Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
avutil.dll.dll

Overview

General Information

Sample name:avutil.dll.dll
(renamed file extension from exe to dll)
Original sample name:avutil.dll.exe
Analysis ID:1567647
MD5:2334a6aede2ad2a9004ecd96c872a910
SHA1:45f7683952a599a607ba6b9b02dacc1586135f22
SHA256:c3baf0446831b6968a30ea23647ac559ee62219f91daae5c1b0a9787f9c860b9
Tags:BruteRatelBruteRatelC4exeLatrodectususer-k3dg3___
Infos:

Detection

BruteRatel
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected BruteRatel
Allocates memory in foreign processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 3268 cmdline: loaddll64.exe "C:\Users\user\Desktop\avutil.dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5996 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 4976 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2304 cmdline: rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,DLLMain MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6368 cmdline: rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,av_add_q MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5896 cmdline: rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,av_add_stable MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4232 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",DLLMain MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7020 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_add_q MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7040 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_add_stable MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3700 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_version MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5692 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_license MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3536 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_configuration MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2128 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_vga16_font MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 612 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_tempfile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1112 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_solve_lls MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5140 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_free MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 992 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_execute MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3468 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_create MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5392 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_set_systematic_pal2 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3424 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_scalarproduct_float_c MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5236 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_request_sample MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2544 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_report_missing_feature MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2308 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_open MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7052 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_init_lls MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 884 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_fopen_utf8 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1396 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_float_dsp_alloc MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2888 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_dict_set_timestamp MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6108 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_cga_font MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4900 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_alloc_fixed_dsp MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1372 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_le_init MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4616 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_le_crypt MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6516 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_init MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4196 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_crypt MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5936 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_alloc MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 368 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_write_image_line2 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7176 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_write_image_line MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7184 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vlog MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7192 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vkfmt_from_pixfmt MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7200 cmdline: rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vk_frame_alloc MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Brute Ratel C4, BruteRatelBrute Ratel C4 (BRC4) is a commercial framework for red-teaming and adversarial attack simulation, which made its first appearance in December 2020. It was specifically designed to evade detection by endpoint detection and response (EDR) and antivirus (AV) capabilities. BRC4 allows operators to deploy a backdoor agent known as Badger (aka BOLDBADGER) within a target environment.This agent enables arbitrary command execution, facilitating lateral movement, privilege escalation, and the establishment of additional persistence avenues. The Badger backdoor agent can communicate with a remote server via DNS over HTTPS, HTTP, HTTPS, SMB, and TCP, using custom encrypted channels. It supports a variety of backdoor commands including shell command execution, file transfers, file execution, and credential harvesting. Additionally, the Badger agent can perform tasks such as port scanning, screenshot capturing, and keystroke logging. Notably, in September 2022, a cracked version of Brute Ratel C4 was leaked in the cybercriminal underground, leading to its use by threat actors.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.brute_ratel_c4
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.4681807964.0000023B61A2C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
    00000009.00000002.4718709422.0000026D524AC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
      00000009.00000003.2620826714.0000026D524DB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
        00000003.00000002.4678724103.0000021E0152D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
          00000003.00000003.3250744554.0000021E0152D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
            Click to see the 6 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-03T17:43:27.566091+010020283713Unknown Traffic192.168.2.64974420.42.65.92443TCP
            2024-12-03T17:43:27.567553+010020283713Unknown Traffic192.168.2.64974620.42.65.92443TCP
            2024-12-03T17:43:27.623125+010020283713Unknown Traffic192.168.2.64974320.42.65.92443TCP
            2024-12-03T17:43:27.624411+010020283713Unknown Traffic192.168.2.64974520.42.65.92443TCP
            2024-12-03T17:46:46.269900+010020283713Unknown Traffic192.168.2.650006188.114.96.6443TCP
            2024-12-03T17:47:23.184566+010020283713Unknown Traffic192.168.2.65000720.42.73.29443TCP
            2024-12-03T17:47:28.167489+010020283713Unknown Traffic192.168.2.65000820.42.73.29443TCP
            2024-12-03T17:47:28.974293+010020283713Unknown Traffic192.168.2.65000920.42.73.29443TCP
            2024-12-03T17:47:31.131851+010020283713Unknown Traffic192.168.2.65001020.42.73.29443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-03T17:46:46.275407+010020487351A Network Trojan was detected192.168.2.650006188.114.96.6443TCP

            Click to jump to signature section

            Show All Signature Results
            Source: avutil.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2048735 - Severity 1 - ET MALWARE Latrodectus Loader Related Activity (POST) : 192.168.2.6:50006 -> 188.114.96.6:443
            Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.43.224 6542Jump to behavior
            Source: C:\Windows\System32\rundll32.exeNetwork Connect: 103.57.249.207 6542Jump to behavior
            Source: global trafficTCP traffic: 192.168.2.6:49707 -> 103.57.249.207:6542
            Source: global trafficTCP traffic: 192.168.2.6:49709 -> 94.232.43.224:6542
            Source: Joe Sandbox ViewASN Name: SITINETWORS-IN-APSITINETWORKSLIMITEDIN SITINETWORS-IN-APSITINETWORKSLIMITEDIN
            Source: Joe Sandbox ViewASN Name: WELLWEBNL WELLWEBNL
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49745 -> 20.42.65.92:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49743 -> 20.42.65.92:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49746 -> 20.42.65.92:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49744 -> 20.42.65.92:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50008 -> 20.42.73.29:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50007 -> 20.42.73.29:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50009 -> 20.42.73.29:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50006 -> 188.114.96.6:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:50010 -> 20.42.73.29:443
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: vutarf.com
            Source: global trafficDNS traffic detected: DNS query: huanvn.com
            Source: rundll32.exe, 00000009.00000003.2620690341.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681991702.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.o
            Source: rundll32.exe, 00000004.00000003.2618031585.0000023B5C153000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618031585.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250618182.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C1A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C0F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4679205737.0000026D4CB28000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620690341.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401277048.0000026D4CBF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681991702.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
            Source: rundll32.exe, 00000004.00000003.2618031585.0000023B5C153000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618031585.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250618182.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C1A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C0F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4679205737.0000026D4CB28000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620690341.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401277048.0000026D4CBF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681991702.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289737477.0000021E01528000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0
            Source: rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.oCt
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289737477.0000021E01528000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250525715.0000021E0151E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289737477.0000021E01528000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E01525000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618014731.0000023B5C1B9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618031585.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250618182.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C0F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1BC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4679205737.0000026D4CB28000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620690341.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401277048.0000026D4CBF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250525715.0000021E0151E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289737477.0000021E01528000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E01525000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618014731.0000023B5C1B9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618031585.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250618182.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C0F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1BC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4679205737.0000026D4CB28000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620690341.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401277048.0000026D4CBF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: rundll32.exe, 00000004.00000002.4668299780.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://huanvn.com/
            Source: rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://huanvn.com/2
            Source: rundll32.exe, 00000004.00000003.2618031585.0000023B5C153000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://huanvn.com/4
            Source: rundll32.exe, 00000004.00000003.2618031585.0000023B5C189000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://huanvn.com:6542/
            Source: rundll32.exe, 00000004.00000002.4668075279.0000023B5C0F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://huanvn.com:6542/gop.php
            Source: rundll32.exe, 00000004.00000003.2618031585.0000023B5C153000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://huanvn.com:6542/gop.phpO
            Source: rundll32.exe, 00000009.00000002.4681505732.0000026D4CBDE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://huanvn.com:6542/stop.php
            Source: rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://huanvn.com:6542/stop.phpb
            Source: rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://huanvn.com:6542/stop.phpq
            Source: loaddll64.exe, 00000000.00000002.4682995000.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.4682042385.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2283430783.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2304898278.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2303220927.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2305957918.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2302816272.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2290332722.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2277869231.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2297403449.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2303131049.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2303978956.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2360364252.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2289876882.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2358440180.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2361221187.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2303968170.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.2296520709.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2358802398.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.2278843733.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000026.00000002.2303493254.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://streams.videolan.org/upload/
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CB83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vutarf.com/
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vutarf.com/K3
            Source: rundll32.exe, 00000009.00000003.2620708987.0000026D4CB83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vutarf.com/kY
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E01513000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vutarf.com:6542/
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E01513000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401439218.0000026D4CB65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vutarf.com:6542/gop.php
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vutarf.com:6542/gop.phpA
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E01513000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vutarf.com:6542/gop.phpM
            Source: rundll32.exe, 00000009.00000003.2620708987.0000026D4CB83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vutarf.com:6542/gop.phpRc
            Source: rundll32.exe, 00000009.00000003.2620708987.0000026D4CB83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vutarf.com:6542/gop.phpoc
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E0146F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vutarf.com:6542/stop.php
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vutarf.com:6542/stop.php&
            Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021E06BFD326 NtProtectVirtualMemory,3_3_0000021E06BFD326
            Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021E06BFD2B6 NtAllocateVirtualMemory,3_3_0000021E06BFD2B6
