                                                                        • __dosmaperr.LIBCMT ref: 003B77F2
                                                                        • GetFileType.KERNELBASE(00000000), ref: 003B77FE
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 003B7808
                                                                        • __dosmaperr.LIBCMT ref: 003B7811
                                                                        • CloseHandle.KERNEL32(00000000), ref: 003B7831
                                                                        • CloseHandle.KERNEL32(003B4556), ref: 003B797E
                                                                        • GetLastError.KERNEL32 ref: 003B79B0
                                                                        • __dosmaperr.LIBCMT ref: 003B79B7
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                        • String ID:
                                                                        • API String ID: 4237864984-0
                                                                        • Opcode ID: faf4ef2d47031697b69d58324781a2321c9c707b27c740a73890a92760a8b3d1
                                                                        • Instruction ID: 38b29fa8de94397e893b62c85cb040d3ab5443104c32d7b10ea62fd4ff6c76a8
                                                                        • Opcode Fuzzy Hash: faf4ef2d47031697b69d58324781a2321c9c707b27c740a73890a92760a8b3d1
                                                                        • Instruction Fuzzy Hash: 15A14432A081589FCF1A9F68DC62BED7BA4EB86318F15015DFA11DF791CB309902CB41

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 95 3b040e-3b041a 96 3b04ac-3b04af 95->96 97 3b041f-3b0430 96->97 98 3b04b5 96->98 100 3b043d-3b0456 LoadLibraryExW 97->100 101 3b0432-3b0435 97->101 99 3b04b7-3b04bb 98->99 104 3b0458-3b0461 GetLastError 100->104 105 3b04bc-3b04cc 100->105 102 3b043b 101->102 103 3b04d5-3b04d7 101->103 107 3b04a9 102->107 103->99 108 3b049a-3b04a7 104->108 109 3b0463-3b0475 call 3b2222 104->109 105->103 106 3b04ce-3b04cf FreeLibrary 105->106 106->103 107->96 108->107 109->108 112 3b0477-3b0489 call 3b2222 109->112 112->108 115 3b048b-3b0498 LoadLibraryExW 112->115 115->105 115->108
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,7EAEDD2A,?,003B051D,?,?,00000000), ref: 003B04CF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: api-ms-$ext-ms-
                                                                        • API String ID: 3664257935-537541572
                                                                        • Opcode ID: 35dac30f1d1bffd89e009a83c1131326d38e516a422bb0d191a9e8d7a4ead917
                                                                        • Instruction ID: 77274960cfe25a60601034049a4e7bfe9384e495c9a8df6ae259aad5715fed7c
                                                                        • Opcode Fuzzy Hash: 35dac30f1d1bffd89e009a83c1131326d38e516a422bb0d191a9e8d7a4ead917
                                                                        • Instruction Fuzzy Hash: 2821D831A01214ABD7279B62AC45EDB776CAF51778F160224EB16E7A91DB34FD00CBD0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 116 3b48dd-3b48ed 117 3b48ef-3b4902 call 3b1cf9 call 3b1ce6 116->117 118 3b4907-3b4909 116->118 134 3b4c61 117->134 120 3b4c49-3b4c56 call 3b1cf9 call 3b1ce6 118->120 121 3b490f-3b4915 118->121 139 3b4c5c call 3ad76b 120->139 121->120 124 3b491b-3b4944 121->124 124->120 127 3b494a-3b4953 124->127 130 3b496d-3b496f 127->130 131 3b4955-3b4968 call 3b1cf9 call 3b1ce6 127->131 132 3b4c45-3b4c47 130->132 133 3b4975-3b4979 130->133 131->139 138 3b4c64-3b4c67 132->138 133->132 137 3b497f-3b4983 133->137 134->138 137->131 141 3b4985-3b499c 137->141 139->134 144 3b499e-3b49a1 141->144 145 3b49d1-3b49d7 141->145 147 3b49a3-3b49a9 144->147 148 3b49c7-3b49cf 144->148 149 3b49ab-3b49c2 call 3b1cf9 call 3b1ce6 call 3ad76b 145->149 150 3b49d9-3b49e0 145->150 147->148 147->149 152 3b4a44-3b4a63 148->152 181 3b4b7c 149->181 153 3b49e2 150->153 154 3b49e4-3b4a02 call 3b21d4 call 3b165a * 2 150->154 155 3b4a69-3b4a75 152->155 156 3b4b1f-3b4b28 call 3b691c 152->156 153->154 185 3b4a1f-3b4a42 call 3b52de 154->185 186 3b4a04-3b4a1a call 3b1ce6 call 3b1cf9 154->186 155->156 159 3b4a7b-3b4a7d 155->159 170 3b4b2a-3b4b3c 156->170 171 3b4b99 156->171 159->156 163 3b4a83-3b4aa4 159->163 163->156 167 3b4aa6-3b4abc 163->167 167->156 172 3b4abe-3b4ac0 167->172 170->171 176 3b4b3e-3b4b4d GetConsoleMode 170->176 174 3b4b9d-3b4bb3 ReadFile 171->174 172->156 177 3b4ac2-3b4ae5 172->177 179 3b4c11-3b4c1c GetLastError 174->179 180 3b4bb5-3b4bbb 174->180 176->171 182 3b4b4f-3b4b53 176->182 177->156 184 3b4ae7-3b4afd 177->184 187 3b4c1e-3b4c30 call 3b1ce6 call 3b1cf9 179->187 188 3b4c35-3b4c38 179->188 180->179 189 3b4bbd 180->189 183 3b4b7f-3b4b89 call 3b165a 181->183 182->174 190 3b4b55-3b4b6d ReadConsoleW 182->190 183->138 184->156 196 3b4aff-3b4b01 184->196 185->152 186->181 187->181 193 3b4c3e-3b4c40 188->193 194 3b4b75-3b4b7b call 3b1d0c 188->194 200 3b4bc0-3b4bd2 189->200 191 3b4b6f GetLastError 190->191 192 3b4b8e-3b4b97 190->192 191->194 192->200 193->183 194->181 196->156 203 3b4b03-3b4b1a 196->203 200->183 207 3b4bd4-3b4bd8 200->207 203->156 211 3b4bda-3b4bea call 3b4ce6 207->211 212 3b4bf1-3b4bfe 207->212 221 3b4bed-3b4bef 211->221 214 3b4c0a-3b4c0f call 3b4f8a 212->214 215 3b4c00 call 3b4c68 212->215 222 3b4c05-3b4c08 214->222 215->222 221->183 222->221
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d8f4084031a9f22efff7c33e89bd13414c5d7170bbee984886fa735aef1d0648
                                                                        • Instruction ID: bd37df1920cfd932319406f193503c0e4de0158262b7ac6d2952e61512548b31
                                                                        • Opcode Fuzzy Hash: d8f4084031a9f22efff7c33e89bd13414c5d7170bbee984886fa735aef1d0648
                                                                        • Instruction Fuzzy Hash: B7B10F70A04248ABDB13DFA8C891BEEBBB9BF45308F154158E7419BA93C770ED41CB58

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 293 3a4860-3a4876 294 3a4880-3a4885 293->294 295 3a4900-3a4905 294->295 296 3a4887-3a488c 294->296 297 3a491e-3a4923 295->297 298 3a4907-3a490c 295->298 299 3a488e-3a4893 296->299 300 3a48c0-3a48c5 296->300 305 3a4929-3a493e call 3aa3f0 297->305 306 3a4a67-3a4a6c 297->306 303 3a490e-3a4913 298->303 304 3a4957-3a49cc 298->304 307 3a4899-3a489e 299->307 308 3a49f7-3a4a5c 299->308 301 3a48cb-3a48d0 300->301 302 3a49d7-3a49df 300->302 301->294 309 3a48d2-3a48ef 301->309 317 3a49e4-3a49ec 302->317 313 3a4919 303->313 314 3a4a8d-3a4a94 303->314 304->296 316 3a49d2 304->316 325 3a4943-3a4952 305->325 311 3a4a6e-3a4a73 306->311 312 3a4a95-3a4a97 call 3a9f08 306->312 318 3a4a7b-3a4a80 307->318 319 3a48a4-3a48b7 GetCurrentThreadId 307->319 308->296 310 3a4a62 308->310 309->296 321 3a48f1-3a48fb 309->321 310->295 311->294 322 3a4a79 311->322 326 3a4a9c-3a4aa3 call 3a9f08 312->326 313->294 316->295 317->296 320 3a49f2 317->320 318->294 323 3a4a86-3a4a88 call 3a9f08 318->323 319->317 320->295 321->295 322->326 323->314 325->317
                                                                        APIs
                                                                        • GetCurrentThreadId.KERNEL32 ref: 003A48A6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentThread
                                                                        • String ID:
                                                                        • API String ID: 2882836952-0
                                                                        • Opcode ID: f8916b2c111265356a8ff8cfd4e7496d6f9aceaab16f3fb2ac78745baafc7745
                                                                        • Instruction ID: 2a64dc2a4c5e7ed625cd5e48cc36af9b3466ddcd8aa38dcaeffbd5f0b8c6e7b4
                                                                        • Opcode Fuzzy Hash: f8916b2c111265356a8ff8cfd4e7496d6f9aceaab16f3fb2ac78745baafc7745
                                                                        • Instruction Fuzzy Hash: EF5159367006018FCA299A18ACD27BF33D9EBD3351F26451DE506CB2A1DBBADC458B52

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 402 3b5a3d-3b5a56 403 3b5a58-3b5a68 call 3b8180 402->403 404 3b5a6c-3b5a71 402->404 403->404 410 3b5a6a 403->410 405 3b5a7e-3b5aa4 call 3b237d 404->405 406 3b5a73-3b5a7b 404->406 412 3b5c1a-3b5c2b call 3aa4a2 405->412 413 3b5aaa-3b5ab5 405->413 406->405 410->404 415 3b5abb-3b5ac0 413->415 416 3b5c0d 413->416 418 3b5ad9-3b5ae4 call 3b21d4 415->418 419 3b5ac2-3b5acb call 3b6980 415->419 420 3b5c0f 416->420 418->420 427 3b5aea 418->427 419->420 428 3b5ad1-3b5ad7 419->428 422 3b5c11-3b5c18 call 3b225c 420->422 422->412 430 3b5af0-3b5af5 427->430 428->430 430->420 431 3b5afb-3b5b10 call 3b237d 430->431 431->420 434 3b5b16-3b5b28 call 3b0297 431->434 436 3b5b2d-3b5b31 434->436 436->420 437 3b5b37-3b5b3f 436->437 438 3b5b79-3b5b85 437->438 439 3b5b41-3b5b46 437->439 440 3b5c02 438->440 441 3b5b87-3b5b89 438->441 439->422 442 3b5b4c-3b5b4e 439->442 445 3b5c04-3b5c0b call 3b225c 440->445 443 3b5b8b-3b5b94 call 3b6980 441->443 444 3b5b9e-3b5ba9 call 3b21d4 441->444 442->420 446 3b5b54-3b5b6e call 3b0297 442->446 443->445 455 3b5b96-3b5b9c 443->455 444->445 456 3b5bab 444->456 445->420 446->422 457 3b5b74 446->457 458 3b5bb1-3b5bb6 455->458 456->458 457->420 458->445 459 3b5bb8-3b5bd0 call 3b0297 458->459 459->445 462 3b5bd2-3b5bd9 459->462 463 3b5bdb-3b5bdc 462->463 464 3b5bfa-3b5c00 462->464 465 3b5bdd-3b5bef call 3b36c0 463->465 464->465 465->445 468 3b5bf1-3b5bf8 call 3b225c 465->468 468->422
                                                                        APIs
                                                                        • __freea.LIBCMT ref: 003B5BF2
                                                                          • Part of subcall function 003B21D4: RtlAllocateHeap.NTDLL(00000000,003AA305,003A6B0B,?,003ABA67,003A6B0D,003A6B0B,BD5B212C,1CF2E7BE,?,003A9CC5,003AA305,003A6B0F,003A6B0B,003A6B0B,003A6B0B), ref: 003B2206
                                                                        • __freea.LIBCMT ref: 003B5C05
                                                                        • __freea.LIBCMT ref: 003B5C12
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 2243444508-0
                                                                        • Opcode ID: c6dfd45b757c0656047773de83334e7049e10e87ee2356c9303d001552b396f9
                                                                        • Instruction ID: 8e59826893d5373141b5b8eb3f6272c991254b987968c2a219fe6dc5a6e639bc
                                                                        • Opcode Fuzzy Hash: c6dfd45b757c0656047773de83334e7049e10e87ee2356c9303d001552b396f9
                                                                        • Instruction Fuzzy Hash: 9651B672600606AFEF279F648C85FFB7BAAEF44718B1A0528FE05DA950E734DC50D660

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 471 3ac6f4-3ac6ff 472 3ac701-3ac714 call 3b1ce6 call 3ad76b 471->472 473 3ac715-3ac728 call 3ac785 471->473 478 3ac72a-3ac747 CreateThread 473->478 479 3ac756 473->479 481 3ac749-3ac755 GetLastError call 3b1d0c 478->481 482 3ac765-3ac76a 478->482 483 3ac758-3ac764 call 3ac7d5 479->483 481->479 487 3ac76c-3ac76f 482->487 488 3ac771-3ac775 482->488 487->488 488->483
                                                                        APIs
                                                                        • CreateThread.KERNELBASE(?,?,Function_0000C80C,00000000,00000000,?), ref: 003AC73D
                                                                        • GetLastError.KERNEL32(?,003A8BC2,00000000,00000000,003A8D20,?,00000000,?), ref: 003AC749
                                                                        • __dosmaperr.LIBCMT ref: 003AC750
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CreateErrorLastThread__dosmaperr
                                                                        • String ID:
                                                                        • API String ID: 2744730728-0
                                                                        • Opcode ID: bbf59a691b8fd4b648d876311b1367c7f2e0d90867a8935db151fb25fc7e0436
                                                                        • Instruction ID: 1eb7e928378809c9387e76a0a5ccd776d790cd3502894fa719e35f3063cd00ba
                                                                        • Opcode Fuzzy Hash: bbf59a691b8fd4b648d876311b1367c7f2e0d90867a8935db151fb25fc7e0436
                                                                        • Instruction Fuzzy Hash: 4E019E76520209AFDF17AFA0DC05AEE7BA9EF02364F104168F90196151EB72D950DF90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 491 3aa3f0-3aa404 WaitForSingleObjectEx 492 3aa438-3aa43c 491->492 493 3aa406-3aa415 GetExitCodeThread 491->493 493->492 494 3aa417-3aa41c 493->494 495 3aa41e-3aa421 494->495 496 3aa423-3aa437 CloseHandle 494->496 495->496
                                                                        APIs
                                                                        • WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 003AA3FB
                                                                        • GetExitCodeThread.KERNELBASE(?,?), ref: 003AA40D
                                                                        • CloseHandle.KERNEL32(?), ref: 003AA426
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCodeExitHandleObjectSingleThreadWait
                                                                        • String ID:
                                                                        • API String ID: 2551024706-0
                                                                        • Opcode ID: 140b8107157b623899a835d176b0e0d9f1886bae46e8907f4a3ec149f33f3b7a
                                                                        • Instruction ID: 68d8373b8f78245d332ea2b322439e384da8638350034529def36bfec6b0004d
                                                                        • Opcode Fuzzy Hash: 140b8107157b623899a835d176b0e0d9f1886bae46e8907f4a3ec149f33f3b7a
                                                                        • Instruction Fuzzy Hash: CBF08C3A200109ABDF068F35DC0AF697AA8EF02368F644324B822D62E0D7B1ED01DB50

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 497 3ac88a-3ac897 call 3b0778 500 3ac899-3ac8a1 497->500 501 3ac8d7-3ac8da ExitThread 497->501 500->501 502 3ac8a3-3ac8a7 500->502 503 3ac8a9 call 3b0360 502->503 504 3ac8ae-3ac8b4 502->504 503->504 506 3ac8c1-3ac8c7 504->506 507 3ac8b6-3ac8b8 504->507 506->501 509 3ac8c9-3ac8cb 506->509 507->506 508 3ac8ba-3ac8bb CloseHandle 507->508 508->506 509->501 510 3ac8cd-3ac8d1 FreeLibraryAndExitThread 509->510 510->501
                                                                        APIs
                                                                          • Part of subcall function 003B0778: GetLastError.KERNEL32(00000000,?,003B1CEB,003B1DE8,?,?,003B0674,00000001,00000364,?,00000002,000000FF,?,003AC831,003C1C08,0000000C), ref: 003B077C
                                                                          • Part of subcall function 003B0778: SetLastError.KERNEL32(00000000), ref: 003B081E
                                                                        • CloseHandle.KERNEL32(?,?,?,003AC784,?,?,003AC86A,00000000), ref: 003AC8BB
                                                                        • FreeLibraryAndExitThread.KERNELBASE(?,?,?,?,003AC784,?,?,003AC86A,00000000), ref: 003AC8D1
                                                                        • ExitThread.KERNEL32 ref: 003AC8DA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                                                                        • String ID:
                                                                        • API String ID: 1991824761-0
                                                                        • Opcode ID: 89a30cac40dde5e66a4084bc9c8bf3040650bee4e22a8d31906e3e895d130ff3
                                                                        • Instruction ID: bd2f22c5735ec09be487aecbf337d07a8ba0a52d80ca158125bf759b5b8b1939
                                                                        • Opcode Fuzzy Hash: 89a30cac40dde5e66a4084bc9c8bf3040650bee4e22a8d31906e3e895d130ff3
                                                                        • Instruction Fuzzy Hash: 9BF05832410604ABCB231B35C84DA6B7AACFF02364F1A5B14F925C65A1DB38EC41C790

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32(00000002,?,003ACABD,003ADE85,003ADE85,?,00000002,7EAEDD2A,003ADE85,00000002), ref: 003ACA0C
                                                                        • TerminateProcess.KERNEL32(00000000,?,003ACABD,003ADE85,003ADE85,?,00000002,7EAEDD2A,003ADE85,00000002), ref: 003ACA13
                                                                        • ExitProcess.KERNEL32 ref: 003ACA25
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Process$CurrentExitTerminate
                                                                        • String ID:
                                                                        • API String ID: 1703294689-0
                                                                        • Opcode ID: 1e73b7956f53cb6acb78d53c134dc8da39597257083447beef988bbf874fabf7
                                                                        • Instruction ID: 5941e5e01b135143e2dc17549414f8b31e34c3ddfb42278ce7e7ca79a61f8eae
                                                                        • Opcode Fuzzy Hash: 1e73b7956f53cb6acb78d53c134dc8da39597257083447beef988bbf874fabf7
                                                                        • Instruction Fuzzy Hash: D4D09E39010148ABCF037F61DC0DC5A3F69EF46785F105014B905D9073DF35A951EB84