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016B17B0 NtClose,NtClose,3_2_0000021E016B17B0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016E4360 NtCreateThreadEx,3_2_0000021E016E4360
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016E4BE0 NtProtectVirtualMemory,3_2_0000021E016E4BE0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016E4FF0 NtQueueApcThread,3_2_0000021E016E4FF0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016E4740 NtFreeVirtualMemory,3_2_0000021E016E4740
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016E3F40 NtAllocateVirtualMemory,3_2_0000021E016E3F40
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016B71B0 NtClose,3_2_0000021E016B71B0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016C7A50 NtSetContextThread,3_2_0000021E016C7A50
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016B1600 NtClose,RtlExitUserThread,3_2_0000021E016B1600
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016C8149 NtSetContextThread,3_2_0000021E016C8149
            Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000023B6169D326 NtProtectVirtualMemory,4_3_0000023B6169D326
            Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000023B6169D2B6 NtAllocateVirtualMemory,4_3_0000023B6169D2B6
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B61504FF0 NtQueueApcThread,4_2_0000023B61504FF0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B61504BE0 NtProtectVirtualMemory,4_2_0000023B61504BE0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B61504740 NtFreeVirtualMemory,4_2_0000023B61504740
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B61503F40 NtAllocateVirtualMemory,4_2_0000023B61503F40
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614D17B0 NtClose,NtClose,4_2_0000023B614D17B0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B61504360 NtCreateThreadEx,4_2_0000023B61504360
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614E7A50 NtSetContextThread,4_2_0000023B614E7A50
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614D1600 NtClose,RtlExitUserThread,4_2_0000023B614D1600
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614E8149 NtSetContextThread,4_2_0000023B614E8149
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85FBFB80_2_0000026CE85FBFB8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE8608BB00_2_0000026CE8608BB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85FFD380_2_0000026CE85FFD38
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85FED840_2_0000026CE85FED84
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85DAED40_2_0000026CE85DAED4
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85DDED40_2_0000026CE85DDED4
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85CDE7C0_2_0000026CE85CDE7C
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85DBE740_2_0000026CE85DBE74
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE8607E700_2_0000026CE8607E70
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE8602F340_2_0000026CE8602F34
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85D8F7C0_2_0000026CE85D8F7C
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85E00380_2_0000026CE85E0038
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85DA0300_2_0000026CE85DA030
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE860C0640_2_0000026CE860C064
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85EB0740_2_0000026CE85EB074
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE860214C0_2_0000026CE860214C
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85FF1340_2_0000026CE85FF134
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85F71E40_2_0000026CE85F71E4
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85E41DC0_2_0000026CE85E41DC
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85EC1980_2_0000026CE85EC198
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE86072440_2_0000026CE8607244
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE860A2940_2_0000026CE860A294
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85D83300_2_0000026CE85D8330
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85CD4400_2_0000026CE85CD440
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85EE5B40_2_0000026CE85EE5B4
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85F76440_2_0000026CE85F7644
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85DA6300_2_0000026CE85DA630
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85CF6C40_2_0000026CE85CF6C4
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85FB6A00_2_0000026CE85FB6A0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85E97440_2_0000026CE85E9744
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85DD7340_2_0000026CE85DD734
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85F47800_2_0000026CE85F4780
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85EE8400_2_0000026CE85EE840
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85DF84C0_2_0000026CE85DF84C
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85D78080_2_0000026CE85D7808
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85EA7F00_2_0000026CE85EA7F0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE86018BC0_2_0000026CE86018BC
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85F78D80_2_0000026CE85F78D8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85CE9E80_2_0000026CE85CE9E8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85E39CC0_2_0000026CE85E39CC
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85FB96C0_2_0000026CE85FB96C
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85FFAC40_2_0000026CE85FFAC4
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85F7AA80_2_0000026CE85F7AA8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE860DB3B0_2_0000026CE860DB3B
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85DDB040_2_0000026CE85DDB04
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE860AAF80_2_0000026CE860AAF8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85DEB900_2_0000026CE85DEB90
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE8606C200_2_0000026CE8606C20
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85D6CE00_2_0000026CE85D6CE0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68700240_2_0000026CE6870024
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68AF36C0_2_0000026CE68AF36C
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE6887BD80_2_0000026CE6887BD8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68B6AEC0_2_0000026CE68B6AEC
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68BA47E0_2_0000026CE68BA47E
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE687CCE80_2_0000026CE687CCE8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE688E4380_2_0000026CE688E438
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68A71800_2_0000026CE68A7180
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68B11640_2_0000026CE68B1164
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE687E2900_2_0000026CE687E290
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE687EF6C0_2_0000026CE687EF6C
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE688D77C0_2_0000026CE688D77C
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE687D7240_2_0000026CE687D724
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68AAF480_2_0000026CE68AAF48
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE689A0980_2_0000026CE689A098
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68870B00_2_0000026CE68870B0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68898D80_2_0000026CE68898D8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE689E0E80_2_0000026CE689E0E8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68888240_2_0000026CE6888824
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68865880_2_0000026CE6886588
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE68AF5E00_2_0000026CE68AF5E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE6889ED80_2_0000026CE6889ED8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE689DE5C0_2_0000026CE689DE5C
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CABFB83_2_0000021E04CABFB8
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CB8BB03_2_0000021E04CB8BB0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C883303_2_0000021E04C88330
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CBA2943_2_0000021E04CBA294
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C7D4403_2_0000021E04C7D440
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C8A6303_2_0000021E04C8A630
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CA76443_2_0000021E04CA7644
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C9E5B43_2_0000021E04C9E5B4
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CB2F343_2_0000021E04CB2F34
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C8AED43_2_0000021E04C8AED4
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C8DED43_2_0000021E04C8DED4
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C7DE7C3_2_0000021E04C7DE7C
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CB7E703_2_0000021E04CB7E70
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C8BE743_2_0000021E04C8BE74
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C900383_2_0000021E04C90038
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C8A0303_2_0000021E04C8A030
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C88F7C3_2_0000021E04C88F7C
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CAF1343_2_0000021E04CAF134
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CB214C3_2_0000021E04CB214C
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CBC0643_2_0000021E04CBC064
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C9B0743_2_0000021E04C9B074
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CB72443_2_0000021E04CB7244
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CA71E43_2_0000021E04CA71E4
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C941DC3_2_0000021E04C941DC
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C9C1983_2_0000021E04C9C198
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CBDB3B3_2_0000021E04CBDB3B
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CBAAF83_2_0000021E04CBAAF8
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C8DB043_2_0000021E04C8DB04
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CA7AA83_2_0000021E04CA7AA8
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CAFAC43_2_0000021E04CAFAC4
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CB6C203_2_0000021E04CB6C20
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C8EB903_2_0000021E04C8EB90
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CAFD383_2_0000021E04CAFD38
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C86CE03_2_0000021E04C86CE0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CAED843_2_0000021E04CAED84
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C8D7343_2_0000021E04C8D734
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C997443_2_0000021E04C99744
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CAB6A03_2_0000021E04CAB6A0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C7F6C43_2_0000021E04C7F6C4
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C8F84C3_2_0000021E04C8F84C
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C9E8403_2_0000021E04C9E840
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C9A7F03_2_0000021E04C9A7F0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C878083_2_0000021E04C87808
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CA47803_2_0000021E04CA4780
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CB18BC3_2_0000021E04CB18BC
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CA78D83_2_0000021E04CA78D8
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C7E9E83_2_0000021E04C7E9E8
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04C939CC3_2_0000021E04C939CC
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CAB96C3_2_0000021E04CAB96C
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016DFBC03_2_0000021E016DFBC0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016D13A33_2_0000021E016D13A3
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016D2BB03_2_0000021E016D2BB0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016E2F603_2_0000021E016E2F60
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016E28123_2_0000021E016E2812
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016CCBE03_2_0000021E016CCBE0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016B66C03_2_0000021E016B66C0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016CBED03_2_0000021E016CBED0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016C16A03_2_0000021E016C16A0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016C42A03_2_0000021E016C42A0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016D82A03_2_0000021E016D82A0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016E1F403_2_0000021E016E1F40
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016BA7303_2_0000021E016BA730
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016D66E03_2_0000021E016D66E0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016C55C03_2_0000021E016C55C0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016B99D03_2_0000021E016B99D0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016C4DB03_2_0000021E016C4DB0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016B5D603_2_0000021E016B5D60
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016D72203_2_0000021E016D7220
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016E02103_2_0000021E016E0210
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016DB5E03_2_0000021E016DB5E0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016D55E03_2_0000021E016D55E0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016E14903_2_0000021E016E1490
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016D45503_2_0000021E016D4550
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016C91203_2_0000021E016C9120
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016B95003_2_0000021E016B9500
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016CA1003_2_0000021E016CA100
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016CB4E03_2_0000021E016CB4E0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F200243_2_0000021E02F20024
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F4E0E83_2_0000021E02F4E0E8
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F398D83_2_0000021E02F398D8
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F370B03_2_0000021E02F370B0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F4A0983_2_0000021E02F4A098
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F571803_2_0000021E02F57180
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F611643_2_0000021E02F61164
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F5AF483_2_0000021E02F5AF48
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F2D7243_2_0000021E02F2D724
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F39ED83_2_0000021E02F39ED8
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F388243_2_0000021E02F38824
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F3D77C3_2_0000021E02F3D77C
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F2EF6C3_2_0000021E02F2EF6C
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F2CCE83_2_0000021E02F2CCE8
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F6A47E3_2_0000021E02F6A47E
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F4DE5C3_2_0000021E02F4DE5C
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F5F5E03_2_0000021E02F5F5E0
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F365883_2_0000021E02F36588
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F66AEC3_2_0000021E02F66AEC
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F2E2903_2_0000021E02F2E290
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F3E4383_2_0000021E02F3E438
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F37BD83_2_0000021E02F37BD8
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E02F5F36C3_2_0000021E02F5F36C
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F78BFB84_2_0000023B5F78BFB8
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F798BB04_2_0000023B5F798BB0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F75E9E84_2_0000023B5F75E9E8
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F78FAC44_2_0000023B5F78FAC4
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F787AA84_2_0000023B5F787AA8
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7739CC4_2_0000023B5F7739CC
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F78B96C4_2_0000023B5F78B96C
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F76F84C4_2_0000023B5F76F84C
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F77E8404_2_0000023B5F77E840
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7678084_2_0000023B5F767808
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F77A7F04_2_0000023B5F77A7F0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7878D84_2_0000023B5F7878D8
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7918BC4_2_0000023B5F7918BC
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7797444_2_0000023B5F779744
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F76D7344_2_0000023B5F76D734
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7847804_2_0000023B5F784780
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7876444_2_0000023B5F787644