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 595 3b0ed9-3b0f01 call 3b10de 598 3b0f07-3b0f0d 595->598 599 3b10c6-3b10c7 call 3b114f 595->599 601 3b0f10-3b0f16 598->601 602 3b10cc-3b10ce 599->602 603 3b0f1c-3b0f28 601->603 604 3b1012-3b1031 call 3ac260 601->604 606 3b10cf-3b10dd call 3aa4a2 602->606 603->601 607 3b0f2a-3b0f30 603->607 613 3b1034-3b1039 604->613 610 3b100a-3b100d 607->610 611 3b0f36-3b0f42 IsValidCodePage 607->611 610->606 611->610 612 3b0f48-3b0f4f 611->612 615 3b0f71-3b0f7e GetCPInfo 612->615 616 3b0f51-3b0f5d 612->616 617 3b103b-3b1040 613->617 618 3b1076-3b1080 613->618 621 3b0ffe-3b1004 615->621 622 3b0f80-3b0f9f call 3ac260 615->622 620 3b0f61-3b0f6c 616->620 623 3b1073 617->623 624 3b1042-3b104a 617->624 618->613 619 3b1082-3b10ac call 3b142a 618->619 634 3b10ad-3b10bc 619->634 626 3b10be-3b10bf call 3b1468 620->626 621->599 621->610 622->620 636 3b0fa1-3b0fa8 622->636 623->618 628 3b106b-3b1071 624->628 629 3b104c-3b104f 624->629 635 3b10c4 626->635 628->617 628->623 633 3b1051-3b1057 629->633 633->628 637 3b1059-3b1069 633->637 634->626 634->634 635->602 638 3b0faa-3b0faf 636->638 639 3b0fd4-3b0fd7 636->639 637->628 637->633 638->639 640 3b0fb1-3b0fb9 638->640 641 3b0fdc-3b0fe3 639->641 642 3b0fbb-3b0fc2 640->642 643 3b0fcc-3b0fd2 640->643 641->641 644 3b0fe5-3b0ff9 call 3b142a 641->644 646 3b0fc3-3b0fca 642->646 643->638 643->639 644->620 646->643 646->646
                                                                        APIs
                                                                          • Part of subcall function 003B10DE: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 003B1109
                                                                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,003B12E9,?,00000000,?,00000000,?), ref: 003B0F3A
                                                                        • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,003B12E9,?,00000000,?,00000000,?), ref: 003B0F76
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CodeInfoPageValid
                                                                        • String ID:
                                                                        • API String ID: 546120528-0
                                                                        • Opcode ID: f8cf555f2a17bbb809efe6aefefc5c66ab34c71a0aa5564ae6f3a75b89e3fd4b
                                                                        • Instruction ID: 3fd9422968df570c221babbd49499690636716c2ff431bd08497c778f1e16be7
                                                                        • Opcode Fuzzy Hash: f8cf555f2a17bbb809efe6aefefc5c66ab34c71a0aa5564ae6f3a75b89e3fd4b
                                                                        • Instruction Fuzzy Hash: 94512370A002858EDB32DF35C8A0AFBBBF5EF41308F19456AD2828BA51D7749986CB50

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 648 3b0d4c-3b0d51 649 3b0d53-3b0d6b 648->649 650 3b0d79-3b0d82 649->650 651 3b0d6d-3b0d71 649->651 653 3b0d94 650->653 654 3b0d84-3b0d87 650->654 651->650 652 3b0d73-3b0d77 651->652 655 3b0dee-3b0df2 652->655 658 3b0d96-3b0da3 GetStdHandle 653->658 656 3b0d89-3b0d8e 654->656 657 3b0d90-3b0d92 654->657 655->649 659 3b0df8-3b0dfb 655->659 656->658 657->658 660 3b0dd0-3b0de2 658->660 661 3b0da5-3b0da7 658->661 660->655 662 3b0de4-3b0de7 660->662 661->660 663 3b0da9-3b0db2 GetFileType 661->663 662->655 663->660 664 3b0db4-3b0dbd 663->664 665 3b0dbf-3b0dc3 664->665 666 3b0dc5-3b0dc8 664->666 665->655 666->655 667 3b0dca-3b0dce 666->667 667->655
                                                                        APIs
                                                                        • GetStdHandle.KERNEL32(000000F6,?,?,?,?,?,?,?,00000000,003B0C3B,003C1FE8,0000000C), ref: 003B0D98
                                                                        • GetFileType.KERNELBASE(00000000,?,?,?,?,?,?,?,00000000,003B0C3B,003C1FE8,0000000C), ref: 003B0DAA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileHandleType
                                                                        • String ID:
                                                                        • API String ID: 3000768030-0
                                                                        • Opcode ID: 8b5a2ce994c72dc0eac9384d08faa16fd5dbd681ab817f9452db8a5c9f1a32a5
                                                                        • Instruction ID: 2a2acb39a48a1558a09cb6682c8d3bdbe39f732a6726b8b206dd2c345ac29183
                                                                        • Opcode Fuzzy Hash: 8b5a2ce994c72dc0eac9384d08faa16fd5dbd681ab817f9452db8a5c9f1a32a5
                                                                        • Instruction Fuzzy Hash: 4811D6315047414ACB3A4FBE8C886A7BA98A756338F39071DD2B7C6DF1C630F886D240
                                                                        APIs
                                                                        • SetFilePointerEx.KERNELBASE(00000000,?,?,00000000,00000002,?,00000000,?,?,?,003B5337,00000000,?,?,00000002,00000000), ref: 003B54BB
                                                                        • GetLastError.KERNEL32(00000000,?,003B5337,00000000,?,?,00000002,00000000,?,003B5EF2,?,00000000,00000000,00000002,?,?), ref: 003B54C8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorFileLastPointer
                                                                        • String ID:
                                                                        • API String ID: 2976181284-0
                                                                        • Opcode ID: 6267b390032cc0adcc3f909d4caf9d55c78afc0a02a5a82cd156d35eec13570a
                                                                        • Instruction ID: 6eac5b5da028d7c54ddf9f7daeb20d793906bee2c517490f91b0d5f971395895
                                                                        • Opcode Fuzzy Hash: 6267b390032cc0adcc3f909d4caf9d55c78afc0a02a5a82cd156d35eec13570a
                                                                        • Instruction Fuzzy Hash: D5012632610555AFCB068F59DC05DEE3B2EEB85339F250108F911DB991EA71ED81DB90
                                                                        APIs
                                                                        • GetLastError.KERNEL32(003C1C08,0000000C), ref: 003AC81F
                                                                        • ExitThread.KERNEL32 ref: 003AC826
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorExitLastThread
                                                                        • String ID:
                                                                        • API String ID: 1611280651-0
                                                                        • Opcode ID: 7d2fdf9377cd335560cb3a76fba609e4598bb344ffa1b8c85a178e0897188a7b
                                                                        • Instruction ID: 6525ac0251fd59a846bf2096e240d81a4c628e85cfc88591de88b232ec942f5f
                                                                        • Opcode Fuzzy Hash: 7d2fdf9377cd335560cb3a76fba609e4598bb344ffa1b8c85a178e0897188a7b
                                                                        • Instruction Fuzzy Hash: E8F0C2749402089FDB07BF70C84AEAE7B78FF46700F104148F1029BA62CB75A900DFA0
                                                                        APIs
                                                                        • LCMapStringEx.KERNELBASE(?,003B5B2D,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 003B02CB
                                                                        • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,003B5B2D,?,?,-00000008,?,00000000), ref: 003B02E9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: String
                                                                        • String ID:
                                                                        • API String ID: 2568140703-0
                                                                        • Opcode ID: c4b9b6abef5667b93513cf53dd0e510a55b0d9ccb7dc730a21541aad12f85a88
                                                                        • Instruction ID: 653ae984c4e33bad42fb836fc1d2fffdbe235f804fdbf7d3c3297540795490e5
                                                                        • Opcode Fuzzy Hash: c4b9b6abef5667b93513cf53dd0e510a55b0d9ccb7dc730a21541aad12f85a88
                                                                        • Instruction Fuzzy Hash: 9AF0683200011ABBCF175F90DC09DDE3F2AAB487A4F058410BA1969420CB32D871AB90
                                                                        APIs
                                                                        • RtlFreeHeap.NTDLL(00000000,00000000,?,003B21C8,?,00000000,?,?,003B20E4,?,00000007,?,?,003B26FD,?,?), ref: 003B1670
                                                                        • GetLastError.KERNEL32(?,?,003B21C8,?,00000000,?,?,003B20E4,?,00000007,?,?,003B26FD,?,?), ref: 003B167B
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 485612231-0
                                                                        • Opcode ID: 3dbe07c6f392e695190bf14e5c8a5dfc497c172a055157e30219ddd15230ae80
                                                                        • Instruction ID: 102c315e580adc83f8f8a02c45167e1cf1b13405f23af50c0168e9f5a07e7458
                                                                        • Opcode Fuzzy Hash: 3dbe07c6f392e695190bf14e5c8a5dfc497c172a055157e30219ddd15230ae80
                                                                        • Instruction Fuzzy Hash: 1FE0867210021467CB132BA0ED19BE57B5CAB04799F854028F70CCA861D634AC40D784
                                                                        APIs
                                                                        • CloseHandle.KERNELBASE(00000000,00000000,CF830579,?,003B424C,00000000,CF830579,003C2148,0000000C,003B41D4,003ADF24,?), ref: 003B4114
                                                                        • GetLastError.KERNEL32(?,003B424C,00000000,CF830579,003C2148,0000000C,003B41D4,003ADF24,?), ref: 003B411E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CloseErrorHandleLast
                                                                        • String ID:
                                                                        • API String ID: 918212764-0
                                                                        • Opcode ID: 94bf734efbff63b362c01970cb5810bb9e194984d0cf3c4fd93d1b1a0ce699a9
                                                                        • Instruction ID: 0448f252417f5707a677a09b97f66c9094227b50e764f75f9e733580cb737cee
                                                                        • Opcode Fuzzy Hash: 94bf734efbff63b362c01970cb5810bb9e194984d0cf3c4fd93d1b1a0ce699a9
                                                                        • Instruction Fuzzy Hash: 49110C33A041601AD61763785C09BFEAB599B5273CF270119FB14DBAD3DE6098C45694
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7d0fd1e0bd094bc0454b83a220e3256c65947572e3fc03ed35c22911129cb77b
                                                                        • Instruction ID: 199e8dea50e05f87b052055a028836c32c04ff19e491f4e8102b9da868ad5257
                                                                        • Opcode Fuzzy Hash: 7d0fd1e0bd094bc0454b83a220e3256c65947572e3fc03ed35c22911129cb77b
                                                                        • Instruction Fuzzy Hash: BE51C471A00104AFDF16DF58C885EA9BFB5EF8A324F298158F8599B252D371DE41CB90
                                                                        APIs
                                                                        • GetCPInfo.KERNEL32(00000083,?,00000005,003B12E9,?), ref: 003B149A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Info
                                                                        • String ID:
                                                                        • API String ID: 1807457897-0
                                                                        • Opcode ID: b6f689a0ac6c82a31c5c64f57b89d458c9d201c425782d5b42fce76cec7173f2
                                                                        • Instruction ID: 262c36515752993768e97f2a95529940cbacd9730b008acdea0d3437ea3fb543
                                                                        • Opcode Fuzzy Hash: b6f689a0ac6c82a31c5c64f57b89d458c9d201c425782d5b42fce76cec7173f2
                                                                        • Instruction Fuzzy Hash: 65515DB1908158AADB228F29CC94BF97B7CEB46308F5401E9E65AC7542C3759D45CF60
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __wsopen_s
                                                                        • String ID:
                                                                        • API String ID: 3347428461-0
                                                                        • Opcode ID: 0200c767e1596ab618f06d4c7c68d5a0c4e6ce23accd2ce45978150013b98775
                                                                        • Instruction ID: 750ce63f78fe8738a6f7f16de66d40bfbbe5072e0e265b2f0634e41e8f65906f
                                                                        • Opcode Fuzzy Hash: 0200c767e1596ab618f06d4c7c68d5a0c4e6ce23accd2ce45978150013b98775
                                                                        • Instruction Fuzzy Hash: 70116A71A0420AAFCB16DF58E941DDB7BF8EF49308F01405AF908AB202D630ED11CBA4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ab7c0b44c83c69c1a29d6088a8ce8847a4195f650f09afa22900c3e0e44408a9
                                                                        • Instruction ID: 5b9852554af8e4014c4eb4cbbe47b46b743a0c473b0aee4df6613ab241387ff3
                                                                        • Opcode Fuzzy Hash: ab7c0b44c83c69c1a29d6088a8ce8847a4195f650f09afa22900c3e0e44408a9
                                                                        • Instruction Fuzzy Hash: CA01FE333042105F9B1B8A5DED40EA7336DA7C2724B254116FB05D7C54EE30E9408B50
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(00000000,003AA305,003A6B0B,?,003ABA67,003A6B0D,003A6B0B,BD5B212C,1CF2E7BE,?,003A9CC5,003AA305,003A6B0F,003A6B0B,003A6B0B,003A6B0B), ref: 003B2206
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 1279760036-0
                                                                        • Opcode ID: e2950e7b1854911fe07a113912ce0c1455cf1957593bb666933a043e3243214f
                                                                        • Instruction ID: 7cdafa930ee4710f3edb0d1dade58dcca109f7e5ccdaa36bd102674f7ebc25eb
                                                                        • Opcode Fuzzy Hash: e2950e7b1854911fe07a113912ce0c1455cf1957593bb666933a043e3243214f
                                                                        • Instruction Fuzzy Hash: 42E06D312842645BDA632669DD11FEB3A4CAB527F9F160321FF25DEC96DB60DC00A2E0
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(00000000,00000000,?,003B7780,?,?,00000000,?,003B7780,00000000,0000000C), ref: 003B7AF9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFile
                                                                        • String ID:
                                                                        • API String ID: 823142352-0
                                                                        • Opcode ID: 1656d71a2c669001e468bee81375d8faa80d5d246d1715f06bcb52910eb2cd42
                                                                        • Instruction ID: 4202fda36622eb47d081537105c743e5929e3186ce9c4861fdcc089b48551e45
                                                                        • Opcode Fuzzy Hash: 1656d71a2c669001e468bee81375d8faa80d5d246d1715f06bcb52910eb2cd42
                                                                        • Instruction Fuzzy Hash: 65D06C3200010DBBDF028F84DC06EDA3BAAFB48714F014100BA1896020C732E871AB90
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 003AA753
                                                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 003AA761
                                                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 003AA772
                                                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 003AA783
                                                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 003AA794
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 003AA7A5
                                                                        • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 003AA7B6
                                                                        • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 003AA7C7
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 003AA7D8
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 003AA7E9
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 003AA7FA
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 003AA80B
                                                                        • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 003AA81C
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 003AA82D
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 003AA83E
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 003AA84F
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 003AA860
                                                                        • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 003AA871
                                                                        • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 003AA882
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 003AA893
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 003AA8A4
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 003AA8B5
                                                                        • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 003AA8C6
                                                                        • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 003AA8D7
                                                                        • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 003AA8E8
                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 003AA8F9
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 003AA90A
                                                                        • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 003AA91B
                                                                        • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 003AA92C
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 003AA93D
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 003AA94E
                                                                        • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 003AA95F
                                                                        • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 003AA970
                                                                        • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 003AA981
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 003AA992
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 003AA9A3
                                                                        • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 003AA9B4
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 003AA9C5
                                                                        • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 003AA9D6
                                                                        • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 003AA9E7
                                                                        • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 003AA9F8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$HandleModule
                                                                        • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                        • API String ID: 667068680-295688737
                                                                        • Opcode ID: f98f2cd95d7963fbe7d7ac524560fb2755c4b5091af77e43e962eca930afdfde
                                                                        • Instruction ID: 002b5d3ec358f42d829d8654bf51b6a52524e4d8165668d2bae75fa09a0397d6
                                                                        • Opcode Fuzzy Hash: f98f2cd95d7963fbe7d7ac524560fb2755c4b5091af77e43e962eca930afdfde
                                                                        • Instruction Fuzzy Hash: 8A618B799523A0AFC7037FB8BC1DCC63EECBA0AB09B444656F601D2962D7B4B0519F58
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: )._>$)._>$)._>$)._>$)._>$)._>$)._>$)._>$)._>$*._>$*._>
                                                                        • API String ID: 0-786905451
                                                                        • Opcode ID: 3ba5d80d3efa13556e38ee38c3e2ced9663f69711eb4146ba3c772fcffc7d810
                                                                        • Instruction ID: d8ed0040a2c3bb4568a14accaaf0ee503a51f350dd4b7125469fe93f44cf20b8
                                                                        • Opcode Fuzzy Hash: 3ba5d80d3efa13556e38ee38c3e2ced9663f69711eb4146ba3c772fcffc7d810
                                                                        • Instruction Fuzzy Hash: 39C16B3BF012118B8F19CA64D8E25FDB7E7EBC9360B3E812AC91197390C9765C45CB81
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: vxN$vxN$vxN$vxN$vxN$vxN
                                                                        • API String ID: 0-1707094956
                                                                        • Opcode ID: 3f96e4f6263925bbdb861b02a91ebe8f459bde7c09f6aebfd5691c5203bc6078
                                                                        • Instruction ID: 61e23c81fdbb4086d0db0c443386861c99d7888968717da3ab611878f02a5451
                                                                        • Opcode Fuzzy Hash: 3f96e4f6263925bbdb861b02a91ebe8f459bde7c09f6aebfd5691c5203bc6078
                                                                        • Instruction Fuzzy Hash: 77025537B005118FDF29C97C98E07EE7BE2EB86390F368425D852DB391E669CC458B91
                                                                        APIs
                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003B2E5A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileFindFirst
                                                                        • String ID:
                                                                        • API String ID: 1974802433-0
                                                                        • Opcode ID: 1bb1e25898d1df9c1c3784aa9b730b7ec2d9ecd1378f60cbc2b728c52e7f3d28
                                                                        • Instruction ID: 908bd9492ed7a0de1d24d437580f38e157168e10754f818dfd587cb3d762f289
                                                                        • Opcode Fuzzy Hash: 1bb1e25898d1df9c1c3784aa9b730b7ec2d9ecd1378f60cbc2b728c52e7f3d28
                                                                        • Instruction Fuzzy Hash: 8071E37190515C9FDF22AF28CC99AFFB7B8AB05308F1542DAE54CE7611DA318E849F14
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 003AAEEE
                                                                        • IsDebuggerPresent.KERNEL32 ref: 003AAFBA
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003AAFDA
                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 003AAFE4
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                        • String ID:
                                                                        • API String ID: 254469556-0
                                                                        • Opcode ID: 1ce12bdf51fe9a30602694db2b91a3928185d2e86c810d3cc2bc74146ab98b7e
                                                                        • Instruction ID: 2823a54181ac074d1fd1281f45b498ade62e9bfbc6ed402f054381b7d9db909f
                                                                        • Opcode Fuzzy Hash: 1ce12bdf51fe9a30602694db2b91a3928185d2e86c810d3cc2bc74146ab98b7e
                                                                        • Instruction Fuzzy Hash: 6A3125B5D052189BDB11EFA4D989BCDBBB8FF09304F1041AAE409AB250EB749A84DF45
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: {tc${tc${tc${tc
                                                                        • API String ID: 0-2617826781
                                                                        • Opcode ID: 0d6e3c0a18190507948e772782922fbe9860e2ddbe71389308fbe2ad94c1d688
                                                                        • Instruction ID: c352b99f4c0c177644e3c9d41d385a1fb792701a6531c40d75968f38b5565dc2
                                                                        • Opcode Fuzzy Hash: 0d6e3c0a18190507948e772782922fbe9860e2ddbe71389308fbe2ad94c1d688
                                                                        • Instruction Fuzzy Hash: E922783FB587914BCB188969D4C566FB6D3E7C9360F1EC52ED84AD7314EA38CC814682
                                                                        APIs
                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 003AD8C4
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 003AD8CE
                                                                        • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 003AD8DB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                        • String ID:
                                                                        • API String ID: 3906539128-0
                                                                        • Opcode ID: cf5bee81f1aa8af50bb68ec61f4d16c9d4f4045c48fa784ffbf9f9ba6f8de6df
                                                                        • Instruction ID: eeb237f24c62739064ca58ed24eec6afa3e0e72a187c5e738af1b773deb67b13
                                                                        • Opcode Fuzzy Hash: cf5bee81f1aa8af50bb68ec61f4d16c9d4f4045c48fa784ffbf9f9ba6f8de6df
                                                                        • Instruction Fuzzy Hash: 3F31B3759012189BCB22DF64D889BCDBBB8FF09310F5042EAE41CAA251EB749F818F45
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: vxN$vxN$vxN
                                                                        • API String ID: 0-1093492550
                                                                        • Opcode ID: 984b5b980a68bdcf2eb195ec59bc6557d6c8ab9b2e0a0b4ae22c7cb662540b46
                                                                        • Instruction ID: f56b44c99a1a36049adcac4a3eb49f93ed349473a019ff502cf3f4a53f437423
                                                                        • Opcode Fuzzy Hash: 984b5b980a68bdcf2eb195ec59bc6557d6c8ab9b2e0a0b4ae22c7cb662540b46
                                                                        • Instruction Fuzzy Hash: E102BD72A043108BCB258E2884E27AF77D6DBDA350F6F451EDDA6D7351D636CC448782
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: H$l$H$l$H$l
                                                                        • API String ID: 0-3261298715
                                                                        • Opcode ID: 25a31de418999fc3d5c76a5ef73437ccaec6211d72fa2396eec7efe24865f4d3
                                                                        • Instruction ID: c0a0a8d1909e5bea804696e5739c009f675af92d80e27d3dfc5587d367a32d08
                                                                        • Opcode Fuzzy Hash: 25a31de418999fc3d5c76a5ef73437ccaec6211d72fa2396eec7efe24865f4d3
                                                                        • Instruction Fuzzy Hash: CCF13379F011158FCF09CA68C8996EEB7F6EF96350F258529D805EB394C735DC868B80
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 1Np$1Np$1Np
                                                                        • API String ID: 0-1249163415
                                                                        • Opcode ID: 8a0824c6dcce070ea299444decbe3bb8c0a1fc24cd0a86b48092a5f9cb30fa5c
                                                                        • Instruction ID: d5cf5c970aa6b23a0f7bf20a59b1d039055267ae1cc7f08067f846bc3eff35af
                                                                        • Opcode Fuzzy Hash: 8a0824c6dcce070ea299444decbe3bb8c0a1fc24cd0a86b48092a5f9cb30fa5c
                                                                        • Instruction Fuzzy Hash: B4A1BC7BF98620CF4A22C4349995AEEB797E7F2320F2FC616DC019B7A8D9344D469740
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: L.o$M.o$M.o
                                                                        • API String ID: 0-3589445495
                                                                        • Opcode ID: 9b95102ca47ea0f3a99d6b39b773dab15cee944d183af5160929788537f5f579
                                                                        • Instruction ID: 66933e7ab57d43e52b41f7f436803c0dd64710550bb7ce0b56dee9d87c42b134
                                                                        • Opcode Fuzzy Hash: 9b95102ca47ea0f3a99d6b39b773dab15cee944d183af5160929788537f5f579
                                                                        • Instruction Fuzzy Hash: A6A1783B71C6024F9A1E862C8CEA2BF67CADB97314F35D91BE419C72A0D62DCD458742
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ^Go$^Go$^Go
                                                                        • API String ID: 0-3409708128
                                                                        • Opcode ID: 9ea80ed31a94056a74ef51ce006da34306be111fa88892b015e9d638b6db4c5d
                                                                        • Instruction ID: a45a927267a0a6d2f0beab8b81dca5aee8c4bd87cef0d88f181cba6082d95bce
                                                                        • Opcode Fuzzy Hash: 9ea80ed31a94056a74ef51ce006da34306be111fa88892b015e9d638b6db4c5d
                                                                        • Instruction Fuzzy Hash: B8918A3AB105104FCB1E8A3C9D956BB33D6EB6A320F25952AEC16CB7B0C729DD45C740
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2a44028f7e3e3eaa652dca7a844c7ffb5e660ad2257dd7053811bcd5b34df9a4
                                                                        • Instruction ID: e59bb3fa265c7825a74d7d3f9ecafe66e7dc7355b887d4138bcc1b00444e44e0
                                                                        • Opcode Fuzzy Hash: 2a44028f7e3e3eaa652dca7a844c7ffb5e660ad2257dd7053811bcd5b34df9a4
                                                                        • Instruction Fuzzy Hash: 9F715B3B7592004FDB1AC63859EA3FABBC6C7D3314F29C829E455CB351D926C9498341
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 7>fz$7>fz
                                                                        • API String ID: 0-2331933383
                                                                        • Opcode ID: e9c2f827d2aa911706d75cc8bd26ccbfdf419f4de3c7c12e507c5d219e633013
                                                                        • Instruction ID: b870454be3368f84348e3aee71b021bcdc7fb784b754dd0feb81803653ff8425
                                                                        • Opcode Fuzzy Hash: e9c2f827d2aa911706d75cc8bd26ccbfdf419f4de3c7c12e507c5d219e633013
                                                                        • Instruction Fuzzy Hash: 58D1483A71C2054B5E6D96386CE52BB37C7D7A3314F36D53ADE12CB295F9288C0A8381
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: +*A$+*A
                                                                        • API String ID: 0-1047222298
                                                                        • Opcode ID: 98e93810894981efb97f74ade65da74a45d4019118c56b477c99832eab724b89
                                                                        • Instruction ID: 50174743bfde598f162d3f34ec0011ecae6069b924356784c3eed419d3a70c3d
                                                                        • Opcode Fuzzy Hash: 98e93810894981efb97f74ade65da74a45d4019118c56b477c99832eab724b89
                                                                        • Instruction Fuzzy Hash: 9F518877309A14CBE70D0A68A8E57EFB6CBD3C6351F2F412E98064B391CE7A0C498780
                                                                        APIs
                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,003BA1BD,?,?,00000008,?,?,003B9D8F,00000000), ref: 003BA48F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionRaise
                                                                        • String ID:
                                                                        • API String ID: 3997070919-0
                                                                        • Opcode ID: 423a9d3ea2c158a2aa2eebccb68133c17cfcae6f77b45de1c26ff1ce1c64b842
                                                                        • Instruction ID: 2fc58a74e0f54f32f2d8d34bad43fdc6fc3cabe8916cb1b0519529a4a55aaec1
                                                                        • Opcode Fuzzy Hash: 423a9d3ea2c158a2aa2eebccb68133c17cfcae6f77b45de1c26ff1ce1c64b842
                                                                        • Instruction Fuzzy Hash: 21B15F35110A08DFD716CF28C48ABA57BE0FF45368F268659E9D9CF6A1C335D982CB41
                                                                        APIs
                                                                          • Part of subcall function 003B1D96: HeapAlloc.KERNEL32(00000008,?,?,?,003B0674,00000001,00000364,?,00000002,000000FF,?,003AC831,003C1C08,0000000C), ref: 003B1DD7