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F76A6304_2_0000023B5F76A630
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F75F6C44_2_0000023B5F75F6C4
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F78B6A04_2_0000023B5F78B6A0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F77E5B44_2_0000023B5F77E5B4
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F75D4404_2_0000023B5F75D440
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7683304_2_0000023B5F768330
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7972444_2_0000023B5F797244
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7871E44_2_0000023B5F7871E4
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7741DC4_2_0000023B5F7741DC
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F79A2944_2_0000023B5F79A294
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F79214C4_2_0000023B5F79214C
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F78F1344_2_0000023B5F78F134
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F77C1984_2_0000023B5F77C198
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F76A0304_2_0000023B5F76A030
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F7700384_2_0000023B5F770038
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F77B0744_2_0000023B5F77B074
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F79C0644_2_0000023B5F79C064
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F792F344_2_0000023B5F792F34
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F768F7C4_2_0000023B5F768F7C
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F76DED44_2_0000023B5F76DED4
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F76AED44_2_0000023B5F76AED4
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F75DE7C4_2_0000023B5F75DE7C
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F797E704_2_0000023B5F797E70
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F76BE744_2_0000023B5F76BE74
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F78FD384_2_0000023B5F78FD38
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F766CE04_2_0000023B5F766CE0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F78ED844_2_0000023B5F78ED84
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F796C204_2_0000023B5F796C20
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F79DB3B4_2_0000023B5F79DB3B
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F76DB044_2_0000023B5F76DB04
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F79AAF84_2_0000023B5F79AAF8
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F76EB904_2_0000023B5F76EB90
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA000244_2_0000023B5DA00024
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA2A0984_2_0000023B5DA2A098
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA198D84_2_0000023B5DA198D8
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA170B04_2_0000023B5DA170B0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA188244_2_0000023B5DA18824
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA1D77C4_2_0000023B5DA1D77C
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA0EF6C4_2_0000023B5DA0EF6C
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA3AF484_2_0000023B5DA3AF48
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA0D7244_2_0000023B5DA0D724
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA0E2904_2_0000023B5DA0E290
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA371804_2_0000023B5DA37180
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA411644_2_0000023B5DA41164
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA2E0E84_2_0000023B5DA2E0E8
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA4A47E4_2_0000023B5DA4A47E
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA1E4384_2_0000023B5DA1E438
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA3F36C4_2_0000023B5DA3F36C
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA17BD84_2_0000023B5DA17BD8
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA46AEC4_2_0000023B5DA46AEC
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA2DE5C4_2_0000023B5DA2DE5C
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA19ED84_2_0000023B5DA19ED8
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA3F5E04_2_0000023B5DA3F5E0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA165884_2_0000023B5DA16588
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5DA0CCE84_2_0000023B5DA0CCE8
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614ECBE04_2_0000023B614ECBE0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B615028124_2_0000023B61502812
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B615014904_2_0000023B61501490
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614DA7304_2_0000023B614DA730
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B61501F404_2_0000023B61501F40
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614F66E04_2_0000023B614F66E0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614F13A34_2_0000023B614F13A3
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614F2BB04_2_0000023B614F2BB0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614FFBC04_2_0000023B614FFBC0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B61502F604_2_0000023B61502F60
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614F72204_2_0000023B614F7220
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614FB5E04_2_0000023B614FB5E0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614F55E04_2_0000023B614F55E0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B615002104_2_0000023B61500210
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614F82A04_2_0000023B614F82A0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614E16A04_2_0000023B614E16A0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614E42A04_2_0000023B614E42A0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614D66C04_2_0000023B614D66C0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614EBED04_2_0000023B614EBED0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614E91204_2_0000023B614E9120
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614F45504_2_0000023B614F4550
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614EB4E04_2_0000023B614EB4E0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614D95004_2_0000023B614D9500
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614EA1004_2_0000023B614EA100
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614E4DB04_2_0000023B614E4DB0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614E55C04_2_0000023B614E55C0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614D99D04_2_0000023B614D99D0
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B614D5D604_2_0000023B614D5D60
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C28BB06_2_0000020779C28BB0
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C1BFB86_2_0000020779C1BFB8
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C2AAF86_2_0000020779C2AAF8
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BFDB046_2_0000020779BFDB04
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C1FAC46_2_0000020779C1FAC4
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C039CC6_2_0000020779C039CC
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BEE9E86_2_0000020779BEE9E8
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C1B96C6_2_0000020779C1B96C
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BF6CE06_2_0000020779BF6CE0
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C26C206_2_0000020779C26C20
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BFEB906_2_0000020779BFEB90
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C2DB3B6_2_0000020779C2DB3B
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BFAED46_2_0000020779BFAED4
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BFDED46_2_0000020779BFDED4
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C27E706_2_0000020779C27E70
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BEDE7C6_2_0000020779BEDE7C
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BFBE746_2_0000020779BFBE74
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C1ED846_2_0000020779C1ED84
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C1FD386_2_0000020779C1FD38
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C0B0746_2_0000020779C0B074
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BFA0306_2_0000020779BFA030
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C000386_2_0000020779C00038
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C2C0646_2_0000020779C2C064
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C22FD96_2_0000020779C22FD9
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BF8F7C6_2_0000020779BF8F7C
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C2A2946_2_0000020779C2A294
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C272446_2_0000020779C27244
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C041DC6_2_0000020779C041DC
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C171E46_2_0000020779C171E4
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C0C1986_2_0000020779C0C198
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C1F1346_2_0000020779C1F134
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C2214C6_2_0000020779C2214C
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BED4406_2_0000020779BED440
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BF83306_2_0000020779BF8330
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BEF7056_2_0000020779BEF705
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BFA6306_2_0000020779BFA630
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C1B6A06_2_0000020779C1B6A0
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C176446_2_0000020779C17644
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C0E5B46_2_0000020779C0E5B4
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C218BC6_2_0000020779C218BC
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C0E8406_2_0000020779C0E840
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C0A84A6_2_0000020779C0A84A
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BFF84C6_2_0000020779BFF84C
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BF78086_2_0000020779BF7808
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C147806_2_0000020779C14780
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779BFD7346_2_0000020779BFD734
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C097446_2_0000020779C09744
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777E900246_2_0000020777E90024
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EA98D86_2_0000020777EA98D8
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EA88246_2_0000020777EA8824
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EAD77C6_2_0000020777EAD77C
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777E9D7246_2_0000020777E9D724
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777ECF5E06_2_0000020777ECF5E0
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EA65886_2_0000020777EA6588
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EDA47E6_2_0000020777EDA47E
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EAE4386_2_0000020777EAE438
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777ECF36C6_2_0000020777ECF36C
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777E9E2906_2_0000020777E9E290
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EC71806_2_0000020777EC7180
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777ED11646_2_0000020777ED1164
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EBE0E86_2_0000020777EBE0E8
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EA70B06_2_0000020777EA70B0
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EBA0986_2_0000020777EBA098
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777E9EF6C6_2_0000020777E9EF6C
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777ECAF486_2_0000020777ECAF48
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EA9ED86_2_0000020777EA9ED8
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EBDE5C6_2_0000020777EBDE5C
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777E9CCE86_2_0000020777E9CCE8
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777EA7BD86_2_0000020777EA7BD8
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020777ED6AEC6_2_0000020777ED6AEC
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61A8BB08_2_0000025DE61A8BB0
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE619BFB88_2_0000025DE619BFB8
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE6176CE08_2_0000025DE6176CE0
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE619FD388_2_0000025DE619FD38
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE619ED848_2_0000025DE619ED84
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE616DE7C8_2_0000025DE616DE7C
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61A7E708_2_0000025DE61A7E70
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE617BE748_2_0000025DE617BE74
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE619FAC48_2_0000025DE619FAC4
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61AAAF88_2_0000025DE61AAAF8
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE617DB048_2_0000025DE617DB04
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61ADB3B8_2_0000025DE61ADB3B
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE617EB908_2_0000025DE617EB90
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61A6C208_2_0000025DE61A6C20
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61978D88_2_0000025DE61978D8
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE619B96C8_2_0000025DE619B96C
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61839CC8_2_0000025DE61839CC
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE616E9E88_2_0000025DE616E9E8
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE6197AA88_2_0000025DE6197AA8
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE616F6C48_2_0000025DE616F6C4
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE617D7348_2_0000025DE617D734
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61897448_2_0000025DE6189744
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61947808_2_0000025DE6194780
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE618A7F08_2_0000025DE618A7F0
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61778088_2_0000025DE6177808
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE617F84C8_2_0000025DE617F84C
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE618E8408_2_0000025DE618E840
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61A18BC8_2_0000025DE61A18BC
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE618E5B48_2_0000025DE618E5B4
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE617A6308_2_0000025DE617A630
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61976448_2_0000025DE6197644
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE619B6A08_2_0000025DE619B6A0
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61783308_2_0000025DE6178330
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE616D4408_2_0000025DE616D440
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE619F1348_2_0000025DE619F134
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61A214C8_2_0000025DE61A214C
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE618C1988_2_0000025DE618C198
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61841DC8_2_0000025DE61841DC
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61971E48_2_0000025DE61971E4
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61A72448_2_0000025DE61A7244
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61AA2948_2_0000025DE61AA294
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE617AED48_2_0000025DE617AED4
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE617DED48_2_0000025DE617DED4
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61A2F348_2_0000025DE61A2F34
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE6178F7C8_2_0000025DE6178F7C
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61800388_2_0000025DE6180038
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE617A0308_2_0000025DE617A030
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE618B0748_2_0000025DE618B074
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61AC0648_2_0000025DE61AC064
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE44100248_2_0000025DE4410024
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE4456AEC8_2_0000025DE4456AEC
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE4427BD88_2_0000025DE4427BD8
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE441CCE88_2_0000025DE441CCE8
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE443DE5C8_2_0000025DE443DE5C
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE441D7248_2_0000025DE441D724
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE442D77C8_2_0000025DE442D77C
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE44288248_2_0000025DE4428824
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE44298D88_2_0000025DE44298D8
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE444F36C8_2_0000025DE444F36C
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE442E4388_2_0000025DE442E438
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE445A47E8_2_0000025DE445A47E
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE44265888_2_0000025DE4426588