                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003B2E5A
                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 003B2F4E
                                                                        • FindClose.KERNEL32(00000000), ref: 003B2F8D
                                                                        • FindClose.KERNEL32(00000000), ref: 003B2FC0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Find$CloseFile$AllocFirstHeapNext
                                                                        • String ID:
                                                                        • API String ID: 2701053895-0
                                                                        • Opcode ID: aeb1d54c3196e74ef7471ea0c083ae7256271a3956bc6fece82f77490bc6ca7a
                                                                        • Instruction ID: e77564c1599be36880705b7571ca0d0620de4da339d46ab7b0f216ccec502159
                                                                        • Opcode Fuzzy Hash: aeb1d54c3196e74ef7471ea0c083ae7256271a3956bc6fece82f77490bc6ca7a
                                                                        • Instruction Fuzzy Hash: C551587590010CAFDF16AF289C95AFF77B9DF85308F14429DF919DBA01EA308D429B60
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 003AACB6
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FeaturePresentProcessor
                                                                        • String ID:
                                                                        • API String ID: 2325560087-0
                                                                        • Opcode ID: 9c098df244d7821096c23c370e86f845bfb7c9751e0d3f8b668daf3d0a9a2629
                                                                        • Instruction ID: be771acb2db95eda64314113e95656d7e699478c4f0ec8782f671baffb4dbe29
                                                                        • Opcode Fuzzy Hash: 9c098df244d7821096c23c370e86f845bfb7c9751e0d3f8b668daf3d0a9a2629
                                                                        • Instruction Fuzzy Hash: A051D1B2901A158FDB16CF58D991BAEBBF8FB49311F15882AC401EB361E374AD00CF91
                                                                        APIs
                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0000AFFD), ref: 003AAEDB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled
                                                                        • String ID:
                                                                        • API String ID: 3192549508-0
                                                                        • Opcode ID: 7308409926f99da2b70d069861f9d66851350d0eb002e03692adf65bf948cacb
                                                                        • Instruction ID: 1fbc9f28f0d03d7aced0f75221569ccb749556efb2ba527839776a37fc52638c
                                                                        • Opcode Fuzzy Hash: 7308409926f99da2b70d069861f9d66851350d0eb002e03692adf65bf948cacb
                                                                        • Instruction Fuzzy Hash:
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: HeapProcess
                                                                        • String ID:
                                                                        • API String ID: 54951025-0
                                                                        • Opcode ID: f4ac48632381c8c06fb03c44daf4f4272c3bfa286c4b6066b80f1de380ac1d5a
                                                                        • Instruction ID: 39ab4a0fc99571dc2304955b1f4204490bc6e7dde1a48456d2c1b69e97426e10
                                                                        • Opcode Fuzzy Hash: f4ac48632381c8c06fb03c44daf4f4272c3bfa286c4b6066b80f1de380ac1d5a
                                                                        • Instruction Fuzzy Hash: BFA02238202200CF83028F32AF08B0C3BECBA823C0F0AC02AA000C2230EB30A800BB00
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleFree
                                                                        • String ID:
                                                                        • API String ID: 771614528-0
                                                                        • Opcode ID: bb7b58f41873f8b8ca8ed974aca23fd67c709d9ae73ef0095888d68346d1c4ec
                                                                        • Instruction ID: c3b786170f4a685d8b824e7d90f1d02c56a482cc439fa3dc1d18648595f63a0b
                                                                        • Opcode Fuzzy Hash: bb7b58f41873f8b8ca8ed974aca23fd67c709d9ae73ef0095888d68346d1c4ec
                                                                        • Instruction Fuzzy Hash: 34126C36B052108FDB09CA2884E57EFBBD6DBD6310F69891DF849CB390D635CD498B82
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0235fc90bbeb351dbbab5a2aa36f50e76d719b5c5a4e8e88b9bbfda0f30a28bf
                                                                        • Instruction ID: 8c63e2e5175480802aeafc3e5a4b9723fbab6f591954a5daaa363832a66c1d86
                                                                        • Opcode Fuzzy Hash: 0235fc90bbeb351dbbab5a2aa36f50e76d719b5c5a4e8e88b9bbfda0f30a28bf
                                                                        • Instruction Fuzzy Hash: C9C18D3A7453108BCE2D85285CE43AF73D2DBD7391F2F851BD84AEB7A1C6258D498781
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ddd190f3208e94025636dba33192bf8b69b3ca64b726a0d1f7adb274054b7779
                                                                        • Instruction ID: f3df14c57724852d93a3de2e43f399fba6cea62a10172b7919bbcc0789e12087
                                                                        • Opcode Fuzzy Hash: ddd190f3208e94025636dba33192bf8b69b3ca64b726a0d1f7adb274054b7779
                                                                        • Instruction Fuzzy Hash: CE9129726083008B8B268E5D44E426FB7E6DBD6310F7F8C1EE4455B725C636CC46AB63
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 067a3d0d6be627b9d514b393094cc6b1ce4dde63318a3e0f0a0c8eb9bdd7bd92
                                                                        • Instruction ID: 7a8d4415a65a943ea0961f1d5ff033ecb302069c853309693ea151b50e6d2928
                                                                        • Opcode Fuzzy Hash: 067a3d0d6be627b9d514b393094cc6b1ce4dde63318a3e0f0a0c8eb9bdd7bd92
                                                                        • Instruction Fuzzy Hash: 77718E257187008BCA2A8A3485E56BF77C7CFD7354F79D42EE88AC7A61D635CC498B02
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 629ee122ddbae890712c2540ae6372c74d7253facc6c088cf20c56a80e91cf48
                                                                        • Instruction ID: ce0df4b63a2053c673c23d4d776333cfe68a66a70669325a095d00e6f94032ad
                                                                        • Opcode Fuzzy Hash: 629ee122ddbae890712c2540ae6372c74d7253facc6c088cf20c56a80e91cf48
                                                                        • Instruction Fuzzy Hash: 5E719E367057014FCF199A2CC8D45AFB7D6EB52360F69982AE851CB361D638CC498B93
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 24a2b5d5bd71c4730ed96fc13e48f98ea8bc475df0a9062a061f36b8b3a35d13
                                                                        • Instruction ID: a8dddd070e3edff9f6d02e28dcd0633982975e6e03dfa62a666a37802fcbb979
                                                                        • Opcode Fuzzy Hash: 24a2b5d5bd71c4730ed96fc13e48f98ea8bc475df0a9062a061f36b8b3a35d13
                                                                        • Instruction Fuzzy Hash: 52616A3BB111205BDB0D852898F27FEB797DBCB750B29812EDC1797694CA3B1D058781
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: af32fa27dad53b65365fbc8cf3736d7ac8a0e3a2417614ae9ade1a2a413db22b
                                                                        • Instruction ID: 3f24143256889961e80b0bf6e14eee35dbb334828bc9a0aaa8fb559c39f035de
                                                                        • Opcode Fuzzy Hash: af32fa27dad53b65365fbc8cf3736d7ac8a0e3a2417614ae9ade1a2a413db22b
                                                                        • Instruction Fuzzy Hash: 726177377151104FA709C9299CA63FF37CBDBD2355F2AD42AE446CB6A4DA29C80AC740
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 61a0a7aa7986cf74906728acec369e60d8a367b443e54379726f69956bcfc3b1
                                                                        • Instruction ID: cdc3c279451333726881d6811acf8023368aa244c99f25bfd70ce9b1351d05bd
                                                                        • Opcode Fuzzy Hash: 61a0a7aa7986cf74906728acec369e60d8a367b443e54379726f69956bcfc3b1
                                                                        • Instruction Fuzzy Hash: 21617A7B3556040B9A099A359CE57BF77D7DBD2360F1EC12AD91A0BAA0E936480AC240
                                                                        APIs
                                                                        • type_info::operator==.LIBVCRUNTIME ref: 003AF839
                                                                        • ___TypeMatch.LIBVCRUNTIME ref: 003AF947
                                                                        • CatchIt.LIBVCRUNTIME ref: 003AF998
                                                                        • _UnwindNestedFrames.LIBCMT ref: 003AFA99
                                                                        • CallUnexpected.LIBVCRUNTIME ref: 003AFAB4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                        • String ID: csm$csm$csm
                                                                        • API String ID: 4119006552-393685449
                                                                        • Opcode ID: 14dcc128d191100ad6e646310eecaffd7e889d2a5733f3ed86f3c846528022c0
                                                                        • Instruction ID: e90c4ffc183a251b2e193e9fefe23b9d5c022a813978e961f4a9bec3e7972136
                                                                        • Opcode Fuzzy Hash: 14dcc128d191100ad6e646310eecaffd7e889d2a5733f3ed86f3c846528022c0
                                                                        • Instruction Fuzzy Hash: F3B14A71800209EFCF2AEFE4D8819AEB7B9FF1A310F15416AE8156B212D735DA51CF91
                                                                        APIs
                                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 003A82F2
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ___std_exception_destroy
                                                                        • String ID: ~\Ya$~\Ya$~\Ya$\a=$\a=
                                                                        • API String ID: 4194217158-2811050778
                                                                        • Opcode ID: ad8045904f14d6202ea3f3b2784ae72f79549a10b058e9c4f2eeb80343506969
                                                                        • Instruction ID: 2d32becf84185ff0952b9da6f2fd4c280ac33dafffb9205b157f61678704206f
                                                                        • Opcode Fuzzy Hash: ad8045904f14d6202ea3f3b2784ae72f79549a10b058e9c4f2eeb80343506969
                                                                        • Instruction Fuzzy Hash: 3F319D7F600605CB9E1E4A3C6DF52AF77C5EF66711B2A4D37D515CB180EA21CC4A8782
                                                                        APIs
                                                                        • _ValidateLocalCookies.LIBCMT ref: 003ABBB7
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 003ABBBF
                                                                        • _ValidateLocalCookies.LIBCMT ref: 003ABC48
                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 003ABC73
                                                                        • _ValidateLocalCookies.LIBCMT ref: 003ABCC8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                        • String ID: csm
                                                                        • API String ID: 1170836740-1018135373
                                                                        • Opcode ID: a14f1a264e332a834035de1c639a35508037cb87504bdecfda2ea1268019ea96
                                                                        • Instruction ID: ad15a05255062e244fcec0b55791367d3c54daf773f8d1c74113f6b579e948e8
                                                                        • Opcode Fuzzy Hash: a14f1a264e332a834035de1c639a35508037cb87504bdecfda2ea1268019ea96
                                                                        • Instruction Fuzzy Hash: 6D41B534A00208AFCF16EF68C845E9EFBA9FF06324F148155E915AB353DB31DA11CB91
                                                                        APIs
                                                                        • GetCPInfo.KERNEL32(00270550,00270550,00000000,7FFFFFFF,?,003B8376,00270550,00270550,00000000,00270550,?,?,?,?,00270550,00000000), ref: 003B8431
                                                                        • __freea.LIBCMT ref: 003B85C6
                                                                        • __freea.LIBCMT ref: 003B85CC
                                                                        • __freea.LIBCMT ref: 003B8602
                                                                        • __freea.LIBCMT ref: 003B8608
                                                                        • __freea.LIBCMT ref: 003B8618
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$Info
                                                                        • String ID:
                                                                        • API String ID: 541289543-0
                                                                        • Opcode ID: 0ceb19ea42538a4b8490c6946a5fb85e2de926f0dedadead4c829ad0b65276fb
                                                                        • Instruction ID: f06b1c3ba3338b7b223407d061d45b4210f0936f02068675d043fe1102809c9d
                                                                        • Opcode Fuzzy Hash: 0ceb19ea42538a4b8490c6946a5fb85e2de926f0dedadead4c829ad0b65276fb
                                                                        • Instruction Fuzzy Hash: BD71B372A0020AAADF239F548C42FEF77AD9F45318F160155EB45ABA42EF75DC01C760
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,003AEE8A,003AB95D,003AB041), ref: 003AEEA1
                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 003AEEAF
                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003AEEC8
                                                                        • SetLastError.KERNEL32(00000000,003AEE8A,003AB95D,003AB041), ref: 003AEF1A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastValue___vcrt_
                                                                        • String ID:
                                                                        • API String ID: 3852720340-0
                                                                        • Opcode ID: 5d0956da1b612fc5d39b6c2d6453906e3929ebeecdff6c08fb0c971170b8e81e
                                                                        • Instruction ID: 0c6484403986e18369648ab9db4f6ca6b163a105e05acf06c1f7b0cd4f4f0b96
                                                                        • Opcode Fuzzy Hash: 5d0956da1b612fc5d39b6c2d6453906e3929ebeecdff6c08fb0c971170b8e81e
                                                                        • Instruction Fuzzy Hash: DF01F73A2097116EA7272BB47CC5EAB3B9CEB03779B210329F6108A5F1FF119C109690
                                                                        Strings
                                                                        • C:\Users\user\Desktop\file.exe, xrefs: 003B30FF
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: C:\Users\user\Desktop\file.exe
                                                                        • API String ID: 0-517116171
                                                                        • Opcode ID: ce0fe7ae97002f8d1248f9527746ce5521deddbdb974c87bd8882dba064e0fb1
                                                                        • Instruction ID: 48767d1808b01f44def465f8b0ae0ccf46db1acd3805a9fea53f45f408a8fded
                                                                        • Opcode Fuzzy Hash: ce0fe7ae97002f8d1248f9527746ce5521deddbdb974c87bd8882dba064e0fb1
                                                                        • Instruction Fuzzy Hash: 6621D171604229AFDB22BF69CC809EBB7ADAF0432D7414528FA25CBD11D730FE008760
                                                                        APIs
                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,7EAEDD2A,?,?,00000000,003BA898,000000FF,?,003ACA21,00000002,?,003ACABD,003ADE85), ref: 003AC995
                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 003AC9A7
                                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,003BA898,000000FF,?,003ACA21,00000002,?,003ACABD,003ADE85), ref: 003AC9C9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 4061214504-1276376045
                                                                        • Opcode ID: cdedc64ade9b3425fb1dc7da3c47fda0cef7f5e21aab8f660635a24338a50b1d
                                                                        • Instruction ID: 06c7efc5e3f389f3b0a573f092d79441ddc1ee855aad0e427a0426641a80fab7
                                                                        • Opcode Fuzzy Hash: cdedc64ade9b3425fb1dc7da3c47fda0cef7f5e21aab8f660635a24338a50b1d
                                                                        • Instruction Fuzzy Hash: B801A236914625AFCB138B50CC09FEEBBBCFB06B14F004529E811E2690DB74A900CB80
                                                                        APIs
                                                                        • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,003AFA45,?,?,00000000,00000000,00000000,?), ref: 003AFB64
                                                                        • CatchIt.LIBVCRUNTIME ref: 003AFC4A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CatchEncodePointer
                                                                        • String ID: MOC$RCC
                                                                        • API String ID: 1435073870-2084237596
                                                                        • Opcode ID: 3f13e16aa179eb94ffd5b068f54f39b35d1799278454a2a3d465b0ea076fe6ae
                                                                        • Instruction ID: 27d70a524cfc03c32fe209ea526cd01f7df0262d419d6528aeb55147ad0d5a91
                                                                        • Opcode Fuzzy Hash: 3f13e16aa179eb94ffd5b068f54f39b35d1799278454a2a3d465b0ea076fe6ae
                                                                        • Instruction Fuzzy Hash: C2416772900209AFCF16DF98CD81EEEBBB5FF4A314F198169F905AB221D3359950DB50
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Cnd_broadcastCurrentMtx_unlockThread
                                                                        • String ID: 8C<
                                                                        • API String ID: 2021000804-553782651
                                                                        • Opcode ID: e18fdac4b0105022bbc62bd2ec3824afdabdfe92615a3978c493b0ffae5cc844
                                                                        • Instruction ID: 0e20e2ff773730ba99e2b7d881a86bc6b79963a19163447130224ac2af29d90a
                                                                        • Opcode Fuzzy Hash: e18fdac4b0105022bbc62bd2ec3824afdabdfe92615a3978c493b0ffae5cc844
                                                                        • Instruction Fuzzy Hash: E701F13B600F02DFDF239BA5C45079AB3A5EF02311F46092DE8869B280D7B0AC10CB92
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,003B57BD,00000000,?,003C4D00,?,?,?,003B56F4,00000004,InitializeCriticalSectionEx,003BC714,003BC71C), ref: 003B572E
                                                                        • GetLastError.KERNEL32(?,003B57BD,00000000,?,003C4D00,?,?,?,003B56F4,00000004,InitializeCriticalSectionEx,003BC714,003BC71C,00000000,?,003AFD6C), ref: 003B5738
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 003B5760
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad$ErrorLast
                                                                        • String ID: api-ms-
                                                                        • API String ID: 3177248105-2084034818
                                                                        • Opcode ID: e0f716d28df304308ee5a98432e30f154c75d73a4a71dd1f3e5c0c37373686fb
                                                                        • Instruction ID: 385995511e411e6a8730a00b3fc39903d344ef12ed03da00a36440acb55a2853
                                                                        • Opcode Fuzzy Hash: e0f716d28df304308ee5a98432e30f154c75d73a4a71dd1f3e5c0c37373686fb
                                                                        • Instruction Fuzzy Hash: DBE01231780244F7EB122B60ED06F993A99AB11B49F144020FA0CE88A2DBA6E9109644
                                                                        APIs
                                                                        • GetConsoleOutputCP.KERNEL32(7EAEDD2A,00000000,00000000,?), ref: 003B625A
                                                                          • Part of subcall function 003B36C0: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,003B5BE8,?,00000000,-00000008), ref: 003B3721
                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 003B64AC
                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 003B64F2
                                                                        • GetLastError.KERNEL32 ref: 003B6595
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                        • String ID:
                                                                        • API String ID: 2112829910-0
                                                                        • Opcode ID: efacc886b612fdd416f15e107eed54afb2a7e97c026857f91c1af623269e3ac2
                                                                        • Instruction ID: 8a277544f066ab1cd80adc4842b84e5c1011d85459bd5c5f86b01f2191ce30ae
                                                                        • Opcode Fuzzy Hash: efacc886b612fdd416f15e107eed54afb2a7e97c026857f91c1af623269e3ac2
                                                                        • Instruction Fuzzy Hash: 37D1AEB5D006489FCF16CFA8C8819EDBBB8FF09318F18452AE526EB752D734A951CB50
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AdjustPointer
                                                                        • String ID:
                                                                        • API String ID: 1740715915-0
                                                                        • Opcode ID: 222c4922fc33d5dcbd2ca09ee33975c2d3eee8e4e4a2447418e587c32618fe64
                                                                        • Instruction ID: 6f91fd85f498c9880e09f3da10c0fd53604656d1a3fe33d32d758b63fe7fba6a
                                                                        • Opcode Fuzzy Hash: 222c4922fc33d5dcbd2ca09ee33975c2d3eee8e4e4a2447418e587c32618fe64
                                                                        • Instruction Fuzzy Hash: E951DE72A01606AFDB2B9F90D941BBAB3A4EF03710F15413DE8059B2B1E735EC40DB90
                                                                        APIs
                                                                          • Part of subcall function 003B36C0: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,003B5BE8,?,00000000,-00000008), ref: 003B3721
                                                                        • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,003B2EED,?,?,?,00000000), ref: 003B2BAB
                                                                        • __dosmaperr.LIBCMT ref: 003B2BB2
                                                                        • GetLastError.KERNEL32(00000000,003B2EED,?,?,00000000,?,?,?,00000000,00000000,?,003B2EED,?,?,?,00000000), ref: 003B2BEC
                                                                        • __dosmaperr.LIBCMT ref: 003B2BF3
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 1913693674-0
                                                                        • Opcode ID: 6f92817fac4f4fa151f4fbd984750c029b0b61e1dd30e92c848dc67477e05ca9
                                                                        • Instruction ID: bc929b5a1223448e07b095fd48b2c8e360d4c3ebe60bc7dde3b79d14328b004d
                                                                        • Opcode Fuzzy Hash: 6f92817fac4f4fa151f4fbd984750c029b0b61e1dd30e92c848dc67477e05ca9
                                                                        • Instruction Fuzzy Hash: F821A171600215AF9B22AF6198819EBBBACFF0436C7518619FA159BD11EB31EC0087A0
                                                                        APIs
                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 003B37C4
                                                                          • Part of subcall function 003B36C0: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,003B5BE8,?,00000000,-00000008), ref: 003B3721
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 003B37FC
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 003B381C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 158306478-0
                                                                        • Opcode ID: 62a3f45d873e9a4c39292aa79fb26b09648639df72b76d22dc3fe35e220838d4
                                                                        • Instruction ID: 52a3a578d507eacd8dc5b468f836c3fd7943d0636eb80732d605b9a62a52cc80
                                                                        • Opcode Fuzzy Hash: 62a3f45d873e9a4c39292aa79fb26b09648639df72b76d22dc3fe35e220838d4
                                                                        • Instruction Fuzzy Hash: 111126F5900229BFA72327B15C8DCFF2A5CCE853AD7110025FB01D5902EA20DF0482B2
                                                                        APIs
                                                                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,003B8331,00000000,00000001,00000000,?,?,003B65E9,?,00000000,00000000), ref: 003B8AA7
                                                                        • GetLastError.KERNEL32(?,003B8331,00000000,00000001,00000000,?,?,003B65E9,?,00000000,00000000,?,?,?,003B5F2F,00000000), ref: 003B8AB3
                                                                          • Part of subcall function 003B8B04: CloseHandle.KERNEL32(FFFFFFFE,003B8AC3,?,003B8331,00000000,00000001,00000000,?,?,003B65E9,?,00000000,00000000,?,?), ref: 003B8B14
                                                                        • ___initconout.LIBCMT ref: 003B8AC3
                                                                          • Part of subcall function 003B8AE5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,003B8A81,003B831E,?,?,003B65E9,?,00000000,00000000,?), ref: 003B8AF8
                                                                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,003B8331,00000000,00000001,00000000,?,?,003B65E9,?,00000000,00000000,?), ref: 003B8AD8
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                        • String ID:
                                                                        • API String ID: 2744216297-0
                                                                        • Opcode ID: 0a1ed983d7cb47cf05e68bed2981f4f7dbf54bf251ca5b852149429797625675
                                                                        • Instruction ID: 7dce5a1d115410e8847c863df314e4b9bf347d4f43a291e44cf59060fb7f56dc
                                                                        • Opcode Fuzzy Hash: 0a1ed983d7cb47cf05e68bed2981f4f7dbf54bf251ca5b852149429797625675
                                                                        • Instruction Fuzzy Hash: 38F01C36400158BBCF232FA2DC08DCA3F6AFF093A5F114414FA09D5921CA729920EB90
                                                                        APIs
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 003AF3BC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ___except_validate_context_record
                                                                        • String ID: csm$csm
                                                                        • API String ID: 3493665558-3733052814
                                                                        • Opcode ID: 643ea4e8ec1e0df71fb3a56e378134e4906b46b5809f9296df6b74d030adc28b
                                                                        • Instruction ID: eb6bd1248499873b435cff12ca311df82f973820f6702b84a1d8489f5a3bfe52
                                                                        • Opcode Fuzzy Hash: 643ea4e8ec1e0df71fb3a56e378134e4906b46b5809f9296df6b74d030adc28b
                                                                        • Instruction Fuzzy Hash: F631D3325002149FCF279FE6C8419AB7B66FF4E325B19867AFD444A121C336CC62DB91
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(003C4D20), ref: 003B00B8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2015751467.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000000.00000002.2015739396.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015767545.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015780142.00000000003C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015831435.00000000003C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2015953790.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2016073307.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: M<$xM<
                                                                        • API String ID: 3664257935-2597119641
                                                                        • Opcode ID: 60b9c0b95b931abf3d2b31a30d36cd30b9b85bbd58d93ed5c6610495f42da926
                                                                        • Instruction ID: 892066db1857b7ab4c803c6a4808681f0674dd8ca8ef230d2b36e92f51deabfa
                                                                        • Opcode Fuzzy Hash: 60b9c0b95b931abf3d2b31a30d36cd30b9b85bbd58d93ed5c6610495f42da926
                                                                        • Instruction Fuzzy Hash: CAE08636C116189BDB373E08D408BD276D85B5133AF17052AD5DD525A192B11CD1C781