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE444F5E08_2_0000025DE444F5E0
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE4429ED88_2_0000025DE4429ED8
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE444AF488_2_0000025DE444AF48
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE441EF6C8_2_0000025DE441EF6C
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE443A0988_2_0000025DE443A098
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE44270B08_2_0000025DE44270B0
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE443E0E88_2_0000025DE443E0E8
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE44471808_2_0000025DE4447180
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE44511648_2_0000025DE4451164
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE441E2908_2_0000025DE441E290
            Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000025DE6191484 appears 39 times
            Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000023B5F781484 appears 39 times
            Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000021E04CA1484 appears 39 times
            Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000020779C11484 appears 39 times
            Source: C:\Windows\System32\loaddll64.exeCode function: String function: 0000026CE85F1484 appears 39 times
            Source: avutil.dll.dllStatic PE information: Number of sections : 13 > 10
            Source: avutil.dll.dllBinary or memory string: OriginalFilenameavutil-lav-59.dll. vs avutil.dll.dll
            Source: classification engineClassification label: mal96.troj.evad.winDLL@119/1@4/2
            Source: C:\Windows\System32\rundll32.exeCode function: 3_3_00007DF40CCA0000 CreateToolhelp32Snapshot,Process32First,CloseHandle,Process32Next,3_3_00007DF40CCA0000
            Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\NTUSER.DAT.NotJump to behavior
            Source: C:\Windows\System32\rundll32.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:420:120:WilError_03
            Source: avutil.dll.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,DLLMain
            Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\avutil.dll.dll"
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,DLLMain
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",#1
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,av_add_q
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,av_add_stable
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",DLLMain
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_add_q
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_add_stable
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_version
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_license
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_configuration
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_vga16_font
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_tempfile
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_solve_lls
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_free
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_execute
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_create
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_set_systematic_pal2
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_scalarproduct_float_c
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_request_sample
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_report_missing_feature
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_open
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_init_lls
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_fopen_utf8
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_float_dsp_alloc
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_dict_set_timestamp
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_cga_font
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_alloc_fixed_dsp
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_le_init
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_le_crypt
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_init
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_crypt
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_alloc
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_write_image_line2
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_write_image_line
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vlog
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vkfmt_from_pixfmt
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vk_frame_alloc
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,DLLMainJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,av_add_qJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,av_add_stableJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",DLLMainJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_add_qJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_add_stableJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_versionJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_licenseJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_configurationJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_vga16_fontJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_tempfileJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_solve_llsJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_freeJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_executeJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_createJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_set_systematic_pal2Jump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_scalarproduct_float_cJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_request_sampleJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_report_missing_featureJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_openJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_init_llsJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_fopen_utf8Jump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_float_dsp_allocJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_dict_set_timestampJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_cga_fontJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_alloc_fixed_dspJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_le_initJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_le_cryptJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_initJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_cryptJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_allocJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_write_image_line2Jump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_write_image_lineJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vlogJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vkfmt_from_pixfmtJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vk_frame_allocJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\System32\loaddll64.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\loaddll64.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\loaddll64.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: avutil.dll.dllStatic PE information: More than 595 > 100 exports found
            Source: avutil.dll.dllStatic PE information: Image base 0x180000000 > 0x60000000
            Source: avutil.dll.dllStatic file information: File size 1752140 > 1048576
            Source: avutil.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
            Source: avutil.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: avutil.dll.dllStatic PE information: real checksum: 0x38ca43 should be: 0x1b07ed
            Source: avutil.dll.dllStatic PE information: section name: .xdata
            Source: avutil.dll.dllStatic PE information: section name: .debug
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE8610DBD pushfq ; retf 0_2_0000026CE8610F19
            Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021E06BC0105 push ecx; retf 3_3_0000021E06BC010E
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CC0EF2 pushfq ; retf 3_2_0000021E04CC0F19
            Source: C:\Windows\System32\rundll32.exeCode function: 4_3_0000023B61660105 push ecx; retf 4_3_0000023B6166010E
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C35CA5 push 0779C365h; ret 6_2_0000020779C35CC2
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C30F18 pushfq ; retf 6_2_0000020779C30F19
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C35DF5 push rax; ret 6_2_0000020779C35E31
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C357D5 push rax; ret 6_2_0000020779C35801
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61B0F18 pushfq ; retf 8_2_0000025DE61B0F19
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85F71E4 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0000026CE85F71E4
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\rundll32.exeCode function: GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,3_2_0000021E016D4D00
            Source: C:\Windows\System32\rundll32.exeCode function: GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,4_2_0000023B614F4D00
            Source: C:\Windows\System32\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_3-72241
            Source: C:\Windows\System32\loaddll64.exeAPI coverage: 7.3 %
            Source: C:\Windows\System32\rundll32.exeAPI coverage: 3.1 %
            Source: C:\Windows\System32\rundll32.exeAPI coverage: 5.9 %
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: rundll32.exe, 00000004.00000003.2618031585.0000023B5C153000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWU
            Source: rundll32.exe, 00000009.00000003.2620708987.0000026D4CB83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(a
            Source: rundll32.exe, 00000009.00000002.4679205737.0000026D4CB28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW /
            Source: rundll32.exe, 00000003.00000002.4678724103.0000021E0146F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618031585.0000023B5C153000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C0F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CB83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Windows\System32\loaddll64.exeAPI call chain: ExitProcess graph end nodegraph_0-54644
            Source: C:\Windows\System32\loaddll64.exeAPI call chain: ExitProcess graph end nodegraph_0-54864
            Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-71242
            Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016BCCE0 LdrGetProcedureAddress,3_2_0000021E016BCCE0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85F9FAC IsDebuggerPresent,0_2_0000026CE85F9FAC
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE860371C EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_0000026CE860371C
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85FAFB0 GetProcessHeap,0_2_0000026CE85FAFB0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE860F0D8 SetUnhandledExceptionFilter,0_2_0000026CE860F0D8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE860F0A8 RtlLookupFunctionEntry,SetUnhandledExceptionFilter,0_2_0000026CE860F0A8
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85F7608 SetUnhandledExceptionFilter,UnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000026CE85F7608
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CA7608 SetUnhandledExceptionFilter,UnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0000021E04CA7608
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CBF0A8 RtlLookupFunctionEntry,SetUnhandledExceptionFilter,3_2_0000021E04CBF0A8
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E04CBF0D8 SetUnhandledExceptionFilter,3_2_0000021E04CBF0D8
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F787608 SetUnhandledExceptionFilter,UnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0000023B5F787608
            Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000023B5F79F0D8 SetUnhandledExceptionFilter,4_2_0000023B5F79F0D8
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C2F0A8 RtlLookupFunctionEntry,SetUnhandledExceptionFilter,6_2_0000020779C2F0A8
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C2F0D8 SetUnhandledExceptionFilter,6_2_0000020779C2F0D8
            Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000020779C17608 SetUnhandledExceptionFilter,UnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0000020779C17608
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE6197608 SetUnhandledExceptionFilter,UnhandledExceptionFilter,UnhandledExceptionFilter,8_2_0000025DE6197608
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61AF0D8 SetUnhandledExceptionFilter,8_2_0000025DE61AF0D8
            Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025DE61AF0A8 RtlLookupFunctionEntry,SetUnhandledExceptionFilter,8_2_0000025DE61AF0A8

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.43.224 6542Jump to behavior
            Source: C:\Windows\System32\rundll32.exeNetwork Connect: 103.57.249.207 6542Jump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\explorer.exe base: 2E00000 protect: page execute and read and writeJump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\explorer.exe base: 8B70000 protect: page execute and read and writeJump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\explorer.exe base: 8F40000 protect: page execute and read and writeJump to behavior
            Source: C:\Windows\System32\rundll32.exeCode function: 3_3_00007DF40CCA0100 VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,3_3_00007DF40CCA0100
            Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00007DF494700100 VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,4_3_00007DF494700100
            Source: C:\Windows\System32\rundll32.exeThread created: unknown EIP: 2E00000Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread created: unknown EIP: 8B70000Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread created: unknown EIP: 8F40000Jump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\explorer.exe base: 2E00000 value starts with: 4D5AJump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\explorer.exe base: 8B70000 value starts with: 4D5AJump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\explorer.exe base: 8F40000 value starts with: 4D5AJump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory written: PID: 4004 base: 2E00000 value: 4DJump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory written: PID: 4004 base: 8B70000 value: 4DJump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory written: PID: 4004 base: 8F40000 value: 4DJump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4976Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4976Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4976Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4976Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4976Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 2304Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 2304Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 2304Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 2304Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 2304Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4976Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4976Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4976Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4976Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: target process: 4976Jump to behavior
            Source: C:\Windows\System32\rundll32.exeThread register set: 4976 1Jump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\explorer.exe base: 2E00000Jump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\explorer.exe base: 8B70000Jump to behavior
            Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\explorer.exe base: 8F40000Jump to behavior
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,0_2_0000026CE85F9CDC
            Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,0_2_0000026CE85FFD38
            Source: C:\Windows\System32\loaddll64.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,0_2_0000026CE8604E7C
            Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,0_2_0000026CE860708C
            Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoEx,0_2_0000026CE8607140
            Source: C:\Windows\System32\loaddll64.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,0_2_0000026CE85EE0FC
            Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,0_2_0000026CE8607244
            Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,0_2_0000026CE8606218
            Source: C:\Windows\System32\loaddll64.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_0000026CE8606384
            Source: C:\Windows\System32\loaddll64.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,0_2_0000026CE86055E0
            Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,EnumSystemLocalesW,0_2_0000026CE86075BC
            Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,EnumSystemLocalesW,0_2_0000026CE8607670
            Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,0_2_0000026CE8607704
            Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,0_2_0000026CE8607934
            Source: C:\Windows\System32\loaddll64.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,0_2_0000026CE8604910
            Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0000026CE8607A80
            Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,GetLocaleInfoW,0_2_0000026CE8607B30
            Source: C:\Windows\System32\loaddll64.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,0_2_0000026CE85F2BC4
            Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,0_2_0000026CE8607BD8
            Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,0_2_0000026CE8606C20
            Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,0_2_0000026CE85F9C1C
            Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,0_2_0000026CE85FCCD0
            Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,0_2_0000026CE68B6AEC
            Source: C:\Windows\System32\loaddll64.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,0_2_0000026CE689D9A4
            Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,0_2_0000026CE68B6934
            Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,0_2_0000026CE68AF5E0
            Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,3_2_0000021E04CA9CDC
            Source: C:\Windows\System32\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,3_2_0000021E04CB6384
            Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,3_2_0000021E04CB55E0
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,3_2_0000021E04CB75BC
            Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,3_2_0000021E04CB4E7C
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,3_2_0000021E04CB7140
            Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,3_2_0000021E04C9E0FC
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,3_2_0000021E04CB708C
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,3_2_0000021E04CB7244
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,3_2_0000021E04CB6218
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,GetLocaleInfoW,3_2_0000021E04CB7B30
            Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_0000021E04CB7A80
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,3_2_0000021E04CB6C20
            Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,3_2_0000021E04CA9C1C
            Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,3_2_0000021E04CA2BC4
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,3_2_0000021E04CB7BD8
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,3_2_0000021E04CAFD38
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,3_2_0000021E04CACCD0
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,3_2_0000021E04CB7704
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,3_2_0000021E04CB7670
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,3_2_0000021E04CB7934
            Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,3_2_0000021E04CB4910
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,3_2_0000021E02F66934
            Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,3_2_0000021E02F4D9A4
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,3_2_0000021E02F5F5E0
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,3_2_0000021E02F66AEC
            Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,4_2_0000023B5F789CDC
            Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_0000023B5F797A80
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,4_2_0000023B5F797934
            Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,4_2_0000023B5F794910
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,4_2_0000023B5F797704
            Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,4_2_0000023B5F7955E0
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,4_2_0000023B5F797670
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,4_2_0000023B5F7975BC
            Source: C:\Windows\System32\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,4_2_0000023B5F796384
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,4_2_0000023B5F797244
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,4_2_0000023B5F796218
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,4_2_0000023B5F797140
            Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,4_2_0000023B5F77E0FC
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,4_2_0000023B5F79708C
            Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,4_2_0000023B5F794E7C
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,4_2_0000023B5F78FD38
            Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,4_2_0000023B5F789C1C
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,4_2_0000023B5F796C20
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,4_2_0000023B5F78CCD0
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,GetLocaleInfoW,4_2_0000023B5F797B30
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,4_2_0000023B5F797BD8
            Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,4_2_0000023B5F782BC4
            Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,4_2_0000023B5DA2D9A4
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,4_2_0000023B5DA46934
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,4_2_0000023B5DA46AEC
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,4_2_0000023B5DA3F5E0
            Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,6_2_0000020779C19CDC
            Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_0000020779C27A80
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,6_2_0000020779C27934
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,6_2_0000020779C1CCD0
            Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,6_2_0000020779C19C1C
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,6_2_0000020779C26C20
            Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,6_2_0000020779C12BC4
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,6_2_0000020779C27BD8
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,GetLocaleInfoW,6_2_0000020779C27B30
            Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,6_2_0000020779C24E7C
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,6_2_0000020779C1FD38
            Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,6_2_0000020779C0E0FC
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,6_2_0000020779C2708C
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,6_2_0000020779C27244
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,6_2_0000020779C26218
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,6_2_0000020779C27140
            Source: C:\Windows\System32\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,6_2_0000020779C26384
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,6_2_0000020779C27704
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,6_2_0000020779C27670
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,6_2_0000020779C275BC
            Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,6_2_0000020779C255E0
            Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,6_2_0000020779C24910
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,6_2_0000020777ECF5E0
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,6_2_0000020777ED6AEC
            Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,6_2_0000020777EBD9A4
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,6_2_0000020777ED6934
            Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,8_2_0000025DE6199CDC
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,8_2_0000025DE619CCD0
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,8_2_0000025DE619FD38
            Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,8_2_0000025DE61A4E7C
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,GetLocaleInfoW,8_2_0000025DE61A7B30
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,8_2_0000025DE61A7BD8
            Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,8_2_0000025DE6192BC4
            Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,8_2_0000025DE6199C1C
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,8_2_0000025DE61A6C20
            Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,8_2_0000025DE61A4910
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,8_2_0000025DE61A7934
            Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_0000025DE61A7A80
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,8_2_0000025DE61A7704
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,8_2_0000025DE61A75BC
            Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,8_2_0000025DE61A55E0
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,8_2_0000025DE61A7670
            Source: C:\Windows\System32\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,8_2_0000025DE61A6384
            Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,8_2_0000025DE618E0FC
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,8_2_0000025DE61A7140
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,8_2_0000025DE61A6218
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,8_2_0000025DE61A7244
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,8_2_0000025DE61A708C
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,8_2_0000025DE4456AEC
            Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,8_2_0000025DE4456934
            Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,8_2_0000025DE443D9A4
            Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,8_2_0000025DE444F5E0
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE85FE074 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0000026CE85FE074
            Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021E016D4D00 GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,3_2_0000021E016D4D00
            Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000026CE8602F34 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,_malloc_crt,_invoke_watson,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,0_2_0000026CE8602F34

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.4681807964.0000023B61A2C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.4718709422.0000026D524AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000003.2620826714.0000026D524DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4678724103.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.3250744554.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000003.2620889065.0000026D524DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.2290158761.0000021E06F25000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.3250525715.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2304, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4976, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4232, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.4681807964.0000023B61A2C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.4718709422.0000026D524AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000003.2620826714.0000026D524DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4678724103.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.3250744554.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000003.2620889065.0000026D524DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.2290158761.0000021E06F25000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.3250525715.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2304, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4976, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 4232, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            911
            Process Injection
            1
            Masquerading
            OS Credential Dumping2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Virtualization/Sandbox Evasion
            LSASS Memory41
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)911
            Process Injection
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Deobfuscate/Decode Files or Information
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput Capture1
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets1
            Account Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Rundll32
            Cached Domain Credentials1
            System Owner/User Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem12
            System Information Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            avutil.dll.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://vutarf.com/K30%Avira URL Cloudsafe
            https://vutarf.com:6542/gop.phpM0%Avira URL Cloudsafe
            https://huanvn.com/0%Avira URL Cloudsafe
            https://huanvn.com/20%Avira URL Cloudsafe
            http://r11.o.lencr.oCt0%Avira URL Cloudsafe
            https://huanvn.com/40%Avira URL Cloudsafe
            https://vutarf.com/kY0%Avira URL Cloudsafe
            https://vutarf.com:6542/stop.php0%Avira URL Cloudsafe
            https://huanvn.com:6542/gop.php0%Avira URL Cloudsafe
            http://r10.i.lencr.o0%Avira URL Cloudsafe
            https://huanvn.com:6542/gop.phpO0%Avira URL Cloudsafe
            https://vutarf.com/0%Avira URL Cloudsafe
            https://vutarf.com:6542/stop.php&0%Avira URL Cloudsafe
            https://vutarf.com:6542/gop.phpA0%Avira URL Cloudsafe
            https://vutarf.com:6542/gop.phpRc0%Avira URL Cloudsafe
            https://vutarf.com:6542/gop.phpoc0%Avira URL Cloudsafe
            https://huanvn.com:6542/0%Avira URL Cloudsafe
            https://huanvn.com:6542/stop.phpb0%Avira URL Cloudsafe
            https://huanvn.com:6542/stop.phpq0%Avira URL Cloudsafe
            https://huanvn.com:6542/stop.php0%Avira URL Cloudsafe
            https://vutarf.com:6542/gop.php0%Avira URL Cloudsafe
            https://vutarf.com:6542/0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            vutarf.com
            94.232.43.224
            truetrue
              unknown
              huanvn.com
              103.57.249.207
              truetrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://vutarf.com/K3rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://vutarf.com:6542/gop.phpMrundll32.exe, 00000003.00000002.4678724103.0000021E01513000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://r11.o.lencr.org0#rundll32.exe, 00000003.00000002.4678724103.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289737477.0000021E01528000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://r10.i.lencr.orundll32.exe, 00000009.00000003.2620690341.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681991702.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://huanvn.com:6542/gop.phprundll32.exe, 00000004.00000002.4668075279.0000023B5C0F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://vutarf.com/kYrundll32.exe, 00000009.00000003.2620708987.0000026D4CB83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB86000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://huanvn.com/rundll32.exe, 00000004.00000002.4668299780.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBD0000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://r10.o.lencr.org0#rundll32.exe, 00000004.00000003.2618031585.0000023B5C153000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618031585.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250618182.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C1A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C0F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4679205737.0000026D4CB28000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620690341.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401277048.0000026D4CBF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681991702.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://vutarf.com:6542/stop.phprundll32.exe, 00000003.00000002.4678724103.0000021E0146F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://r11.o.lencr.oCtrundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://huanvn.com/4rundll32.exe, 00000004.00000003.2618031585.0000023B5C153000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://huanvn.com/2rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBD0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://huanvn.com:6542/gop.phpOrundll32.exe, 00000004.00000003.2618031585.0000023B5C153000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://r11.i.lencr.org/0rundll32.exe, 00000003.00000002.4678724103.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289737477.0000021E01528000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://vutarf.com/rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CB83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB86000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://vutarf.com:6542/gop.phpArundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://vutarf.com:6542/stop.php&rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://vutarf.com:6542/gop.phpRcrundll32.exe, 00000009.00000003.2620708987.0000026D4CB83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB86000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://huanvn.com:6542/rundll32.exe, 00000004.00000003.2618031585.0000023B5C189000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://huanvn.com:6542/stop.phpbrundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://streams.videolan.org/upload/loaddll64.exe, 00000000.00000002.4682995000.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.4682042385.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2283430783.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2304898278.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2303220927.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2305957918.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2302816272.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2290332722.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2277869231.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2297403449.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2303131049.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2303978956.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2360364252.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2289876882.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2358440180.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2361221187.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2303968170.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.2296520709.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2358802398.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.2278843733.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000026.00000002.2303493254.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmpfalse
                        high
                        https://vutarf.com:6542/gop.phpocrundll32.exe, 00000009.00000003.2620708987.0000026D4CB83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB86000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://x1.c.lencr.org/0rundll32.exe, 00000003.00000002.4678724103.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250525715.0000021E0151E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289737477.0000021E01528000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E01525000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618014731.0000023B5C1B9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618031585.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250618182.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C0F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1BC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4679205737.0000026D4CB28000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620690341.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401277048.0000026D4CBF0000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://x1.i.lencr.org/0rundll32.exe, 00000003.00000002.4678724103.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250525715.0000021E0151E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3250744554.0000021E0152A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289737477.0000021E01528000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E01525000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618014731.0000023B5C1B9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618031585.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250618182.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1AF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C0F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1BC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250496128.0000023B5C1BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4679205737.0000026D4CB28000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620690341.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401277048.0000026D4CBF0000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://huanvn.com:6542/stop.phpqrundll32.exe, 00000009.00000003.2620708987.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401385805.0000026D4CBB4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBD0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://huanvn.com:6542/stop.phprundll32.exe, 00000009.00000002.4681505732.0000026D4CBDE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681505732.0000026D4CBD0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://vutarf.com:6542/gop.phprundll32.exe, 00000003.00000002.4678724103.0000021E01513000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401439218.0000026D4CB65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4680546114.0000026D4CB66000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://vutarf.com:6542/rundll32.exe, 00000003.00000002.4678724103.0000021E014CC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014C9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4678724103.0000021E01513000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.2289912519.0000021E014FA000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://r10.i.lencr.org/0rundll32.exe, 00000004.00000003.2618031585.0000023B5C153000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2618031585.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3250618182.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C189000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668299780.0000023B5C1A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C0F8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4668075279.0000023B5C155000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4679205737.0000026D4CB28000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.2620690341.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000003.3401277048.0000026D4CBF0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.4681991702.0000026D4CBED000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              103.57.249.207
                              huanvn.comIndia
                              17747SITINETWORS-IN-APSITINETWORKSLIMITEDINtrue
                              94.232.43.224
                              vutarf.comRussian Federation
                              44477WELLWEBNLtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1567647
                              Start date and time:2024-12-03 17:42:12 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 10m 55s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:42
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:avutil.dll.dll
                              (renamed file extension from exe to dll)
                              Original Sample Name:avutil.dll.exe
                              Detection:MAL
                              Classification:mal96.troj.evad.winDLL@119/1@4/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 26
                              • Number of non-executed functions: 240
                              Cookbook Comments:
                              • Override analysis time to 240s for rundll32
                              • Exclude process from analysis (whitelisted): dllhost.exe
                              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, reateberam.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, dogirafer.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report creation exceeded maximum time and may have missing disassembly code information.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: avutil.dll.dll
                              No simulations
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              103.57.249.207wait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                                zdi.txt.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                                  94.232.43.224wait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                                    cTgZnuQlDo.exeGet hashmaliciousSystemBCBrowse
                                      cTgZnuQlDo.exeGet hashmaliciousSystemBCBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        vutarf.comwait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                                        • 94.232.43.224
                                        huanvn.comwait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                                        • 103.57.249.207
                                        zdi.txt.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                                        • 103.57.249.207
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        SITINETWORS-IN-APSITINETWORKSLIMITEDINwait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                                        • 103.57.249.207
                                        zdi.txt.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                                        • 103.57.249.207
                                        loligang.mips.elfGet hashmaliciousMiraiBrowse
                                        • 202.142.118.100
                                        na.elfGet hashmaliciousGafgytBrowse
                                        • 103.225.178.92
                                        msas.msiGet hashmaliciousORPCBackdoorBrowse
                                        • 103.57.249.42
                                        msas.msiGet hashmaliciousORPCBackdoorBrowse
                                        • 103.57.249.42
                                        sstn.exeGet hashmaliciousUnknownBrowse
                                        • 103.57.250.204
                                        sstn.exeGet hashmaliciousUnknownBrowse
                                        • 103.57.250.204
                                        VKkfiTAZXP.elfGet hashmaliciousGafgyt, MiraiBrowse
                                        • 103.225.178.98
                                        YnO77q8WhV.elfGet hashmaliciousUnknownBrowse
                                        • 45.117.200.73
                                        WELLWEBNLwait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                                        • 94.232.43.224
                                        sqx.dll.dllGet hashmaliciousUnknownBrowse
                                        • 94.232.40.38
                                        merd.msiGet hashmaliciousUnknownBrowse
                                        • 94.232.40.38
                                        sqx.dll.dllGet hashmaliciousUnknownBrowse
                                        • 94.232.40.38
                                        mesh.exeGet hashmaliciousMeshAgentBrowse
                                        • 94.232.43.185
                                        mesh.exeGet hashmaliciousMeshAgentBrowse
                                        • 94.232.43.185
                                        Document-19-06-38.jsGet hashmaliciousBruteRatelBrowse
                                        • 94.232.43.213
                                        81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
                                        • 94.232.45.36
                                        JeZHGKJvrB.exeGet hashmaliciousUnknownBrowse
                                        • 94.232.44.144
                                        hFoVk4DJXG.exeGet hashmaliciousUnknownBrowse
                                        • 94.232.44.144
                                        No context
                                        No context
                                        Process:C:\Windows\System32\rundll32.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):100
                                        Entropy (8bit):5.207627100346911
                                        Encrypted:false
                                        SSDEEP:3:BcBqWpNIiSYJazdWoqyd50JLQWpNIiSlyQKwtC1Y:BopNIeJ4IAd6JPpNIPLwS
                                        MD5:42F8F39F87E786C7DB552EBC76F08C39
                                        SHA1:DC8A85FA36A3FB66B821D4E6C37AB7A8E79D3580
                                        SHA-256:4DFD6A61644CF77087A3971FC563BE604E22EECB8578FC6C8960F410C8F89F23
                                        SHA-512:4DD80430111C85235EA236FD74FF471CCDB88291391B6010BCA68DBDC03A506AEBD32E3399F7E112142226E81B7FC8772E62CDC1D72DEDF48D8065C8550E8C1B
                                        Malicious:false
                                        Preview:{YXZ1dGlsLmRsbC5kbGw=, IkM6XFVzZXJzXGVuZ2luZWVyXERlc2t0b3BcYXZ1dGlsLmRsbC5kbGwi, MQ==, RExMTWFpbg==}
                                        File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                        Entropy (8bit):7.305582889398964
                                        TrID:
                                        • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                        • Win64 Executable (generic) (12005/4) 10.17%
                                        • Generic Win/DOS Executable (2004/3) 1.70%
                                        • DOS Executable Generic (2002/1) 1.70%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                        File name:avutil.dll.dll
                                        File size:1'752'140 bytes
                                        MD5:2334a6aede2ad2a9004ecd96c872a910
                                        SHA1:45f7683952a599a607ba6b9b02dacc1586135f22
                                        SHA256:c3baf0446831b6968a30ea23647ac559ee62219f91daae5c1b0a9787f9c860b9
                                        SHA512:ea6d669f474ea9281b00cf61a436ff59627f0ef19c9c0df93c641db0476ca9feb0763a747e56b5c79b65287cb60628fb60c9e72bd2003bd0b5c270ea11c4ff51
                                        SSDEEP:24576:zbE5t+4+x4D5Z+KFNTsnkN6MFBUp6xdRWxgnsOmYX82Or0t:zbEfH+xIDhNTYCBUURWxgd72e
                                        TLSH:7A85BF02D6E368ADC4BA4430476B7957B2323412C9A46E3F17A15D783E29FA05CCFA7D
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...A..f..........& ...)....L.......0........................................P......C.8...`... ............................
                                        Icon Hash:7ae282899bbab082
                                        Entrypoint:0x180001330
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x180000000
                                        Subsystem:windows cui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE, DLL
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                        Time Stamp:0x66EC9041 [Thu Sep 19 20:57:37 2024 UTC]
                                        TLS Callbacks:0x800af3a0, 0x1, 0x800af370, 0x1, 0x800bff10, 0x1
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:1231c96382e36b1e775f3ad59513b5a0
                                        Instruction
                                        dec eax
                                        cmp edx, 01h
                                        je 00007F5094F9E44Ah
                                        dec eax
                                        mov eax, 00000001h
                                        ret
                                        dec sp
                                        movd mm5, ecx
                                        dec eax
                                        mov eax, ecx
                                        dec eax
                                        sub esp, 00000098h
                                        dec eax
                                        mov edx, 003D092Ch
                                        dec esp
                                        lea eax, dword ptr [esp+20h]
                                        dec eax
                                        xor ecx, ecx
                                        dec eax
                                        xor edx, edx
                                        inc ecx
                                        mov byte ptr [eax+ecx], cl
                                        dec eax
                                        inc ecx
                                        dec eax
                                        cmp ecx, 72h
                                        jbe 00007F5094F9E435h
                                        dec eax
                                        xor ecx, ecx
                                        dec eax
                                        inc edx
                                        dec eax
                                        cmp edx, 003D092Bh
                                        jbe 00007F5094F9E426h
                                        dec eax
                                        add eax, 011147F8h
                                        dec eax
                                        mov ecx, FFFFFFFFh
                                        dec eax
                                        xor edx, edx
                                        dec ecx
                                        mov eax, 01D45028h
                                        dec ecx
                                        mov ecx, 00003000h
                                        dec eax
                                        mov dword ptr [esp+20h], 00000040h
                                        dec eax
                                        mov dword ptr [esp+28h], 00000000h
                                        call dword ptr [eax]
                                        cld
                                        dec sp
                                        movd esi, mm5
                                        dec eax
                                        add esi, 011183BCh
                                        dec eax