                                                                        Execution Graph

                                                                        Execution Coverage:4.9%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:12.8%
                                                                        Total number of Nodes:382
                                                                        Total number of Limit Nodes:8
                                                                        execution_graph 13249 402282 InitializeCriticalSectionAndSpinCount 13250 4022a1 13249->13250 13251 4022a6 CreateMutexA 13249->13251 13252 4022c2 GetLastError 13251->13252 13253 402705 ExitProcess 13251->13253 13252->13253 13254 4022d3 13252->13254 13327 403c5f 13254->13327 13256 4026dc DeleteCriticalSection 13256->13253 13257 4022de 13257->13256 13331 404871 13257->13331 13260 4026d4 13261 4035c3 2 API calls 13260->13261 13261->13256 13267 40236d 13354 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13267->13354 13269 40237c 13355 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13269->13355 13271 40266c 13420 403e03 EnterCriticalSection 13271->13420 13273 402685 13433 4035c3 13273->13433 13274 40238b 13274->13271 13356 40475f GetModuleHandleA 13274->13356 13278 4023ed 13278->13271 13359 401fba GetUserDefaultUILanguage 13278->13359 13279 4035c3 2 API calls 13281 40269d 13279->13281 13283 4035c3 2 API calls 13281->13283 13285 4026a8 13283->13285 13284 402441 13284->13250 13288 40246a ExitProcess 13284->13288 13291 402472 13284->13291 13287 4035c3 2 API calls 13285->13287 13286 40475f 2 API calls 13286->13284 13289 4026b3 13287->13289 13289->13260 13436 4053f8 13289->13436 13292 40249f ExitProcess 13291->13292 13293 4024a7 13291->13293 13294 4024d4 ExitProcess 13293->13294 13295 4024dc 13293->13295 13370 404c2d 13295->13370 13303 4025bf 13450 4052c4 13303->13450 13304 4025ac 13305 403668 11 API calls 13304->13305 13305->13303 13307 4025d0 13308 4052c4 4 API calls 13307->13308 13309 4025de 13308->13309 13310 4052c4 4 API calls 13309->13310 13311 4025ee 13310->13311 13312 4052c4 4 API calls 13311->13312 13313 4025fd 13312->13313 13314 4052c4 4 API calls 13313->13314 13315 40260d 13314->13315 13316 4052c4 4 API calls 13315->13316 13317 40261c 13316->13317 13454 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13317->13454 13319 402626 13320 40263f 13319->13320 13321 40262f GetModuleFileNameW 13319->13321 13322 4052c4 4 API calls 13320->13322 13321->13320 13323 402659 13322->13323 13324 4052c4 4 API calls 13323->13324 13325 402664 13324->13325 13326 4035c3 2 API calls 13325->13326 13326->13271 13328 403c67 13327->13328 13455 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13328->13455 13330 403c72 13330->13257 13332 40475f 2 API calls 13331->13332 13333 40489d 13332->13333 13334 4052c4 4 API calls 13333->13334 13339 402310 13333->13339 13335 4048b3 13334->13335 13336 4052c4 4 API calls 13335->13336 13337 4048be 13336->13337 13338 4052c4 4 API calls 13337->13338 13338->13339 13339->13260 13340 403668 13339->13340 13456 402c95 13340->13456 13343 4048d6 13344 4048eb VirtualAlloc 13343->13344 13347 402351 13343->13347 13345 40490a 13344->13345 13344->13347 13346 40475f 2 API calls 13345->13346 13348 40492c 13346->13348 13347->13260 13353 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13347->13353 13348->13347 13349 40495b GetCurrentProcess IsWow64Process 13348->13349 13351 4052c4 4 API calls 13349->13351 13352 404985 13351->13352 13352->13347 13353->13267 13354->13269 13355->13274 13357 40477d LoadLibraryA 13356->13357 13358 40478a 13356->13358 13357->13358 13358->13278 13360 40202d 13359->13360 13361 403668 11 API calls 13360->13361 13362 402065 13361->13362 13363 403668 11 API calls 13362->13363 13364 402074 GetKeyboardLayoutList 13363->13364 13365 4020cf 13364->13365 13369 40208e 13364->13369 13366 403668 11 API calls 13365->13366 13367 4020db 13366->13367 13367->13284 13367->13286 13368 403668 11 API calls 13368->13369 13369->13365 13369->13368 13371 404c43 13370->13371 13372 4024f5 CreateThread CreateThread WaitForMultipleObjects 13370->13372 13373 40475f 2 API calls 13371->13373 13397 401a6c 13372->13397 13680 401dc9 13372->13680 13696 40522a 13372->13696 13374 404c74 13373->13374 13374->13372 13375 40475f 2 API calls 13374->13375 13376 404c89 13375->13376 13376->13372 13377 404c91 KiUserCallbackDispatcher GetSystemMetrics 13376->13377 13378 404cb6 13377->13378 13379 404cdc GetDC 13378->13379 13379->13372 13380 404cf0 GetCurrentObject 13379->13380 13381 404ea2 ReleaseDC 13380->13381 13382 404d03 GetObjectW 13380->13382 13381->13372 13382->13381 13383 404d1a 13382->13383 13384 403668 11 API calls 13383->13384 13385 404d3a DeleteObject CreateCompatibleDC 13384->13385 13385->13381 13386 404daf CreateDIBSection 13385->13386 13387 404dd0 SelectObject 13386->13387 13388 404e9b DeleteDC 13386->13388 13389 404de0 BitBlt 13387->13389 13390 404e94 DeleteObject 13387->13390 13388->13381 13389->13390 13391 404e05 13389->13391 13390->13388 13484 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13391->13484 13393 404e10 13393->13390 13394 403e03 10 API calls 13393->13394 13395 404e89 13394->13395 13396 4035c3 2 API calls 13395->13396 13396->13390 13398 401a7a 13397->13398 13402 401ab3 13397->13402 13400 401a96 13398->13400 13485 401000 13398->13485 13401 401000 57 API calls 13400->13401 13400->13402 13401->13402 13403 4020e1 13402->13403 13663 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13403->13663 13405 402190 GetCurrentHwProfileA 13406 4021a4 13405->13406 13407 4021ba GetSystemInfo 13405->13407 13408 403668 11 API calls 13406->13408 13409 403668 11 API calls 13407->13409 13411 4021b7 13408->13411 13412 4021dc 13409->13412 13410 402106 13410->13405 13411->13407 13413 4035c3 2 API calls 13412->13413 13414 4021e6 GlobalMemoryStatusEx 13413->13414 13415 403668 11 API calls 13414->13415 13418 402215 13415->13418 13416 402268 EnumDisplayDevicesA 13417 40227b ObtainUserAgentString 13416->13417 13416->13418 13417->13303 13417->13304 13418->13416 13419 403668 11 API calls 13418->13419 13419->13418 13421 403f31 LeaveCriticalSection 13420->13421 13422 403e25 13420->13422 13421->13273 13422->13421 13664 403da9 WideCharToMultiByte 13422->13664 13426 403e79 13671 406d0e 13426->13671 13428 403e83 13429 4035c3 2 API calls 13428->13429 13430 403edc 13429->13430 13431 4035c3 2 API calls 13430->13431 13432 403f2c 13431->13432 13432->13421 13434 402692 13433->13434 13435 4035c7 GetProcessHeap RtlFreeHeap 13433->13435 13434->13279 13435->13434 13437 40475f 2 API calls 13436->13437 13438 40547b 13437->13438 13439 4054fc socket 13438->13439 13440 405483 13438->13440 13439->13440 13441 405520 13439->13441 13440->13289 13442 405540 connect 13441->13442 13443 4055b3 closesocket 13441->13443 13444 4055a6 Sleep 13442->13444 13445 405557 send 13442->13445 13443->13440 13444->13441 13445->13444 13446 405579 send 13445->13446 13446->13444 13447 405595 13446->13447 13448 4035c3 2 API calls 13447->13448 13449 4055a0 13448->13449 13449->13443 13452 4052e7 13450->13452 13453 405313 13450->13453 13452->13453 13679 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13452->13679 13453->13307 13454->13319 13455->13330 13457 402ca5 13456->13457 13467 402cb3 13456->13467 13468 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13457->13468 13459 402d03 13461 402336 13459->13461 13479 405281 13459->13479 13461->13343 13462 4030c3 13463 4035c3 2 API calls 13462->13463 13463->13461 13465 402eb6 WideCharToMultiByte 13465->13467 13466 402f3e WideCharToMultiByte 13466->13467 13467->13459 13467->13465 13467->13466 13469 402a1e 13467->13469 13468->13467 13470 402a36 13469->13470 13471 402c71 13470->13471 13472 402a5d 13470->13472 13476 402a6f __aulldvrm 13470->13476 13473 402c77 WideCharToMultiByte 13471->13473 13471->13476 13474 402a66 13472->13474 13477 402c0a 13472->13477 13473->13476 13474->13476 13478 402bd2 WideCharToMultiByte 13474->13478 13475 402c32 IsDBCSLeadByte 13475->13477 13476->13467 13477->13475 13477->13476 13478->13474 13480 40529c 13479->13480 13481 405292 13479->13481 13480->13462 13483 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13481->13483 13483->13480 13484->13393 13486 40141c 13485->13486 13487 40101e 13485->13487 13486->13400 13487->13486 13522 404108 GetFileAttributesW 13487->13522 13489 401035 13489->13486 13523 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13489->13523 13491 401049 13524 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13491->13524 13493 401052 13499 4013df 13493->13499 13525 40368d 13493->13525 13494 4035c3 2 API calls 13496 401415 13494->13496 13498 4035c3 2 API calls 13496->13498 13498->13486 13499->13494 13500 4013c7 FindNextFileW 13500->13499 13503 401173 13500->13503 13501 40368d 7 API calls 13501->13503 13503->13500 13503->13501 13504 403f43 41 API calls 13503->13504 13508 4035c3 GetProcessHeap RtlFreeHeap 13503->13508 13511 4016ef EnterCriticalSection 13503->13511 13516 403e03 10 API calls 13503->13516 13518 40134d 13503->13518 13521 401000 53 API calls 13503->13521 13528 4044f7 13503->13528 13560 403729 13503->13560 13564 401aef 13503->13564 13572 401d21 13503->13572 13579 401c32 13503->13579 13616 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13503->13616 13504->13503 13508->13503 13510 404145 15 API calls 13510->13518 13590 404eb2 13511->13590 13515 403f87 43 API calls 13515->13518 13516->13503 13518->13503 13518->13510 13518->13515 13519 40368d 7 API calls 13518->13519 13582 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13518->13582 13583 403f43 13518->13583 13519->13518 13521->13503 13522->13489 13523->13491 13524->13493 13617 403111 13525->13617 13625 404108 GetFileAttributesW 13528->13625 13530 404509 13531 404758 13530->13531 13626 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13530->13626 13531->13503 13533 40451f 13534 404750 13533->13534 13535 40368d 7 API calls 13533->13535 13536 4035c3 2 API calls 13534->13536 13537 40453c 13535->13537 13536->13531 13538 40455a EnterCriticalSection 13537->13538 13539 4045c4 LeaveCriticalSection 13538->13539 13540 4045dd 13539->13540 13541 404626 13539->13541 13540->13541 13542 4045fa 13540->13542 13541->13534 13543 404649 EnterCriticalSection 13541->13543 13628 404377 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 13542->13628 13545 404680 LeaveCriticalSection 13543->13545 13547 404698 13545->13547 13548 40471c EnterCriticalSection 13545->13548 13627 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13547->13627 13554 404745 LeaveCriticalSection 13548->13554 13549 404603 13551 4035c3 2 API calls 13549->13551 13553 40460b 13551->13553 13552 4046a2 13552->13548 13557 4046bf EnterCriticalSection 13552->13557 13555 4044f7 29 API calls 13553->13555 13554->13534 13556 40461f 13555->13556 13556->13531 13558 404700 LeaveCriticalSection 13557->13558 13558->13548 13559 404714 13558->13559 13559->13548 13561 40373d 13560->13561 13563 403741 13561->13563 13649 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13561->13649 13563->13503 13565 401b07 13564->13565 13567 401b0c 13564->13567 13650 401aba 13565->13650 13571 401b11 13567->13571 13653 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13567->13653 13569 401b40 13569->13571 13654 401adc 13569->13654 13571->13503 13573 40475f 2 API calls 13572->13573 13574 401d5a 13573->13574 13575 401d87 13574->13575 13576 401d6a CryptUnprotectData 13574->13576 13575->13503 13576->13575 13577 401d92 13576->13577 13577->13575 13578 401d99 CryptProtectData 13577->13578 13578->13575 13658 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13579->13658 13581 401c58 13581->13503 13582->13518 13584 4044f7 37 API calls 13583->13584 13585 403f59 13584->13585 13586 403f78 13585->13586 13588 403e03 10 API calls 13585->13588 13587 4035c3 2 API calls 13586->13587 13589 403f81 13587->13589 13588->13586 13589->13518 13591 404f15 13590->13591 13592 404ed4 13590->13592 13601 40170b LeaveCriticalSection 13591->13601 13659 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13591->13659 13593 40368d 7 API calls 13592->13593 13596 404f0b 13593->13596 13595 404f35 13660 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13595->13660 13661 404108 GetFileAttributesW 13596->13661 13599 404f3f 13600 40368d 7 API calls 13599->13600 13602 404f4d FindFirstFileW 13600->13602 13601->13503 13603 40520e 13602->13603 13608 404f6a 13602->13608 13604 4035c3 2 API calls 13603->13604 13605 405215 13604->13605 13606 4035c3 2 API calls 13605->13606 13606->13601 13607 4051f6 FindNextFileW 13607->13603 13607->13608 13608->13607 13609 40368d 7 API calls 13608->13609 13610 40500f EnterCriticalSection 13608->13610 13614 404eb2 41 API calls 13608->13614 13615 403f43 41 API calls 13608->13615 13662 404108 GetFileAttributesW 13608->13662 13609->13608 13612 404eb2 41 API calls 13610->13612 13613 40502a LeaveCriticalSection 13612->13613 13613->13607 13614->13608 13615->13608 13616->13503 13623 40311d 13617->13623 13618 401156 FindFirstFileW 13618->13499 13618->13503 13619 402a1e 3 API calls 13619->13623 13620 40332a IsDBCSLeadByte 13621 403337 MultiByteToWideChar 13620->13621 13620->13623 13621->13623 13622 403395 IsDBCSLeadByte 13622->13623 13623->13618 13623->13619 13623->13620 13623->13622 13624 4033b6 MultiByteToWideChar 13623->13624 13624->13623 13625->13530 13626->13533 13627->13552 13629 4043bc 13628->13629 13630 4044ee 13628->13630 13629->13630 13642 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13629->13642 13630->13541 13630->13549 13632 4044d2 13634 4035c3 2 API calls 13632->13634 13633 4043d0 13636 404408 13633->13636 13643 4037f9 13633->13643 13634->13630 13636->13632 13637 40442a OpenProcess 13636->13637 13639 4044b7 CloseHandle 13636->13639 13640 404487 CloseHandle GetCurrentProcess DuplicateHandle 13636->13640 13641 4044d4 CloseHandle CloseHandle 13636->13641 13637->13636 13638 404440 GetCurrentProcess DuplicateHandle 13637->13638 13638->13636 13638->13639 13639->13636 13640->13636 13640->13639 13641->13632 13642->13633 13644 403803 13643->13644 13645 403810 13644->13645 13646 403819 GetProcessHeap HeapReAlloc 13644->13646 13647 4035c3 2 API calls 13645->13647 13646->13646 13648 403815 13646->13648 13647->13648 13648->13633 13649->13563 13657 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13650->13657 13652 401ac4 13652->13567 13652->13652 13653->13569 13655 4035c3 2 API calls 13654->13655 13656 401ae7 13655->13656 13656->13571 13657->13652 13658->13581 13659->13595 13660->13599 13661->13591 13662->13608 13663->13410 13665 403dd4 13664->13665 13666 403dfd 13664->13666 13674 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13665->13674 13666->13421 13670 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13666->13670 13668 403ddc 13668->13666 13669 403de2 WideCharToMultiByte 13668->13669 13669->13666 13670->13426 13675 406de8 13671->13675 13673 406d19 13673->13428 13674->13668 13678 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13675->13678 13677 406df0 13677->13673 13678->13677 13679->13452 13681 401de1 13680->13681 13682 401fb2 13680->13682 13681->13682 13683 40368d 7 API calls 13681->13683 13684 401e02 FindFirstFileW 13683->13684 13684->13682 13685 401e21 13684->13685 13704 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13685->13704 13687 401e2b 13688 401f8e FindNextFileW 13687->13688 13692 4035c3 2 API calls 13687->13692 13693 401dc9 41 API calls 13687->13693 13694 40368d 7 API calls 13687->13694 13695 403f43 41 API calls 13687->13695 13705 404118 13687->13705 13688->13687 13689 401fa9 13688->13689 13690 4035c3 2 API calls 13689->13690 13690->13682 13692->13687 13693->13687 13694->13687 13695->13687 13697 405238 13696->13697 13698 405279 13696->13698 13715 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13697->13715 13700 405242 13701 404eb2 45 API calls 13700->13701 13702 405272 13700->13702 13701->13700 13703 4035c3 2 API calls 13702->13703 13703->13698 13704->13687 13707 404120 13705->13707 13706 404132 13706->13687 13707->13706 13710 4036e4 13707->13710 13711 4036f8 13710->13711 13713 4036fc 13711->13713 13714 403595 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 13711->13714 13713->13687 13714->13713 13715->13700

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 0040475F: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,0040489D), ref: 00404771
                                                                          • Part of subcall function 0040475F: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,0040489D), ref: 0040477E
                                                                        • KiUserCallbackDispatcher.NTDLL(0000004C), ref: 00404C9E
                                                                        • GetSystemMetrics.USER32(0000004D), ref: 00404CA5
                                                                        • GetDC.USER32(00000000), ref: 00404CE0
                                                                        • GetCurrentObject.GDI32(00000000,00000007), ref: 00404CF3
                                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00404D0C
                                                                        • DeleteObject.GDI32(00000000), ref: 00404D3E
                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00404D9F
                                                                        • CreateDIBSection.GDI32(00000000,?,00000000,?,00000000,00000000), ref: 00404DC0
                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00404DD2
                                                                        • BitBlt.GDI32(00000000,00000000,00000000,?,004024F5,00000000,?,?,00CC0020), ref: 00404DF7
                                                                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                                                                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                                                                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                                                                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                                                                          • Part of subcall function 00403E03: EnterCriticalSection.KERNEL32(004084D4,?,0000011C), ref: 00403E15
                                                                          • Part of subcall function 004035C3: GetProcessHeap.KERNEL32(00000000,00000000,004026DC), ref: 004035CA
                                                                          • Part of subcall function 004035C3: RtlFreeHeap.NTDLL(00000000), ref: 004035D1
                                                                        • DeleteObject.GDI32(00000000), ref: 00404E95
                                                                        • DeleteDC.GDI32(00000000), ref: 00404E9C
                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00404EA5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Object$HeapSection$CriticalDelete$CreateEnterProcess$AllocateCallbackCompatibleCurrentDispatcherFreeHandleLeaveLibraryLoadMetricsModuleReleaseSelectSystemUser
                                                                        • String ID: ($- ScreenSize: {lWidth=%d, lHeight=%d}$2$6$U$er32$gdi3
                                                                        • API String ID: 1387450592-1028866296
                                                                        • Opcode ID: 54111a4b7bc319f5745368608b5675afeea82435c2ec2d0b094c19900ce30ce6
                                                                        • Instruction ID: 6b3ee7ab4da137d1a309b5a9f787d899f0e5564c39ac921fb92ff6ff8e554c30
                                                                        • Opcode Fuzzy Hash: 54111a4b7bc319f5745368608b5675afeea82435c2ec2d0b094c19900ce30ce6
                                                                        • Instruction Fuzzy Hash: 4B718075D00208ABDB20DFA5DD45BEEBB79AF44700F10446AE605B72D1DB785A04CBA9

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 156 401000-401018 157 40141c-401422 156->157 158 40101e-401028 156->158 158->157 159 40102e-401037 call 404108 158->159 159->157 162 40103d-401059 call 403595 * 2 159->162 167 40140e-401417 call 4035c3 * 2 162->167 168 40105f-401061 162->168 167->157 168->167 169 401067-40116d call 40368d FindFirstFileW 168->169 175 401173-401192 call 4036c8 * 2 169->175 176 4013df-40140b call 403603 * 3 169->176 186 4013c4 175->186 187 401198-4011b7 call 40368d 175->187 176->167 188 4013c7-4013d9 FindNextFileW 186->188 192 4017f6-4017fd 187->192 193 4011bd-4011cf call 4037b8 187->193 188->175 188->176 192->186 195 401803-401821 call 4036c8 call 403bed 192->195 193->192 198 4011d5-4011e7 call 4037b8 193->198 204 401823-401870 call 403595 call 40368d call 403f43 195->204 205 401878-40187d 195->205 198->192 206 4011ed-40120f call 4036c8 call 403bed 198->206 204->205 209 401883-401888 205->209 210 401a28-401a5f call 40368d call 403f43 205->210 224 401215-40121b 206->224 225 4017ab-4017d6 call 404145 206->225 209->210 214 40188e-401893 209->214 226 401a64-401a67 210->226 214->210 218 401899-40189e 214->218 218->210 222 4018a4-4018a9 218->222 222->210 227 4018af-4018b4 222->227 224->225 230 401221-401227 224->230 236 4017dc-4017e7 call 4037b8 225->236 237 4013bd-4013bf call 4035c3 225->237 226->188 227->210 231 4018ba-4018bf 227->231 230->225 233 40122d-401233 230->233 231->210 234 4018c5-4018ca 231->234 233->225 238 401239-40123f 233->238 234->210 235 4018d0-4018d5 234->235 235->210 241 4018db-4018e0 235->241 236->237 248 4017ed-4017ef 236->248 237->186 238->225 240 401245-40124b 238->240 240->225 243 401251-401257 240->243 241->210 244 4018e6-4018eb 241->244 243->225 246 40125d-401263 243->246 244->186 247 4018f1-401905 call 4044f7 244->247 246->225 249 401269-40126f 246->249 254 401538-401542 call 4035c3 247->254 255 40190b-401910 247->255 248->192 249->225 251 401275-40127b 249->251 251->225 253 401281-401287 251->253 253->225 256 40128d-401293 253->256 254->186 255->254 257 401916-40192e call 40377e 255->257 256->225 259 401299-40129f 256->259 257->254 265 401934-40194c call 40377e 257->265 259->225 262 4012a5-4012ab 259->262 262->225 264 4012b1-4012b7 262->264 264->225 266 4012bd-4012c3 264->266 265->254 271 401952-401968 call 403729 265->271 266->225 268 4012c9-4012cf 266->268 268->225 270 4012d5-4012db 268->270 270->225 272 4012e1-4012e7 270->272 271->254 276 40196e-40197a call 4036b2 271->276 272->225 274 4012ed-4012f3 272->274 274->225 277 4012f9-4012ff 274->277 283 401980-401993 call 401aef 276->283 284 401531-401533 call 4035c3 276->284 277->225 278 401305-40130b 277->278 278->225 280 401311-401317 278->280 280->225 282 40131d-401323 280->282 282->225 285 401329-40132f 282->285 283->284 291 401999-40199e 283->291 284->254 285->225 288 401335-40133b 285->288 288->225 290 401341-401347 288->290 292 401423-401429 290->292 293 40134d-401382 call 404145 290->293 291->284 294 4019a4-4019b6 call 401d21 291->294 295 401719-40174e call 404145 292->295 296 40142f-401435 292->296 293->237 304 401384-40138f call 4037b8 293->304 305 4019b8-401a01 call 401c32 call 40368d call 403e03 294->305 306 401a1b-401a23 call 4035c3 294->306 295->254 313 401754-40175f call 4037b8 295->313 296->295 299 40143b-401441 296->299 299->295 303 401447-40144d 299->303 308 401453-401459 303->308 309 4016ef-401714 EnterCriticalSection call 404eb2 LeaveCriticalSection 303->309 304->237 323 401391-4013ba call 403f87 304->323 339 401a06-401a18 call 4035c3 * 2 305->339 306->284 308->309 314 40145f-401465 308->314 309->186 313->254 331 401765-4017a6 call 403f87 313->331 320 401467-401498 call 403f87 314->320 321 40149d-4014a3 314->321 320->186 327 401547-40154d 321->327 328 4014a9-4014cb call 404145 321->328 323->237 335 4015be-4015c4 327->335 336 40154f-401571 call 404145 327->336 328->254 347 4014cd-4014d8 call 4037b8 328->347 331->254 341 401603-401609 335->341 342 4015c6-4015e8 call 404145 335->342 336->237 355 401577-401582 call 4037b8 336->355 339->306 349 4016e8 341->349 350 40160f-401615 341->350 342->237 360 4015ee-4015f9 call 4037b8 342->360 347->254 367 4014da-40152b call 403595 call 40368d call 403f43 347->367 349->309 350->349 351 40161b-401621 350->351 357 401623-40162a 351->357 358 401636-40163c 351->358 355->237 369 401588 355->369 357->358 363 401670-401698 call 404145 358->363 364 40163e-401644 358->364 360->237 377 4015ff-401601 360->377 363->237 381 40169e-4016a9 call 4037b8 363->381 364->363 370 401646-40164c 364->370 367->284 374 40158a-4015b9 call 403f87 369->374 370->363 375 40164e-401654 370->375 374->237 375->363 380 401656-40165c 375->380 377->374 380->363 384 40165e-401665 call 401000 380->384 381->237 389 4016af-4016e3 call 403f87 381->389 391 40166a-40166b 384->391 389->237 391->186
                                                                        APIs
                                                                        • FindNextFileW.KERNELBASE(?,?), ref: 004013D1
                                                                          • Part of subcall function 00404108: GetFileAttributesW.KERNELBASE(00E6AE78,00401035,00E6AE78,?), ref: 00404109
                                                                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                                                                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                                                                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                                                                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                                                                        • FindFirstFileW.KERNELBASE(00000000,?,00E6AE78,?), ref: 00401161
                                                                          • Part of subcall function 00403F87: FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 00403FE8
                                                                          • Part of subcall function 00403F87: FindNextFileW.KERNEL32(0040179D,?), ref: 00404089
                                                                        • EnterCriticalSection.KERNEL32(004084D4), ref: 004016F5
                                                                        • LeaveCriticalSection.KERNEL32(004084D4), ref: 0040170E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$CriticalFindSection$EnterFirstHeapLeaveNext$AllocateAttributesProcess
                                                                        • String ID: $Lr$%s%s$%s\%s$%s\*$7a?=$7a?=$Discord/$Telegram
                                                                        • API String ID: 1893179121-60960798
                                                                        • Opcode ID: cc32662204eef177c1bb24944cceb37b970cd3f52aad9942ed642ea1a6b4ea2d
                                                                        • Instruction ID: e0fe4e299a14adff3431ec18ef39797f5155a140b4338a3cd7c1f3b0b96d06eb
                                                                        • Opcode Fuzzy Hash: cc32662204eef177c1bb24944cceb37b970cd3f52aad9942ed642ea1a6b4ea2d
                                                                        • Instruction Fuzzy Hash: A0323A71E102146ADB249BA58C91BFE73B89F80304F14417FE845B72E1EB7C8E858B9D