                                        mov ecx, 000A8CA8h
                                        dec eax
                                        mov edi, eax
                                        rep movsb
                                        dec eax
                                        mov edi, eax
                                        dec ecx
                                        mov eax, 00000017h
                                        dec eax
                                        xor eax, eax
                                        dec eax
                                        xor ecx, ecx
                                        dec bp
                                        movd ecx, mm5
                                        dec ecx
                                        add ecx, 000F37C2h
                                        dec eax
                                        xor edx, edx
                                        dec ecx
                                        div eax
                                        inc ebp
                                        mov dl, byte ptr [ecx+edx]
                                        inc esp
                                        xor byte ptr [edi+ecx], dl
                                        dec eax
                                        inc ecx
                                        dec eax
                                        mov eax, ecx
                                        dec eax
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x110f0000x45f2.edata
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x11140000x19b4.idata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x11180000xa9064.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0xf40000x40b0.pdata
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x11c20000x1214.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x111b0300x1c.rsrc
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0xef5200x28.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x11146100x5a8.idata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000xcaf280xcb0008632d7dfe9db21d2664c8f8f51a7106eFalse0.39980492803263545data6.640813162143309IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .data0xcc0000x1d00x2007920b7164b7062e50e940076159e8f54False0.291015625Matlab v4 mat-file (little endian) \377\377\377\377, text, rows 0, columns 02.2249897541236128IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rdata0xcd0000x267d00x268005ca933a0b0977956f7138fe4f796ae0fFalse0.3154804180194805data4.61180516962909IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .pdata0xf40000x40b00x4200e867ae8eb8baa5acdb8dfbab1148a051False0.5062144886363636data5.769162171746146IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .xdata0xf90000x4f100x5000841d3b3d93f1d53c89bb7a2effae919aFalse0.185205078125data4.797717862971696IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .bss0xfe0000x10106900x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .edata0x110f0000x45f20x460062db52503afee76aae195dc3c07e401fFalse0.4040736607142857data5.51537379283415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .idata0x11140000x19b40x1a00a82d8c46a2eb7840c80c49e7057ed3e4False0.310546875data4.855407659649912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .CRT0x11160000x600x20070c1b2591433bb45bbcfd44224870185False0.068359375data0.3232550539007212IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .tls0x11170000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x11180000xa90640xa9200ec39622b3dedf373d4ae26f532ce02c4False0.8292062199741316data7.841884260057169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x11c20000x12140x14008453f1d204f5b6db7a34816a0f220a20False0.4322265625data5.159121394192686IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        .debug0x11c40000x2000x4c8a8b483344a5b06272954fecf64e6102False0.8421052631578947data4.450480963211839IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_VERSION0x11180a00x31cdataEnglishUnited States0.47110552763819097
                                        RT_VXD0x11183bc0xa8ca8data0.8301671468740237
                                        DLLImport
                                        bcrypt.dllBCryptCloseAlgorithmProvider, BCryptGenRandom, BCryptOpenAlgorithmProvider
                                        KERNEL32.dllAcquireSRWLockExclusive, AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileMappingA, CreateMutexA, CreateSemaphoreA, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, FileTimeToSystemTime, FreeLibrary, GetConsoleMode, GetConsoleScreenBufferInfo, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetFullPathNameW, GetHandleInformation, GetLastError, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, GetProcAddress, GetProcessAffinityMask, GetProcessTimes, GetStdHandle, GetSystemDirectoryW, GetSystemTimeAdjustment, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetThreadTimes, GetTickCount64, GetTimeZoneInformation, InitOnceBeginInitialize, InitOnceComplete, InitializeConditionVariable, InitializeCriticalSection, InitializeSRWLock, IsDBCSLeadByteEx, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryA, LoadLibraryExA, LoadLibraryExW, MapViewOfFile, MultiByteToWideChar, OpenProcess, OutputDebugStringA, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReleaseMutex, ReleaseSRWLockExclusive, ReleaseSemaphore, VirtualAllocExNuma, ResetEvent, ResumeThread, SetConsoleTextAttribute, SetEvent, SetLastError, SetProcessAffinityMask, SetSystemTime, SetThreadContext, SetThreadPriority, Sleep, SleepConditionVariableSRW, SuspendThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, UnmapViewOfFile, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitForSingleObjectEx, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteConsoleW, __C_specific_handler
                                        msvcrt.dll___lc_codepage_func, ___mb_cur_max_func, __iob_func, __setusermatherr, _aligned_free, _aligned_malloc, _aligned_realloc, _amsg_exit, _beginthreadex, _endthreadex, _errno, _fstat64, _get_osfhandle, _gmtime64, _hypot, _initterm, _localtime64, _lock, _mktime64, _setjmp, _sopen, _ultoa, _unlock, _wsopen, abort, acos, asin, atan, atoi, bsearch, calloc, clock, cosh, exit, fclose, fprintf, fputc, fputs, fread, free, fwrite, getc, getenv, isspace, tanh, isxdigit, localeconv, log10, longjmp, malloc, memchr, memcmp, memcpy, memmove, memset, printf, rand, realloc, setvbuf, signal, sinh, strchr, strcmp, strcpy, strcspn, strerror, strftime, strlen, strncmp, strrchr, strspn, strstr, strtol, strtoul, tan, tolower, ungetc, vfprintf, wcscat, wcscpy, wcslen, wcsrchr, _strtoui64, _strtoi64, _strdup, _isatty, _fdopen, _close
                                        USER32.dllGetDesktopWindow
                                        NameOrdinalAddress
                                        DLLMain10x1800236c0
                                        av_add_q20x1800343b0
                                        av_add_stable30x180027660
                                        av_adler32_update40x180001380
                                        av_aes_alloc50x180001be0
                                        av_aes_crypt60x180001bf0
                                        av_aes_ctr_alloc70x180002370
                                        av_aes_ctr_crypt80x1800024a0
                                        av_aes_ctr_free90x180002440
                                        av_aes_ctr_get_iv100x1800023c0
                                        av_aes_ctr_increment_iv110x180002450
                                        av_aes_ctr_init120x180002410
                                        av_aes_ctr_set_full_iv130x1800023a0
                                        av_aes_ctr_set_iv140x180002380
                                        av_aes_ctr_set_random_iv150x1800023d0
                                        av_aes_init160x180001c10
                                        av_aes_size170x1800cd00c
                                        av_ambient_viewing_environment_alloc180x1800025c0
                                        av_ambient_viewing_environment_create_side_data190x180002600
                                        av_append_path_component200x180006420
                                        av_asprintf210x180005e90
                                        av_assert0_fpu220x180084960
                                        av_audio_fifo_alloc230x1800026b0
                                        av_audio_fifo_drain240x180002af0
                                        av_audio_fifo_free250x180002650
                                        av_audio_fifo_peek260x180002920
                                        av_audio_fifo_peek_at270x1800029b0
                                        av_audio_fifo_read280x180002a50
                                        av_audio_fifo_realloc290x1800027e0
                                        av_audio_fifo_reset300x180002b60
                                        av_audio_fifo_size310x180002ba0
                                        av_audio_fifo_space320x180002bb0
                                        av_audio_fifo_write330x180002880
                                        av_base64_decode340x180006ab0
                                        av_base64_encode350x180006cd0
                                        av_basename360x180006340
                                        av_bessel_i0370x1800277a0
                                        av_blowfish_alloc380x180007220
                                        av_blowfish_crypt390x1800079a0
                                        av_blowfish_crypt_ecb400x180007230
                                        av_blowfish_init410x1800c4c30
                                        av_bmg_get420x1800250d0
                                        av_bprint_append_data430x180008250
                                        av_bprint_chars440x180008110
                                        av_bprint_clear450x180008760
                                        av_bprint_escape460x180008820
                                        av_bprint_finalize470x180008780
                                        av_bprint_get_buffer480x180008650
                                        av_bprint_init490x180007d40
                                        av_bprint_init_for_buffer500x180007e00
                                        av_bprint_strftime510x180008390
                                        av_bprintf520x180007e40
                                        av_buffer_alloc530x180008d80
                                        av_buffer_allocz540x180008eb0
                                        av_buffer_create550x180008e20
                                        av_buffer_default_free560x180008cc0
                                        av_buffer_get_opaque570x180008f90
                                        av_buffer_get_ref_count580x180008fa0
                                        av_buffer_is_writable590x180008f70
                                        av_buffer_make_writable600x180008fb0
                                        av_buffer_pool_buffer_get_opaque610x180009710
                                        av_buffer_pool_get620x180009540
                                        av_buffer_pool_init630x180009410
                                        av_buffer_pool_init2640x1800093a0
                                        av_buffer_pool_uninit650x180009460
                                        av_buffer_realloc660x180009060
                                        av_buffer_ref670x180008ee0
                                        av_buffer_replace680x1800092a0
                                        av_buffer_unref690x180008f20
                                        av_calloc700x180028a40
                                        av_camellia_alloc710x180009af0
                                        av_camellia_crypt720x180009b00
                                        av_camellia_init730x1800c4d8d
                                        av_camellia_size740x1800ce678
                                        av_cast5_alloc750x18000a690
                                        av_cast5_crypt760x18000a7c0
                                        av_cast5_crypt2770x18000a6a0
                                        av_cast5_init780x1800c590c
                                        av_cast5_size790x1800d0a80
                                        av_channel_description800x18000aae0
                                        av_channel_description_bprint810x18000aa30
                                        av_channel_from_string820x18000ac20
                                        av_channel_layout_ambisonic_order830x18000af60
                                        av_channel_layout_channel_from_index840x18000b920
                                        av_channel_layout_channel_from_string850x18000bdb0
                                        av_channel_layout_check860x18000bde0
                                        av_channel_layout_compare870x18000bfb0
                                        av_channel_layout_copy880x18000aed0
                                        av_channel_layout_custom_init890x18000ad30
                                        av_channel_layout_default900x18000c1a0
                                        av_channel_layout_describe910x18000b8c0
                                        av_channel_layout_describe_bprint920x18000b0a0
                                        av_channel_layout_from_mask930x18000adc0
                                        av_channel_layout_from_string940x18000c7b0
                                        av_channel_layout_index_from_channel950x18000ba50
                                        av_channel_layout_index_from_string960x18000bc50
                                        av_channel_layout_retype970x18000c2b0
                                        av_channel_layout_standard980x18000c200
                                        av_channel_layout_subset990x18000c230
                                        av_channel_layout_uninit1000x18000ae90
                                        av_channel_name1010x18000a8f0
                                        av_channel_name_bprint1020x18000a840
                                        av_chroma_location_enum_to_pos1030x180033cc0
                                        av_chroma_location_from_name1040x180033c60
                                        av_chroma_location_name1050x180033c40
                                        av_chroma_location_pos_to_enum1060x180033d00
                                        av_cmp_i1070x180023de0
                                        av_color_primaries_from_name1080x180033ae0
                                        av_color_primaries_name1090x180033ac0
                                        av_color_range_from_name1100x180033a60
                                        av_color_range_name1110x180033a40
                                        av_color_space_from_name1120x180033be0
                                        av_color_space_name1130x180033bc0
                                        av_color_transfer_from_name1140x180033b60
                                        av_color_transfer_name1150x180033b40
                                        av_compare_mod1160x180027450
                                        av_compare_ts1170x180027390
                                        av_content_light_metadata_alloc1180x180027030
                                        av_content_light_metadata_create_side_data1190x180027060
                                        av_cpu_count1200x18000cfb0
                                        av_cpu_force_count1210x18000d0c0
                                        av_cpu_max_align1220x18000d0d0
                                        av_crc1230x18000d880
                                        av_crc_get_table1240x18000d4d0
                                        av_crc_init1250x18000d2d0
                                        av_csp_approximate_trc_gamma1260x18000e030
                                        av_csp_luma_coeffs_from_avcsp1270x18000ddd0
                                        av_csp_primaries_desc_from_id1280x18000de00
                                        av_csp_primaries_id_from_desc1290x18000de30
                                        av_csp_trc_func_from_id1300x18000e060
                                        av_d2q1310x180034470
                                        av_default_get_category1320x180026290
                                        av_default_item_name1330x180025630
                                        av_des_alloc1340x18000e790
                                        av_des_crypt1350x18000e820
                                        av_des_init1360x18000e7a0
                                        av_des_mac1370x18000e850
                                        av_detection_bbox_alloc1380x18000e890
                                        av_detection_bbox_create_side_data1390x18000e8f0
                                        av_dict_copy1400x18000f740
                                        av_dict_count1410x18000e9e0
                                        av_dict_free1420x18000f6e0
                                        av_dict_get1430x18000ea30