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 468 4020e1-402132 call 403595 471 402190-4021a2 GetCurrentHwProfileA 468->471 472 402134-402153 468->472 473 4021a4-4021b7 call 403668 471->473 474 4021ba-40222b GetSystemInfo call 403668 call 4035c3 GlobalMemoryStatusEx call 403668 471->474 475 402155-402159 472->475 476 40215b-402161 472->476 473->474 492 402268-402279 EnumDisplayDevicesA 474->492 479 40217b-402186 call 4035d8 475->479 480 402163-40216a 476->480 481 40216c-402172 476->481 486 402189-40218e 479->486 480->479 485 402174-402178 481->485 481->486 485->479 486->471 486->472 493 40227b-402281 492->493 494 40222d-402236 492->494 495 402257-402267 494->495 496 402238-402254 call 403668 494->496 495->492 496->495
                                                                        APIs
                                                                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                                                                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                                                                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                                                                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                                                                        • GetCurrentHwProfileA.ADVAPI32(?), ref: 00402198
                                                                        • GetSystemInfo.KERNELBASE(?,?,0000011C), ref: 004021BF
                                                                        • GlobalMemoryStatusEx.KERNELBASE(?), ref: 004021F3
                                                                        • EnumDisplayDevicesA.USER32(00000000,00000002,?,00000001), ref: 00402275
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CriticalHeapSection$AllocateCurrentDevicesDisplayEnterEnumGlobalInfoLeaveMemoryProcessProfileStatusSystem
                                                                        • String ID: - CPU: %s (%d cores)$- HWID: %s$- RAM: %d GB$- VideoAdapter #%d: %s$@
                                                                        • API String ID: 330852582-565344305
                                                                        • Opcode ID: 1289e8cf0d5fbe5f3f0ef4059f282c48e11b380c65581eb552a4a88b93ed5c2e
                                                                        • Instruction ID: 22e8c097fdb53a750db3d38699cd98a3431052edcfded2005e7f0d2a9ec9707d
                                                                        • Opcode Fuzzy Hash: 1289e8cf0d5fbe5f3f0ef4059f282c48e11b380c65581eb552a4a88b93ed5c2e
                                                                        • Instruction Fuzzy Hash: 6141A6719083019BD720DF24CD85FABBBE8EB84714F10493EF945AB2C1E774994587AA

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • FindFirstFileW.KERNELBASE(00000000,?,00000000,004084D4,?), ref: 00404F58
                                                                        • EnterCriticalSection.KERNEL32(004084D4), ref: 00405014
                                                                          • Part of subcall function 00404EB2: LeaveCriticalSection.KERNEL32(004084D4), ref: 00405031
                                                                        • FindNextFileW.KERNELBASE(?,?), ref: 00405200
                                                                          • Part of subcall function 00404108: GetFileAttributesW.KERNELBASE(00E6AE78,00401035,00E6AE78,?), ref: 00404109
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$CriticalFindSection$AttributesEnterFirstLeaveNext
                                                                        • String ID: %s\%s$%s\*$Telegram
                                                                        • API String ID: 648860119-4994844
                                                                        • Opcode ID: d84d8187fe1ade631e357449a07b88c685cf14ca7df123eb18c2c8c5d20aa8b4
                                                                        • Instruction ID: ecd5ca78d3e23e3f5ec3a68d4d3fe809ace172ce08446f2cd26366b6c0f1c70a
                                                                        • Opcode Fuzzy Hash: d84d8187fe1ade631e357449a07b88c685cf14ca7df123eb18c2c8c5d20aa8b4
                                                                        • Instruction Fuzzy Hash: D9A18021E14308A9EF10DBA0AD06BBE7775EF44710F20546FE904BB2E1EBB50E85875E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 649 401dc9-401ddb 650 401de1-401deb 649->650 651 401fb2-401fb7 649->651 650->651 652 401df1-401e1b call 40368d FindFirstFileW 650->652 652->651 655 401e21-401e65 call 403595 call 4036c8 652->655 660 401e6a-401e8f call 4036c8 * 2 655->660 665 401e95-401eae call 40368d 660->665 666 401f8e-401f9c FindNextFileW 660->666 672 401eb0-401ec0 call 4037b8 665->672 673 401ee1-401ee6 665->673 668 401fa9-401fad call 4035c3 666->668 669 401f9e-401fa4 666->669 668->651 669->660 672->673 680 401ec2-401ed2 call 4037b8 672->680 675 401eec-401ef6 673->675 676 401f7f-401f8a 673->676 675->676 677 401efc-401f09 call 404118 675->677 676->666 683 401f78-401f7a call 4035c3 677->683 684 401f0b-401f22 call 4036c8 call 403bed 677->684 680->673 688 401ed4-401ed7 call 401dc9 680->688 683->676 694 401f24-401f29 684->694 695 401f39-401f69 call 40368d call 403f43 684->695 692 401edc 688->692 692->676 694->695 696 401f2b-401f30 694->696 701 401f6e-401f71 695->701 696->695 698 401f32-401f37 696->698 698->683 698->695 701->683
                                                                        APIs
                                                                        • FindFirstFileW.KERNELBASE(?), ref: 00401E10
                                                                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                                                                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                                                                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                                                                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                                                                        • FindNextFileW.KERNELBASE(00000000,?), ref: 00401F94
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CriticalFileFindHeapSection$AllocateEnterFirstLeaveNextProcess
                                                                        • String ID: %s%s$%s\%s$%s\*
                                                                        • API String ID: 3555643018-2064654797
                                                                        • Opcode ID: 5cebb7284f378f55fcd4df65f13594aa010d6026b77e4466925d64efd1a65d52
                                                                        • Instruction ID: 14e95c991f87aca2b944788a29030c3de2d12e3058c1dcaec3f91741412fe5a3
                                                                        • Opcode Fuzzy Hash: 5cebb7284f378f55fcd4df65f13594aa010d6026b77e4466925d64efd1a65d52
                                                                        • Instruction Fuzzy Hash: C641B0706182025BC714EF24D955A2F77E8AF84704F10493FF885A72F2EB39EA44879E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 702 401d21-401d5c call 40475f 705 401dbc-401dc8 702->705 706 401d5e-401d85 call 403603 CryptUnprotectData 702->706 709 401d92-401d97 706->709 710 401d87-401d90 706->710 709->705 711 401d99-401db6 CryptProtectData 709->711 710->705 711->705
                                                                        APIs
                                                                          • Part of subcall function 0040475F: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,0040489D), ref: 00404771
                                                                          • Part of subcall function 0040475F: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,0040489D), ref: 0040477E
                                                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 00401D80
                                                                        • CryptProtectData.CRYPT32(?,?,00000000,00000000,00000000,00000000,?), ref: 00401DB6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CryptData$HandleLibraryLoadModuleProtectUnprotect
                                                                        • String ID: CRYPT32.dll$Poverty is the parent of crime.
                                                                        • API String ID: 3642467563-1885057629
                                                                        • Opcode ID: 0bfa8139f65bd25693e68981f44dce0d28659087e85b2fcfac568366f43bb735
                                                                        • Instruction ID: c7f84ecd61725d2c0d2cc539ea739b2fab333b7ee9f2c38f0174a54d3eab5c97
                                                                        • Opcode Fuzzy Hash: 0bfa8139f65bd25693e68981f44dce0d28659087e85b2fcfac568366f43bb735
                                                                        • Instruction Fuzzy Hash: 9911F7B5D0020DABDB10DF95C8819EFBBBCEF48314F10456AE945B3280E774AE09CAA4

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 402282-40229f InitializeCriticalSectionAndSpinCount 1 4022a1 0->1 2 4022a6-4022bc CreateMutexA 0->2 3 40270d 1->3 4 4022c2-4022cd GetLastError 2->4 5 402705-402707 ExitProcess 2->5 4->5 6 4022d3-4022e2 call 403c5f 4->6 9 4022e8-402312 call 403603 call 404871 6->9 10 4026dc-4026fc DeleteCriticalSection 6->10 15 4026d4-4026d7 call 4035c3 9->15 16 402318-40235d call 403668 call 4048d6 9->16 10->5 15->10 16->15 22 402363-402397 call 403595 * 3 16->22 29 40266c-4026bb call 403e03 call 4035c3 * 4 call 403c88 22->29 30 40239d-4023a4 22->30 60 4026be-4026c4 call 4053f8 29->60 30->29 32 4023aa-4023b1 30->32 32->29 34 4023b7-4023f3 call 40475f 32->34 34->29 40 4023f9-40240e call 401fba 34->40 45 402410-402447 call 40475f 40->45 46 40244e-402468 40->46 45->46 53 402449 45->53 54 402472-40249d call 4036c8 46->54 55 40246a-40246c ExitProcess 46->55 53->3 65 4024a7-4024d2 call 4036c8 54->65 66 40249f-4024a1 ExitProcess 54->66 62 4026c9-4026d0 60->62 62->15 64 4026d2 62->64 64->60 70 4024d4-4024d6 ExitProcess 65->70 71 4024dc-40254a call 4036c8 call 404c2d CreateThread * 2 WaitForMultipleObjects call 401a6c call 4020e1 65->71 80 402554-40255b 71->80 81 40255d-402566 80->81 82 40258e-4025aa ObtainUserAgentString 80->82 83 402568-402582 81->83 84 40258c 81->84 85 4025c2-40262d call 4052c4 * 6 call 403595 82->85 86 4025ac-4025bf call 403668 82->86 83->84 84->80 104 40263f-402667 call 4036c8 call 4052c4 * 2 call 4035c3 85->104 105 40262f-402639 GetModuleFileNameW 85->105 86->85 104->29 105->104
                                                                        APIs
                                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(004084D4,00000DA3), ref: 00402297
                                                                        • CreateMutexA.KERNELBASE(00000000,00000000,085f229d-d27d-4fc1-9dc1-8958125ccbd9), ref: 004022AF
                                                                        • GetLastError.KERNEL32 ref: 004022C2
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CountCreateCriticalErrorInitializeLastMutexSectionSpin
                                                                        • String ID: $$$d.log$- OperationSystem: %d:%d:%d$- UserAgent: %s$085f229d-d27d-4fc1-9dc1-8958125ccbd9$@$Chrome$kernel32$shell32
                                                                        • API String ID: 2005177960-2910755732
                                                                        • Opcode ID: 7d85174eba821bd26a3f3c474d69b94223cfdb22e9e683f010e87f1aa16b2777
                                                                        • Instruction ID: db5b455704c763b654c06a6b3c78ab43ebdd973590fbbde67410529c29875780
                                                                        • Opcode Fuzzy Hash: 7d85174eba821bd26a3f3c474d69b94223cfdb22e9e683f010e87f1aa16b2777
                                                                        • Instruction Fuzzy Hash: 36C11630904245AEEB10EFA0DE4ABAE7F75AF14705F00447EE141BA2E2DFB91A44CB5D

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 00404108: GetFileAttributesW.KERNELBASE(00E6AE78,00401035,00E6AE78,?), ref: 00404109
                                                                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                                                                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                                                                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                                                                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                                                                        • EnterCriticalSection.KERNEL32(004084D4), ref: 00404580
                                                                        • LeaveCriticalSection.KERNEL32(004084D4), ref: 004045CC
                                                                        • EnterCriticalSection.KERNEL32(004084D4), ref: 0040464F
                                                                        • LeaveCriticalSection.KERNEL32(004084D4), ref: 00404688
                                                                        • EnterCriticalSection.KERNEL32(004084D4), ref: 004046C5
                                                                        • LeaveCriticalSection.KERNEL32(004084D4), ref: 00404708
                                                                        • EnterCriticalSection.KERNEL32(004084D4), ref: 00404721
                                                                        • LeaveCriticalSection.KERNEL32(004084D4), ref: 0040474A
                                                                          • Part of subcall function 00404377: GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,?,00000000,?,?,?,?,?,004045FF), ref: 00404390
                                                                          • Part of subcall function 00404377: GetProcAddress.KERNEL32(00000000), ref: 00404399
                                                                          • Part of subcall function 00404377: GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,004045FF), ref: 004043AA
                                                                          • Part of subcall function 00404377: GetProcAddress.KERNEL32(00000000), ref: 004043AD
                                                                          • Part of subcall function 00404377: OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,004045FF), ref: 0040442F
                                                                          • Part of subcall function 00404377: GetCurrentProcess.KERNEL32(004045FF,00000000,00000000,00000002,?,?,?,?,004045FF), ref: 0040444B
                                                                          • Part of subcall function 00404377: DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,004045FF), ref: 0040445A
                                                                          • Part of subcall function 00404377: CloseHandle.KERNEL32(004045FF,?,?,?,?,004045FF), ref: 0040448A
                                                                          • Part of subcall function 004035C3: GetProcessHeap.KERNEL32(00000000,00000000,004026DC), ref: 004035CA
                                                                          • Part of subcall function 004035C3: RtlFreeHeap.NTDLL(00000000), ref: 004035D1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CriticalSection$EnterLeave$HandleHeapProcess$AddressModuleProc$AllocateAttributesCloseCurrentDuplicateFileFreeOpen
                                                                        • String ID: @$\??\%s$\Network\Cookies
                                                                        • API String ID: 330363434-2791195959
                                                                        • Opcode ID: 3aceadb322b04b0cd88ffec1cbc000090e3a08d248677b6e52905a850177b162
                                                                        • Instruction ID: 30b89a0c7dd792c6c55c89bb752360b8731b4be3a9f183659006c232308b4c97
                                                                        • Opcode Fuzzy Hash: 3aceadb322b04b0cd88ffec1cbc000090e3a08d248677b6e52905a850177b162
                                                                        • Instruction Fuzzy Hash: 0C719F70940209BFDB04DF90CD4ABAD7BB5FB44305F10803AFA41BA2E1EBB95A45CB59

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 442 4053f8-405481 call 40475f 445 405483-405485 442->445 446 40548a-4054e6 442->446 447 4055cd-4055d0 445->447 449 4055ca 446->449 450 4054ec-40551a call 4053ec socket 446->450 449->447 453 4055c0-4055c3 450->453 454 405520-405537 call 40535a call 403603 450->454 453->449 459 405538-40553e 454->459 460 405540-405555 connect 459->460 461 4055b3-4055bc closesocket 459->461 462 4055a6-4055b1 Sleep 460->462 463 405557-405577 send 460->463 461->453 462->459 463->462 464 405579-405593 send 463->464 464->462 465 405595-4055a4 call 4035c3 464->465 465->461
                                                                        APIs
                                                                          • Part of subcall function 0040475F: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,0040489D), ref: 00404771
                                                                          • Part of subcall function 0040475F: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,0040489D), ref: 0040477E
                                                                        • socket.WS2_32(?,00000001,00000000), ref: 0040550F
                                                                        • connect.WS2_32(000000FF,?,00000010), ref: 0040554E
                                                                        • send.WS2_32(000000FF,00000000,00000000), ref: 00405570
                                                                        • send.WS2_32(000000FF,000000FF,106,00000000), ref: 0040558C
                                                                        • closesocket.WS2_32(000000FF), ref: 004055BC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: send$HandleLibraryLoadModuleclosesocketconnectsocket
                                                                        • String ID: 106$185.244.212.106$ws2_32.dll
                                                                        • API String ID: 2279181061-2093737415
                                                                        • Opcode ID: 1717f7b469886dd0248fd88ee7bed06fc9c62e98bc7b207c854f528114d91968
                                                                        • Instruction ID: 1ba8255f1e8dd8081fefad2875cd7e7399d758cce23e8b083b3bca88080a13bc
                                                                        • Opcode Fuzzy Hash: 1717f7b469886dd0248fd88ee7bed06fc9c62e98bc7b207c854f528114d91968
                                                                        • Instruction Fuzzy Hash: C851C530C44288EDEF018BE4D8097EEBFB99F15314F14459AE660BE2D1C7B9474ACB65

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 564 4048d6-4048e5 565 404c1b 564->565 566 4048eb-404904 VirtualAlloc 564->566 567 404c21-404c24 565->567 566->565 568 40490a-40492e call 40475f 566->568 570 404c27-404c2c 567->570 572 404934-404949 call 4035d8 568->572 573 404c17-404c19 568->573 576 40494b-404952 572->576 573->570 577 404954-404959 576->577 578 40495d-404960 576->578 577->576 579 40495b 577->579 580 404964-40498b GetCurrentProcess IsWow64Process call 4052c4 578->580 579->580 583 404991-404996 580->583 584 404a1b-404a1e 580->584 587 4049b7-4049bc 583->587 588 404998-4049a8 583->588 585 404a20-404a23 584->585 586 404a6b-404a6e 584->586 591 404a43-404a47 585->591 592 404a25-404a41 585->592 594 404a74-404a79 586->594 595 404b19-404b1f 586->595 589 4049fc-4049ff 587->589 590 4049be-4049c3 587->590 593 4049aa-4049b2 588->593 599 404a01-404a04 589->599 600 404a0a-404a19 589->600 590->588 598 4049c5-4049c7 590->598 591->565 604 404a4d-404a69 591->604 603 404abd-404aca 592->603 593->603 596 404a9b-404a9d 594->596 597 404a7b-404a99 594->597 601 404b25-404b2b 595->601 602 404bba-404bbd 595->602 605 404acf-404ad2 596->605 606 404a9f-404ab8 596->606 597->603 598->588 607 4049c9-4049cc 598->607 599->565 599->600 600->593 609 404b4b-404b51 601->609 610 404b2d-404b46 601->610 602->565 608 404bbf-404be0 602->608 603->567 604->603 615 404af2-404af5 605->615 616 404ad4-404aed 605->616 606->603 611 4049e2-4049e5 607->611 612 4049ce-4049e0 607->612 613 404c02 608->613 614 404be2-404be8 608->614 617 404b71-404b77 609->617 618 404b53-404b6c 609->618 610->567 611->565 620 4049eb-4049fa 611->620 612->593 622 404c07-404c0e 613->622 614->613 619 404bea-404bf0 614->619 615->565 621 404afb-404b14 615->621 616->567 623 404b97-404b9d 617->623 624 404b79-404b92 617->624 618->567 619->613 626 404bf2-404bf8 619->626 620->593 621->567 622->567 623->608 625 404b9f-404bb8 623->625 624->567 625->567 626->613 627 404bfa-404c00 626->627 627->613 628 404c10-404c15 627->628 628->622
                                                                        APIs
                                                                        • VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,0000011C,?,?,?,?,?,00402351), ref: 004048F7
                                                                          • Part of subcall function 0040475F: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,0040489D), ref: 00404771
                                                                          • Part of subcall function 0040475F: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,0040489D), ref: 0040477E
                                                                        • GetCurrentProcess.KERNEL32(Q#@), ref: 0040496B
                                                                        • IsWow64Process.KERNEL32(00000000), ref: 00404972
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Process$AllocCurrentHandleLibraryLoadModuleVirtualWow64
                                                                        • String ID: Q#@$l$ntdl$ntdllQ#@
                                                                        • API String ID: 1207166019-1218684799
                                                                        • Opcode ID: bcc7277f0982174f50dd03a4f8c9cdb8aac042102541d2e3cf7aa096f817556f
                                                                        • Instruction ID: 3ee230e69bd7094b3339c115938649c60d03c5872765df0b6732839f5e82a11c
                                                                        • Opcode Fuzzy Hash: bcc7277f0982174f50dd03a4f8c9cdb8aac042102541d2e3cf7aa096f817556f
                                                                        • Instruction Fuzzy Hash: C881E5B061820196EB649B50EF5577A33A8FB91710F20053FE345BB3E1EBB88D80874E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 629 401fba-40202b GetUserDefaultUILanguage 630 402035-40203c 629->630 631 402054-40208c call 403668 * 2 GetKeyboardLayoutList 630->631 632 40203e-40204d 630->632 640 40208e-402092 631->640 641 4020cf-4020e0 call 403668 631->641 633 402052 632->633 634 40204f 632->634 633->630 634->633 643 40209c-4020a3 640->643 643->641 645 4020a5-4020cd call 403668 643->645 645->643
                                                                        APIs
                                                                        • GetUserDefaultUILanguage.KERNELBASE ref: 0040201D
                                                                        • GetKeyboardLayoutList.USER32(00000032,?), ref: 0040207F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: DefaultKeyboardLanguageLayoutListUser
                                                                        • String ID: )$- KeyboardLayouts: ( $- SystemLayout %d${%d}
                                                                        • API String ID: 167087913-619012376
                                                                        • Opcode ID: 098336f7847c56de198dceea2ad9df411a430e70487c194ec4b5a45776de32d6
                                                                        • Instruction ID: 10b5000f3d20341b48b4ae383d5168f65d0d8f996377bdde78befb18ad8f4928
                                                                        • Opcode Fuzzy Hash: 098336f7847c56de198dceea2ad9df411a430e70487c194ec4b5a45776de32d6
                                                                        • Instruction Fuzzy Hash: 0931BE60D08298A9DB009FE494067BDBB70EF14306F1054ABF648F72C2D27E4B49D76E

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                                                                        • GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                                                                        • RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                                                                        • LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CriticalHeapSection$AllocateEnterLeaveProcess
                                                                        • String ID:
                                                                        • API String ID: 1367039788-0
                                                                        • Opcode ID: d8cb59fa451f531bb7d9703be9d6d3f1f0789b70689b423d9663a2cdfd0a23a5
                                                                        • Instruction ID: 3223c967265719e8531dc247f72f9ba3551b462deb81e419d276c47ad9b9309f
                                                                        • Opcode Fuzzy Hash: d8cb59fa451f531bb7d9703be9d6d3f1f0789b70689b423d9663a2cdfd0a23a5
                                                                        • Instruction Fuzzy Hash: 81D0A733E0812067CB5027F9BE0C99BBF6CEF86661705027AF645E3160CAB85C0587AA

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 713 40475f-40477b GetModuleHandleA 714 404791-404799 713->714 715 40477d-404788 LoadLibraryA 713->715 717 404868 714->717 718 40479f-4047aa 714->718 715->714 716 40478a-40478c 715->716 719 40486b-404870 716->719 717->719 718->717 720 4047b0-4047b9 718->720 720->717 721 4047bf-4047c4 720->721 721->717 722 4047ca-4047ce 721->722 722->717 723 4047d4-4047f9 722->723 724 404867 723->724 725 4047fb-404806 723->725 724->717 726 404808-404812 725->726 727 404814-40482e call 4036b2 call 403bed 726->727 728 404857-404865 726->728 733 404830-404838 727->733 734 40483c-404854 727->734 728->724 728->725 733->726 735 40483a 733->735 734->728 735->728
                                                                        APIs
                                                                        • GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,0040489D), ref: 00404771
                                                                        • LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,0040489D), ref: 0040477E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: HandleLibraryLoadModule
                                                                        • String ID: ntdl
                                                                        • API String ID: 4133054770-3973061744
                                                                        • Opcode ID: 153b30b252ebdc061fc8619bae493407424138c2e36891cb89667ed67eb505d5
                                                                        • Instruction ID: 11ff4d8a77b90bf3d421a1100ca7fc1e5220f65cc3b3dee9f6ee43e9c25cea99
                                                                        • Opcode Fuzzy Hash: 153b30b252ebdc061fc8619bae493407424138c2e36891cb89667ed67eb505d5
                                                                        • Instruction Fuzzy Hash: B131127AE00215DBCB54EFA9C480ABEB7B0FF89704F04466AC551B3381C738A951CBA4

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 736 4035c3-4035c5 737 4035d7 736->737 738 4035c7-4035d1 GetProcessHeap RtlFreeHeap 736->738 738->737
                                                                        APIs
                                                                        • GetProcessHeap.KERNEL32(00000000,00000000,004026DC), ref: 004035CA
                                                                        • RtlFreeHeap.NTDLL(00000000), ref: 004035D1
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Heap$FreeProcess
                                                                        • String ID:
                                                                        • API String ID: 3859560861-0
                                                                        • Opcode ID: a5c4a5c9563baa38c9ba5d526c864f3f6d83196204a18c55b87fe91dca070a4b
                                                                        • Instruction ID: 873122bf131184cd6aa06baef865d0714c6afb91f4c12db888e56dda872d8f6a
                                                                        • Opcode Fuzzy Hash: a5c4a5c9563baa38c9ba5d526c864f3f6d83196204a18c55b87fe91dca070a4b
                                                                        • Instruction Fuzzy Hash: B6B092B0A491006AEE182BA09E0DB3B3A18AB04303F0002A8B302B14A0CA786500862A
                                                                        APIs
                                                                        • GetFileAttributesW.KERNELBASE(00E6AE78,00401035,00E6AE78,?), ref: 00404109
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AttributesFile
                                                                        • String ID:
                                                                        • API String ID: 3188754299-0
                                                                        • Opcode ID: d097877ed9740e91f650fee32fe24c2afa502c42455f07a4a2dfcf8c61e2aed8
                                                                        • Instruction ID: c139d24a98a97a360684cfbb393a546f3f92256ca7c1166e296c0db0bb017a51
                                                                        • Opcode Fuzzy Hash: d097877ed9740e91f650fee32fe24c2afa502c42455f07a4a2dfcf8c61e2aed8
                                                                        • Instruction Fuzzy Hash: 1DA022380302008BCA2C03300FAA00E30000E0A2F03220BACB033F80E0EA38C2800002
                                                                        APIs
                                                                          • Part of subcall function 00404108: GetFileAttributesW.KERNELBASE(00E6AE78,00401035,00E6AE78,?), ref: 00404109
                                                                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                                                                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                                                                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                                                                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                                                                        • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 00403FE8
                                                                        • FindNextFileW.KERNEL32(0040179D,?), ref: 00404089
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$CriticalFindHeapSection$AllocateAttributesEnterFirstLeaveNextProcess
                                                                        • String ID: %s%s$%s\%s$%s\*
                                                                        • API String ID: 674214967-2064654797
                                                                        • Opcode ID: 851fe2d0db6313b3b97ce49e1a9b884d2538fd0dfee7c13a5dcc67b2ec672ff6
                                                                        • Instruction ID: 3b86eeb09e9c0eadff58ad7c69213eb5ca1285151f1c464e5ebf84cdc8497cf1
                                                                        • Opcode Fuzzy Hash: 851fe2d0db6313b3b97ce49e1a9b884d2538fd0dfee7c13a5dcc67b2ec672ff6
                                                                        • Instruction Fuzzy Hash: 2831F3B1E0021967DB21AF618C45ABE7BA99F80304F0441BEFE05B73D1EB3D8F458699
                                                                        APIs
                                                                        • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 00404198
                                                                        • FindNextFileW.KERNEL32(000000FF,?), ref: 004041E4
                                                                          • Part of subcall function 004035C3: GetProcessHeap.KERNEL32(00000000,00000000,004026DC), ref: 004035CA
                                                                          • Part of subcall function 004035C3: RtlFreeHeap.NTDLL(00000000), ref: 004035D1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: FileFindHeap$FirstFreeNextProcess
                                                                        • String ID: %s\%s$%s\*
                                                                        • API String ID: 1689202581-2848263008
                                                                        • Opcode ID: 03ec7cdd6b1c53106126d1c61fe10d4903e8003fb5869c5929cfc5ffc06257b0
                                                                        • Instruction ID: 0ae009433c7d8e74f2399d383574e25c26017cf842a18982b61cce91de727895
                                                                        • Opcode Fuzzy Hash: 03ec7cdd6b1c53106126d1c61fe10d4903e8003fb5869c5929cfc5ffc06257b0
                                                                        • Instruction Fuzzy Hash: C931A8B0B00214ABCB20AF65CC8566E7BADEF85745F1044BEB905A73C1DB7C9E418B99
                                                                        APIs
                                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003B2E5A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileFindFirst
                                                                        • String ID:
                                                                        • API String ID: 1974802433-0
                                                                        • Opcode ID: eeab62e2c1f5af416a2e286717bc1cb6ce684408ac4bf3ed9efc959d6024c4bc
                                                                        • Instruction ID: 908bd9492ed7a0de1d24d437580f38e157168e10754f818dfd587cb3d762f289
                                                                        • Opcode Fuzzy Hash: eeab62e2c1f5af416a2e286717bc1cb6ce684408ac4bf3ed9efc959d6024c4bc
                                                                        • Instruction Fuzzy Hash: 8071E37190515C9FDF22AF28CC99AFFB7B8AB05308F1542DAE54CE7611DA318E849F14
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 003AAEEE
                                                                        • IsDebuggerPresent.KERNEL32 ref: 003AAFBA
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003AAFDA
                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 003AAFE4
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                        • String ID:
                                                                        • API String ID: 254469556-0
                                                                        • Opcode ID: 1ce12bdf51fe9a30602694db2b91a3928185d2e86c810d3cc2bc74146ab98b7e
                                                                        • Instruction ID: 2823a54181ac074d1fd1281f45b498ade62e9bfbc6ed402f054381b7d9db909f
                                                                        • Opcode Fuzzy Hash: 1ce12bdf51fe9a30602694db2b91a3928185d2e86c810d3cc2bc74146ab98b7e
                                                                        • Instruction Fuzzy Hash: 6A3125B5D052189BDB11EFA4D989BCDBBB8FF09304F1041AAE409AB250EB749A84DF45
                                                                        APIs
                                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 003A8D0D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Cpp_errorThrow_std::_
                                                                        • String ID: v22y$v22y
                                                                        • API String ID: 2134207285-685426704
                                                                        • Opcode ID: 46828ab6ea07d9b7446a1211e815f0fa63d8aedabcd947e8b56b6b3d0c6fab03
                                                                        • Instruction ID: 5149d64dd992e0280e367e711daf7fb9180ab890565625d24663522c32731b07
                                                                        • Opcode Fuzzy Hash: 46828ab6ea07d9b7446a1211e815f0fa63d8aedabcd947e8b56b6b3d0c6fab03
                                                                        • Instruction Fuzzy Hash: 55F16A36F111114FDF1A8B3888E67FE7BE6DB96310F29541AD806D72E1DE274C498B81
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 003AA753
                                                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 003AA761
                                                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 003AA772
                                                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 003AA783
                                                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 003AA794
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 003AA7A5
                                                                        • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 003AA7B6
                                                                        • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 003AA7C7
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 003AA7D8
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 003AA7E9
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 003AA7FA
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 003AA80B
                                                                        • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 003AA81C
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 003AA82D
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 003AA83E
                                                                        • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 003AA84F
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 003AA860
                                                                        • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 003AA871
                                                                        • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 003AA882
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 003AA893
                                                                        • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 003AA8A4
                                                                        • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 003AA8B5
                                                                        • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 003AA8C6
                                                                        • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 003AA8D7
                                                                        • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 003AA8E8
                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 003AA8F9
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 003AA90A
                                                                        • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 003AA91B
                                                                        • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 003AA92C
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 003AA93D
                                                                        • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 003AA94E
                                                                        • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 003AA95F
                                                                        • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 003AA970
                                                                        • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 003AA981
                                                                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 003AA992
                                                                        • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 003AA9A3
                                                                        • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 003AA9B4
                                                                        • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 003AA9C5
                                                                        • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 003AA9D6
                                                                        • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 003AA9E7
                                                                        • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 003AA9F8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$HandleModule
                                                                        • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                        • API String ID: 667068680-295688737
                                                                        • Opcode ID: f98f2cd95d7963fbe7d7ac524560fb2755c4b5091af77e43e962eca930afdfde
                                                                        • Instruction ID: 002b5d3ec358f42d829d8654bf51b6a52524e4d8165668d2bae75fa09a0397d6
                                                                        • Opcode Fuzzy Hash: f98f2cd95d7963fbe7d7ac524560fb2755c4b5091af77e43e962eca930afdfde
                                                                        • Instruction Fuzzy Hash: 8A618B799523A0AFC7037FB8BC1DCC63EECBA0AB09B444656F601D2962D7B4B0519F58
                                                                        APIs
                                                                        • GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,?,00000000,?,?,?,?,?,004045FF), ref: 00404390
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00404399
                                                                        • GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,004045FF), ref: 004043AA
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004043AD
                                                                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                                                                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                                                                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                                                                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                                                                        • OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,004045FF), ref: 0040442F
                                                                        • GetCurrentProcess.KERNEL32(004045FF,00000000,00000000,00000002,?,?,?,?,004045FF), ref: 0040444B
                                                                        • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,004045FF), ref: 0040445A
                                                                        • CloseHandle.KERNEL32(004045FF,?,?,?,?,004045FF), ref: 0040448A
                                                                        • GetCurrentProcess.KERNEL32(004045FF,00000000,00000000,00000001,?,?,?,?,004045FF), ref: 00404498
                                                                        • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,004045FF), ref: 004044A7
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,004045FF), ref: 004044BA
                                                                        • CloseHandle.KERNEL32(000000FF), ref: 004044DD
                                                                        • CloseHandle.KERNEL32(?), ref: 004044E5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Handle$CloseProcess$AddressCriticalCurrentDuplicateHeapModuleProcSection$AllocateEnterLeaveOpen
                                                                        • String ID: NtQueryObject$NtQuerySystemInformation$ntdll
                                                                        • API String ID: 3110323036-2044536123
                                                                        • Opcode ID: b5df68a6bf919bf50a48ac763dfae3735d449fe75d6ecaf60c1b57aeb643f3aa
                                                                        • Instruction ID: 6b6220df04feaa08bf7b4da56c654ad1a859742ad58229fcdab27ba0eb323707
                                                                        • Opcode Fuzzy Hash: b5df68a6bf919bf50a48ac763dfae3735d449fe75d6ecaf60c1b57aeb643f3aa
                                                                        • Instruction Fuzzy Hash: 884172B1E00119ABDB109BE68D44AAFBBB9EF84314F144176F604F22D0DB78DE41CBA5
                                                                        APIs
                                                                        • type_info::operator==.LIBVCRUNTIME ref: 003AF839
                                                                        • ___TypeMatch.LIBVCRUNTIME ref: 003AF947
                                                                        • CatchIt.LIBVCRUNTIME ref: 003AF998
                                                                        • _UnwindNestedFrames.LIBCMT ref: 003AFA99
                                                                        • CallUnexpected.LIBVCRUNTIME ref: 003AFAB4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                        • String ID: csm$csm$csm
                                                                        • API String ID: 4119006552-393685449
                                                                        • Opcode ID: 8a253163da7954bb24dcd6ed5ef229d1b474fd12b9b8a38a178c65da533c8b07
                                                                        • Instruction ID: e90c4ffc183a251b2e193e9fefe23b9d5c022a813978e961f4a9bec3e7972136
                                                                        • Opcode Fuzzy Hash: 8a253163da7954bb24dcd6ed5ef229d1b474fd12b9b8a38a178c65da533c8b07
                                                                        • Instruction Fuzzy Hash: F3B14A71800209EFCF2AEFE4D8819AEB7B9FF1A310F15416AE8156B212D735DA51CF91
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: __aulldvrm
                                                                        • String ID: (null)$(null)$0123456789ABCDEF$0123456789abcdef
                                                                        • API String ID: 1302938615-1267642376
                                                                        • Opcode ID: 74a9ea239097ada3d1414e157643d0f430ec2b0ca7e571adabed524bf4d5b292
                                                                        • Instruction ID: bcdd270a88cad76f636a2a04ffa2895c1f0e3bc7806eb067e009ec13a134c41f
                                                                        • Opcode Fuzzy Hash: 74a9ea239097ada3d1414e157643d0f430ec2b0ca7e571adabed524bf4d5b292
                                                                        • Instruction Fuzzy Hash: 5691A0706087028FDB25CF24C58862BB7E5EF85344F24897FE49AA77D1D7B4A881CB49
                                                                        APIs
                                                                          • Part of subcall function 003B7ADC: CreateFileW.KERNEL32(00000000,00000000,?,003B7780,?,?,00000000,?,003B7780,00000000,0000000C), ref: 003B7AF9
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 003B77EB
                                                                        • __dosmaperr.LIBCMT ref: 003B77F2
                                                                        • GetFileType.KERNEL32(00000000), ref: 003B77FE
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 003B7808
                                                                        • __dosmaperr.LIBCMT ref: 003B7811
                                                                        • CloseHandle.KERNEL32(00000000), ref: 003B7831
                                                                        • CloseHandle.KERNEL32(003B4556), ref: 003B797E
                                                                        • GetLastError.KERNEL32 ref: 003B79B0
                                                                        • __dosmaperr.LIBCMT ref: 003B79B7
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                        • String ID:
                                                                        • API String ID: 4237864984-0
                                                                        • Opcode ID: faf4ef2d47031697b69d58324781a2321c9c707b27c740a73890a92760a8b3d1
                                                                        • Instruction ID: 38b29fa8de94397e893b62c85cb040d3ab5443104c32d7b10ea62fd4ff6c76a8
                                                                        • Opcode Fuzzy Hash: faf4ef2d47031697b69d58324781a2321c9c707b27c740a73890a92760a8b3d1
                                                                        • Instruction Fuzzy Hash: 15A14432A081589FCF1A9F68DC62BED7BA4EB86318F15015DFA11DF791CB309902CB41
                                                                        APIs
                                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 003A82F2
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ___std_exception_destroy
                                                                        • String ID: ~\Ya$~\Ya$~\Ya$\a=$\a=
                                                                        • API String ID: 4194217158-2811050778
                                                                        • Opcode ID: ad8045904f14d6202ea3f3b2784ae72f79549a10b058e9c4f2eeb80343506969
                                                                        • Instruction ID: 2d32becf84185ff0952b9da6f2fd4c280ac33dafffb9205b157f61678704206f
                                                                        • Opcode Fuzzy Hash: ad8045904f14d6202ea3f3b2784ae72f79549a10b058e9c4f2eeb80343506969
                                                                        • Instruction Fuzzy Hash: 3F319D7F600605CB9E1E4A3C6DF52AF77C5EF66711B2A4D37D515CB180EA21CC4A8782
                                                                        APIs
                                                                        • _ValidateLocalCookies.LIBCMT ref: 003ABBB7
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 003ABBBF
                                                                        • _ValidateLocalCookies.LIBCMT ref: 003ABC48
                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 003ABC73
                                                                        • _ValidateLocalCookies.LIBCMT ref: 003ABCC8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                        • String ID: csm
                                                                        • API String ID: 1170836740-1018135373
                                                                        • Opcode ID: a14f1a264e332a834035de1c639a35508037cb87504bdecfda2ea1268019ea96
                                                                        • Instruction ID: ad15a05255062e244fcec0b55791367d3c54daf773f8d1c74113f6b579e948e8
                                                                        • Opcode Fuzzy Hash: a14f1a264e332a834035de1c639a35508037cb87504bdecfda2ea1268019ea96
                                                                        • Instruction Fuzzy Hash: 6D41B534A00208AFCF16EF68C845E9EFBA9FF06324F148155E915AB353DB31DA11CB91
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(00000000,?,003B051D,00000000,00000000,00000000,00000000,?,?,003B0226,00000022,FlsSetValue,003BBDDC,003BBDE4,00000000), ref: 003B04CF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: api-ms-$ext-ms-
                                                                        • API String ID: 3664257935-537541572
                                                                        • Opcode ID: 35dac30f1d1bffd89e009a83c1131326d38e516a422bb0d191a9e8d7a4ead917
                                                                        • Instruction ID: 77274960cfe25a60601034049a4e7bfe9384e495c9a8df6ae259aad5715fed7c
                                                                        • Opcode Fuzzy Hash: 35dac30f1d1bffd89e009a83c1131326d38e516a422bb0d191a9e8d7a4ead917
                                                                        • Instruction Fuzzy Hash: 2821D831A01214ABD7279B62AC45EDB776CAF51778F160224EB16E7A91DB34FD00CBD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b95012b95763dbb9bd5f0e4cb0e24feef92e0183f3367ef69c5c02e014021722
                                                                        • Instruction ID: bd37df1920cfd932319406f193503c0e4de0158262b7ac6d2952e61512548b31
                                                                        • Opcode Fuzzy Hash: b95012b95763dbb9bd5f0e4cb0e24feef92e0183f3367ef69c5c02e014021722
                                                                        • Instruction Fuzzy Hash: B7B10F70A04248ABDB13DFA8C891BEEBBB9BF45308F154158E7419BA93C770ED41CB58
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: __freea$Info
                                                                        • String ID:
                                                                        • API String ID: 541289543-0
                                                                        • Opcode ID: 0ceb19ea42538a4b8490c6946a5fb85e2de926f0dedadead4c829ad0b65276fb
                                                                        • Instruction ID: f06b1c3ba3338b7b223407d061d45b4210f0936f02068675d043fe1102809c9d
                                                                        • Opcode Fuzzy Hash: 0ceb19ea42538a4b8490c6946a5fb85e2de926f0dedadead4c829ad0b65276fb
                                                                        • Instruction Fuzzy Hash: BD71B372A0020AAADF239F548C42FEF77AD9F45318F160155EB45ABA42EF75DC01C760
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: x
                                                                        • API String ID: 0-2363233923
                                                                        • Opcode ID: cc77272222d09f9b3e8e7dc35d4396ed1e50a5a1df7a949ef9c02a18000c61cf
                                                                        • Instruction ID: cdbb1d4b41a264391f31279463ee9e8db51f7a06bf36a1bae859705254ac4300
                                                                        • Opcode Fuzzy Hash: cc77272222d09f9b3e8e7dc35d4396ed1e50a5a1df7a949ef9c02a18000c61cf
                                                                        • Instruction Fuzzy Hash: 1302A174D00219EFCB45CF98C985AAEBBF4FB09305F10846AE826EB390D734AA41CF55
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,003AEE8A,003AB95D,003AB041), ref: 003AEEA1
                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 003AEEAF
                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003AEEC8
                                                                        • SetLastError.KERNEL32(00000000,003AEE8A,003AB95D,003AB041), ref: 003AEF1A
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastValue___vcrt_
                                                                        • String ID:
                                                                        • API String ID: 3852720340-0
                                                                        • Opcode ID: d032c85a8edc1020789cf9920d07a2eface61fe4d883638e48dec6e7054cac1f
                                                                        • Instruction ID: 0c6484403986e18369648ab9db4f6ca6b163a105e05acf06c1f7b0cd4f4f0b96
                                                                        • Opcode Fuzzy Hash: d032c85a8edc1020789cf9920d07a2eface61fe4d883638e48dec6e7054cac1f
                                                                        • Instruction Fuzzy Hash: DF01F73A2097116EA7272BB47CC5EAB3B9CEB03779B210329F6108A5F1FF119C109690
                                                                        APIs
                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,003BA898,000000FF,?,003ACA21,?,?,003ACABD,00000000), ref: 003AC995
                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 003AC9A7
                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,003BA898,000000FF,?,003ACA21,?,?,003ACABD,00000000), ref: 003AC9C9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 4061214504-1276376045
                                                                        • Opcode ID: cdedc64ade9b3425fb1dc7da3c47fda0cef7f5e21aab8f660635a24338a50b1d
                                                                        • Instruction ID: 06c7efc5e3f389f3b0a573f092d79441ddc1ee855aad0e427a0426641a80fab7
                                                                        • Opcode Fuzzy Hash: cdedc64ade9b3425fb1dc7da3c47fda0cef7f5e21aab8f660635a24338a50b1d
                                                                        • Instruction Fuzzy Hash: B801A236914625AFCB138B50CC09FEEBBBCFB06B14F004529E811E2690DB74A900CB80
                                                                        APIs
                                                                        • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,003AFA45,?,?,00000000,00000000,00000000,?), ref: 003AFB64
                                                                        • CatchIt.LIBVCRUNTIME ref: 003AFC4A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CatchEncodePointer
                                                                        • String ID: MOC$RCC
                                                                        • API String ID: 1435073870-2084237596
                                                                        • Opcode ID: b4f66c5963cc4ffe06dbf2d40115e590754f82bb32ed27f362cba146d83c67e4
                                                                        • Instruction ID: 27d70a524cfc03c32fe209ea526cd01f7df0262d419d6528aeb55147ad0d5a91
                                                                        • Opcode Fuzzy Hash: b4f66c5963cc4ffe06dbf2d40115e590754f82bb32ed27f362cba146d83c67e4
                                                                        • Instruction Fuzzy Hash: C2416772900209AFCF16DF98CD81EEEBBB5FF4A314F198169F905AB221D3359950DB50
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: Cnd_broadcastCurrentMtx_unlockThread
                                                                        • String ID: 8C<
                                                                        • API String ID: 2021000804-553782651
                                                                        • Opcode ID: e18fdac4b0105022bbc62bd2ec3824afdabdfe92615a3978c493b0ffae5cc844
                                                                        • Instruction ID: 0e20e2ff773730ba99e2b7d881a86bc6b79963a19163447130224ac2af29d90a
                                                                        • Opcode Fuzzy Hash: e18fdac4b0105022bbc62bd2ec3824afdabdfe92615a3978c493b0ffae5cc844
                                                                        • Instruction Fuzzy Hash: E701F13B600F02DFDF239BA5C45079AB3A5EF02311F46092DE8869B280D7B0AC10CB92
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,003B57BD,00000000,?,003C4D00,?,?,?,003B56F4,00000004,InitializeCriticalSectionEx,003BC714,003BC71C), ref: 003B572E
                                                                        • GetLastError.KERNEL32(?,003B57BD,00000000,?,003C4D00,?,?,?,003B56F4,00000004,InitializeCriticalSectionEx,003BC714,003BC71C,00000000,?,003AFD6C), ref: 003B5738
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 003B5760
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad$ErrorLast
                                                                        • String ID: api-ms-
                                                                        • API String ID: 3177248105-2084034818
                                                                        • Opcode ID: e0f716d28df304308ee5a98432e30f154c75d73a4a71dd1f3e5c0c37373686fb
                                                                        • Instruction ID: 385995511e411e6a8730a00b3fc39903d344ef12ed03da00a36440acb55a2853
                                                                        • Opcode Fuzzy Hash: e0f716d28df304308ee5a98432e30f154c75d73a4a71dd1f3e5c0c37373686fb
                                                                        • Instruction Fuzzy Hash: DBE01231780244F7EB122B60ED06F993A99AB11B49F144020FA0CE88A2DBA6E9109644
                                                                        APIs
                                                                        • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 003B625A
                                                                          • Part of subcall function 003B36C0: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,003B5BE8,?,00000000,-00000008), ref: 003B3721
                                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 003B64AC
                                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 003B64F2
                                                                        • GetLastError.KERNEL32 ref: 003B6595
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                        • String ID:
                                                                        • API String ID: 2112829910-0
                                                                        • Opcode ID: efacc886b612fdd416f15e107eed54afb2a7e97c026857f91c1af623269e3ac2
                                                                        • Instruction ID: 8a277544f066ab1cd80adc4842b84e5c1011d85459bd5c5f86b01f2191ce30ae
                                                                        • Opcode Fuzzy Hash: efacc886b612fdd416f15e107eed54afb2a7e97c026857f91c1af623269e3ac2
                                                                        • Instruction Fuzzy Hash: 37D1AEB5D006489FCF16CFA8C8819EDBBB8FF09318F18452AE526EB752D734A951CB50
                                                                        APIs
                                                                        • GetCurrentThreadId.KERNEL32 ref: 003A48A6
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentThread
                                                                        • String ID:
                                                                        • API String ID: 2882836952-0
                                                                        • Opcode ID: f8916b2c111265356a8ff8cfd4e7496d6f9aceaab16f3fb2ac78745baafc7745
                                                                        • Instruction ID: 2a64dc2a4c5e7ed625cd5e48cc36af9b3466ddcd8aa38dcaeffbd5f0b8c6e7b4
                                                                        • Opcode Fuzzy Hash: f8916b2c111265356a8ff8cfd4e7496d6f9aceaab16f3fb2ac78745baafc7745
                                                                        • Instruction Fuzzy Hash: EF5159367006018FCA299A18ACD27BF33D9EBD3351F26451DE506CB2A1DBBADC458B52
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: AdjustPointer
                                                                        • String ID:
                                                                        • API String ID: 1740715915-0
                                                                        • Opcode ID: 363c24c6c7f39ed898717981d2d80c0c1d4561d365c9054d6c6c347316e284d9
                                                                        • Instruction ID: 6f91fd85f498c9880e09f3da10c0fd53604656d1a3fe33d32d758b63fe7fba6a
                                                                        • Opcode Fuzzy Hash: 363c24c6c7f39ed898717981d2d80c0c1d4561d365c9054d6c6c347316e284d9
                                                                        • Instruction Fuzzy Hash: E951DE72A01606AFDB2B9F90D941BBAB3A4EF03710F15413DE8059B2B1E735EC40DB90
                                                                        APIs
                                                                          • Part of subcall function 003B36C0: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,003B5BE8,?,00000000,-00000008), ref: 003B3721
                                                                        • GetLastError.KERNEL32(?,?,?,00000000,00000000,?,003B2EED,?,?,?,00000000), ref: 003B2BAB
                                                                        • __dosmaperr.LIBCMT ref: 003B2BB2
                                                                        • GetLastError.KERNEL32(00000000,003B2EED,?,?,00000000,?,?,?,00000000,00000000,?,003B2EED,?,?,?,00000000), ref: 003B2BEC
                                                                        • __dosmaperr.LIBCMT ref: 003B2BF3
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 1913693674-0
                                                                        • Opcode ID: 6f92817fac4f4fa151f4fbd984750c029b0b61e1dd30e92c848dc67477e05ca9
                                                                        • Instruction ID: bc929b5a1223448e07b095fd48b2c8e360d4c3ebe60bc7dde3b79d14328b004d
                                                                        • Opcode Fuzzy Hash: 6f92817fac4f4fa151f4fbd984750c029b0b61e1dd30e92c848dc67477e05ca9
                                                                        • Instruction Fuzzy Hash: F821A171600215AF9B22AF6198819EBBBACFF0436C7518619FA159BD11EB31EC0087A0
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ce0fe7ae97002f8d1248f9527746ce5521deddbdb974c87bd8882dba064e0fb1
                                                                        • Instruction ID: 48767d1808b01f44def465f8b0ae0ccf46db1acd3805a9fea53f45f408a8fded
                                                                        • Opcode Fuzzy Hash: ce0fe7ae97002f8d1248f9527746ce5521deddbdb974c87bd8882dba064e0fb1
                                                                        • Instruction Fuzzy Hash: 6621D171604229AFDB22BF69CC809EBB7ADAF0432D7414528FA25CBD11D730FE008760
                                                                        APIs
                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 003B37C4
                                                                          • Part of subcall function 003B36C0: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,003B5BE8,?,00000000,-00000008), ref: 003B3721
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 003B37FC
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 003B381C
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                        • String ID:
                                                                        • API String ID: 158306478-0
                                                                        • Opcode ID: d201bae2791fa9535ca9f36e817d9c02766dc722ee7ae7a46da2dea2ba1c8dc9
                                                                        • Instruction ID: 52a3a578d507eacd8dc5b468f836c3fd7943d0636eb80732d605b9a62a52cc80
                                                                        • Opcode Fuzzy Hash: d201bae2791fa9535ca9f36e817d9c02766dc722ee7ae7a46da2dea2ba1c8dc9
                                                                        • Instruction Fuzzy Hash: 111126F5900229BFA72327B15C8DCFF2A5CCE853AD7110025FB01D5902EA20DF0482B2
                                                                        APIs
                                                                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,003B8331,00000000,00000001,00000000,?,?,003B65E9,?,00000000,00000000), ref: 003B8AA7
                                                                        • GetLastError.KERNEL32(?,003B8331,00000000,00000001,00000000,?,?,003B65E9,?,00000000,00000000,?,?,?,003B5F2F,00000000), ref: 003B8AB3
                                                                          • Part of subcall function 003B8B04: CloseHandle.KERNEL32(FFFFFFFE,003B8AC3,?,003B8331,00000000,00000001,00000000,?,?,003B65E9,?,00000000,00000000,?,?), ref: 003B8B14
                                                                        • ___initconout.LIBCMT ref: 003B8AC3
                                                                          • Part of subcall function 003B8AE5: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,003B8A81,003B831E,?,?,003B65E9,?,00000000,00000000,?), ref: 003B8AF8
                                                                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,003B8331,00000000,00000001,00000000,?,?,003B65E9,?,00000000,00000000,?), ref: 003B8AD8
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                        • String ID:
                                                                        • API String ID: 2744216297-0
                                                                        • Opcode ID: 0a1ed983d7cb47cf05e68bed2981f4f7dbf54bf251ca5b852149429797625675
                                                                        • Instruction ID: 7dce5a1d115410e8847c863df314e4b9bf347d4f43a291e44cf59060fb7f56dc
                                                                        • Opcode Fuzzy Hash: 0a1ed983d7cb47cf05e68bed2981f4f7dbf54bf251ca5b852149429797625675
                                                                        • Instruction Fuzzy Hash: 38F01C36400158BBCF232FA2DC08DCA3F6AFF093A5F114414FA09D5921CA729920EB90
                                                                        APIs
                                                                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                                                                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                                                                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                                                                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,00000005,00000000,00000000), ref: 00402ECA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CriticalHeapSection$AllocateByteCharEnterLeaveMultiProcessWide
                                                                        • String ID: 6#@
                                                                        • API String ID: 1990697408-399668929
                                                                        • Opcode ID: 1f26a5c5fc2634c2030f9b83c1c8166a34ad48809439acca6c6bd24674cc38fe
                                                                        • Instruction ID: 04ec494e2720618fda0ea9b48e18905337fba48f3a471985427a56106dfb7a8a
                                                                        • Opcode Fuzzy Hash: 1f26a5c5fc2634c2030f9b83c1c8166a34ad48809439acca6c6bd24674cc38fe
                                                                        • Instruction Fuzzy Hash: 9202AF70A04249EFCB41CF98C985AAEBBF4BF09305F148466E855FB390D778AA41CF55
                                                                        APIs
                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 003AF3BC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: ___except_validate_context_record
                                                                        • String ID: csm$csm
                                                                        • API String ID: 3493665558-3733052814
                                                                        • Opcode ID: 643ea4e8ec1e0df71fb3a56e378134e4906b46b5809f9296df6b74d030adc28b
                                                                        • Instruction ID: eb6bd1248499873b435cff12ca311df82f973820f6702b84a1d8489f5a3bfe52
                                                                        • Opcode Fuzzy Hash: 643ea4e8ec1e0df71fb3a56e378134e4906b46b5809f9296df6b74d030adc28b
                                                                        • Instruction Fuzzy Hash: F631D3325002149FCF279FE6C8419AB7B66FF4E325B19867AFD444A121C336CC62DB91
                                                                        APIs
                                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,$d.log,000000FF,00000000,00000000,00000000,00000000,?,?,?,00403E4E,00000000,?,0000011C), ref: 00403DC1
                                                                          • Part of subcall function 00403595: EnterCriticalSection.KERNEL32(004084D4,?,?,00403C72,?,004022DE), ref: 0040359F
                                                                          • Part of subcall function 00403595: GetProcessHeap.KERNEL32(00000008,?,?,?,00403C72,?,004022DE), ref: 004035A8
                                                                          • Part of subcall function 00403595: RtlAllocateHeap.NTDLL(00000000,?,?,?,00403C72,?,004022DE), ref: 004035AF
                                                                          • Part of subcall function 00403595: LeaveCriticalSection.KERNEL32(004084D4,?,?,?,00403C72,?,004022DE), ref: 004035B8
                                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,$d.log,000000FF,00000000,?,00000000,00000000,?,00403E4E,00000000,?,0000011C), ref: 00403DF7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125417255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_400000_file.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ByteCharCriticalHeapMultiSectionWide$AllocateEnterLeaveProcess
                                                                        • String ID: $d.log
                                                                        • API String ID: 635875880-1910398676
                                                                        • Opcode ID: 596067efd1d70e71452a917ac77f7634f6861e6932447c6e6420039467924f9e
                                                                        • Instruction ID: ac6dd0e6687c57a2322cdc8011629eff706fdab16a0174ef90b3a49cae1c3f8c
                                                                        • Opcode Fuzzy Hash: 596067efd1d70e71452a917ac77f7634f6861e6932447c6e6420039467924f9e
                                                                        • Instruction Fuzzy Hash: 46F0BEB16001207FA3246A6ACC09C777EAEDBC2B71304433ABC18EB3D0D9309C0082B0
                                                                        APIs
                                                                        • FreeLibrary.KERNEL32(003C4D20), ref: 003B00B8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000003.00000002.2125322206.00000000003A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003A0000, based on PE: true
                                                                        • Associated: 00000003.00000002.2125302563.00000000003A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125343767.00000000003BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125363369.00000000003C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125381306.00000000003C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000003.00000002.2125398518.00000000003C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_3_2_3a0000_file.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary
                                                                        • String ID: M<$xM<
                                                                        • API String ID: 3664257935-2597119641
                                                                        • Opcode ID: 60b9c0b95b931abf3d2b31a30d36cd30b9b85bbd58d93ed5c6610495f42da926
                                                                        • Instruction ID: 892066db1857b7ab4c803c6a4808681f0674dd8ca8ef230d2b36e92f51deabfa
                                                                        • Opcode Fuzzy Hash: 60b9c0b95b931abf3d2b31a30d36cd30b9b85bbd58d93ed5c6610495f42da926
                                                                        • Instruction Fuzzy Hash: CAE08636C116189BDB373E08D408BD276D85B5133AF17052AD5DD525A192B11CD1C781