                                        av_dict_get_string1440x18000fac0
                                        av_dict_iterate1450x18000e9f0
                                        av_dict_parse_string1460x18000f0d0
                                        av_dict_set1470x18000eb40
                                        av_dict_set_int1480x18000ee10
                                        av_dirname1490x1800063b0
                                        av_display_matrix_flip1500x18000fed0
                                        av_display_rotation_get1510x18000fd30
                                        av_display_rotation_set1520x18000fe30
                                        av_div_i1530x180025010
                                        av_div_q1540x180034360
                                        av_dovi_alloc1550x18000ff60
                                        av_dovi_find_level1560x18000fff0
                                        av_dovi_metadata_alloc1570x18000ff90
                                        av_downmix_info_update_side_data1580x180010030
                                        av_dynamic_hdr_plus_alloc1590x18001a590
                                        av_dynamic_hdr_plus_create_side_data1600x18001a5c0
                                        av_dynamic_hdr_plus_from_t351610x18001a600
                                        av_dynamic_hdr_plus_to_t351620x18001b5f0
                                        av_dynamic_hdr_vivid_alloc1630x18001ce50
                                        av_dynamic_hdr_vivid_create_side_data1640x18001ce80
                                        av_dynarray2_add1650x180028db0
                                        av_dynarray_add1660x180028cf0
                                        av_dynarray_add_nofree1670x180028c40
                                        av_encryption_info_add_side_data1680x1800104a0
                                        av_encryption_info_alloc1690x180010240
                                        av_encryption_info_clone1700x1800102f0
                                        av_encryption_info_free1710x180010370
                                        av_encryption_info_get_side_data1720x1800103b0
                                        av_encryption_init_info_add_side_data1730x180010b20
                                        av_encryption_init_info_alloc1740x1800105b0
                                        av_encryption_init_info_free1750x180010770
                                        av_encryption_init_info_get_side_data1760x180010900
                                        av_escape1770x180006590
                                        av_executor_alloc1780x1800154a0
                                        av_executor_execute1790x1800157b0
                                        av_executor_free1800x1800156c0
                                        av_expr_count_func1810x180014d50
                                        av_expr_count_vars1820x180014cc0
                                        av_expr_eval1830x180014e00
                                        av_expr_free1840x1800125b0
                                        av_expr_parse1850x1800146b0
                                        av_expr_parse_and_eval1860x180014e60
                                        av_fast_malloc1870x180029240
                                        av_fast_mallocz1880x180029310
                                        av_fast_realloc1890x180029190
                                        av_fifo_alloc21900x180015a10
                                        av_fifo_auto_grow_limit1910x180015ab0
                                        av_fifo_can_read1920x180015ad0
                                        av_fifo_can_write1930x180015b00
                                        av_fifo_drain21940x180016290
                                        av_fifo_elem_size1950x180015ac0
                                        av_fifo_freep21960x180016320
                                        av_fifo_grow21970x180015b30
                                        av_fifo_peek1980x180016180
                                        av_fifo_peek_to_cb1990x180016260
                                        av_fifo_read2000x180015f80
                                        av_fifo_read_to_cb2010x1800160f0
                                        av_fifo_reset22020x180016300
                                        av_fifo_write2030x180015c30
                                        av_fifo_write_from_cb2040x180015d80
                                        av_file_map2050x180016350
                                        av_file_unmap2060x180016540
                                        av_film_grain_params_alloc2070x180016a40
                                        av_film_grain_params_create_side_data2080x180016a70
                                        av_film_grain_params_select2090x180016ad0
                                        av_find_best_pix_fmt_of_22100x1800337b0
                                        av_find_info_tag2110x1800315c0
                                        av_find_nearest_q_idx2120x1800346f0
                                        av_force_cpu_flags2130x18000cf10
                                        av_fourcc_make_string2140x180084870
                                        av_frame_alloc2150x180017c70
                                        av_frame_apply_cropping2160x180019bd0
                                        av_frame_clone2170x180019840
                                        av_frame_copy2180x180019050
                                        av_frame_copy_props2190x180018390
                                        av_frame_free2200x180017d30
                                        av_frame_get_buffer2210x180017d70
                                        av_frame_get_plane_buffer2220x1800183a0
                                        av_frame_get_side_data2230x180019010
                                        av_frame_is_writable2240x1800182e0
                                        av_frame_make_writable2250x180019950
                                        av_frame_move_ref2260x180018210
                                        av_frame_new_side_data2270x180018640
                                        av_frame_new_side_data_from_buf2280x180018590
                                        av_frame_ref2290x1800192a0
                                        av_frame_remove_side_data2300x180019ac0
                                        av_frame_replace2310x1800194c0
                                        av_frame_side_data_add2320x180018950
                                        av_frame_side_data_clone2330x180018b90
                                        av_frame_side_data_desc2340x180019b80
                                        av_frame_side_data_free2350x180017c00
                                        av_frame_side_data_get_c2360x180018f20
                                        av_frame_side_data_name2370x180019bb0
                                        av_frame_side_data_new2380x180018710
                                        av_frame_side_data_remove2390x180018f50
                                        av_frame_unref2400x1800181f0
                                        av_free2410x180028990
                                        av_freep2420x1800289a0
                                        av_gcd2430x180027090
                                        av_gcd_q2440x1800349b0
                                        av_get_alt_sample_fmt2450x180039970
                                        av_get_bits_per_pixel2460x180033320
                                        av_get_bytes_per_sample2470x180039aa0
                                        av_get_cpu_flags2480x18000cf50
                                        av_get_known_color_name2490x1800309a0
                                        av_get_media_type_string2500x1800846c0
                                        av_get_packed_sample_fmt2510x1800399a0
                                        av_get_padded_bits_per_pixel2520x180033370
                                        av_get_picture_type_char2530x180084730
                                        av_get_pix_fmt2540x180033200
                                        av_get_pix_fmt_loss2550x180033780
                                        av_get_pix_fmt_name2560x1800331d0
                                        av_get_pix_fmt_string2570x180033420
                                        av_get_planar_sample_fmt2580x1800399e0
                                        av_get_random_seed2590x180033e60
                                        av_get_sample_fmt2600x180039800
                                        av_get_sample_fmt_name2610x1800397d0
                                        av_get_sample_fmt_string2620x180039a10
                                        av_get_time_base_q2630x180084950
                                        av_get_token2640x180005f30
                                        av_gettime2650x180043800
                                        av_gettime_relative2660x180043830
                                        av_gettime_relative_is_monotonic2670x180043870
                                        av_hash_alloc2680x180019f30
                                        av_hash_final2690x18001a1e0
                                        av_hash_final_b642700x18001a410
                                        av_hash_final_bin2710x18001a270
                                        av_hash_final_hex2720x18001a390
                                        av_hash_freep2730x18001a560
                                        av_hash_get_name2740x180019ef0
                                        av_hash_get_size2750x180019f10
                                        av_hash_init2760x18001a020
                                        av_hash_names2770x180019ec0
                                        av_hash_update2780x18001a130
                                        av_hmac_alloc2790x18001cee0
                                        av_hmac_calc2800x18001d240
                                        av_hmac_final2810x18001d180
                                        av_hmac_free2820x18001d070
                                        av_hmac_init2830x18001d0a0
                                        av_hmac_update2840x18001d170
                                        av_hwdevice_ctx_alloc2850x18001d4a0
                                        av_hwdevice_ctx_create2860x18001d9d0
                                        av_hwdevice_ctx_create_derived2870x18001dbf0
                                        av_hwdevice_ctx_create_derived_opts2880x18001da80
                                        av_hwdevice_ctx_init2890x18001d580
                                        av_hwdevice_find_type_by_name2900x18001d3c0
                                        av_hwdevice_get_hwframe_constraints2910x18001d900
                                        av_hwdevice_get_type_name2920x18001d420
                                        av_hwdevice_hwconfig_alloc2930x18001d8d0
                                        av_hwdevice_iterate_types2940x18001d440
                                        av_hwframe_constraints_free2950x18001d9a0
                                        av_hwframe_ctx_alloc2960x18001d5a0
                                        av_hwframe_ctx_create_derived2970x18001e1f0
                                        av_hwframe_ctx_init2980x18001e050
                                        av_hwframe_get_buffer2990x18001df00
                                        av_hwframe_map3000x18001dd00
                                        av_hwframe_transfer_data3010x18001d6c0
                                        av_hwframe_transfer_get_formats3020x18001d6a0
                                        av_i2int3030x1800250a0
                                        av_iamf_audio_element_add_layer3040x180020db0
                                        av_iamf_audio_element_alloc3050x180020d70
                                        av_iamf_audio_element_free3060x180020e30
                                        av_iamf_audio_element_get_class3070x180020d60
                                        av_iamf_mix_presentation_add_submix3080x180021010
                                        av_iamf_mix_presentation_alloc3090x180020fd0
                                        av_iamf_mix_presentation_free3100x180021090
                                        av_iamf_mix_presentation_get_class3110x180020fc0
                                        av_iamf_param_definition_alloc3120x180020bb0
                                        av_iamf_param_definition_get_class3130x180020ba0
                                        av_iamf_submix_add_element3140x180020ec0
                                        av_iamf_submix_add_layout3150x180020f40
                                        av_image_alloc3160x180021ac0
                                        av_image_check_sar3170x180021ec0
                                        av_image_check_size3180x180021e20
                                        av_image_check_size23190x180021d30
                                        av_image_copy3200x180022110
                                        av_image_copy_plane3210x180022040
                                        av_image_copy_plane_uc_from3220x180021f40
                                        av_image_copy_to_buffer3230x180022af0
                                        av_image_copy_uc_from3240x180022480
                                        av_image_fill_arrays3250x1800227f0
                                        av_image_fill_black3260x180023200
                                        av_image_fill_color3270x180022d90
                                        av_image_fill_linesizes3280x1800213c0
                                        av_image_fill_max_pixsteps3290x1800211a0
                                        av_image_fill_plane_sizes3300x180021720
                                        av_image_fill_pointers3310x180021840
                                        av_image_get_buffer_size3320x180022950
                                        av_image_get_linesize3330x180021290
                                        av_int2i3340x180025060
                                        av_int_list_length_for_size3350x180084750
                                        av_lfg_init3360x1800c5e00
                                        av_lfg_init_from_data3370x1800251d0
                                        av_log3380x180026610
                                        av_log23390x1800250b0
                                        av_log2_16bit3400x1800250c0
                                        av_log2_i3410x180023930
                                        av_log_default_callback3420x180025b40
                                        av_log_format_line3430x180026600
                                        av_log_format_line23440x1800262a0
                                        av_log_get_flags3450x180026760
                                        av_log_get_level3460x180026730
                                        av_log_once3470x180026670
                                        av_log_set_callback3480x180026770
                                        av_log_set_flags3490x180026750
                                        av_log_set_level3500x180026740
                                        av_lzo1x_decode3510x1800268c0
                                        av_malloc3520x180028730
                                        av_malloc_array3530x180028880
                                        av_mallocz3540x1800289c0
                                        av_mastering_display_metadata_alloc3550x180026ef0
                                        av_mastering_display_metadata_alloc_size3560x180026f40
                                        av_mastering_display_metadata_create_side_data3570x180026fa0
                                        av_match_list3580x1800069c0
                                        av_match_name3590x180006630
                                        av_max_alloc3600x180028720
                                        av_md5_alloc3610x1800281d0
                                        av_md5_final3620x1800283f0
                                        av_md5_init3630x1800281e0
                                        av_md5_size3640x1800d8b04
                                        av_md5_sum3650x1800284f0
                                        av_md5_update3660x180028210
                                        av_memcpy_backptr3670x180028e80
                                        av_memdup3680x180028bc0
                                        av_mod_i3690x180024310
                                        av_mul_i3700x1800239f0
                                        av_mul_q3710x180034310
                                        av_murmur3_alloc3720x180029410
                                        av_murmur3_final3730x180029930
                                        av_murmur3_init3740x180029440
                                        av_murmur3_init_seeded3750x180029420
                                        av_murmur3_update3760x180029460
                                        av_nearer_q3770x1800345f0
                                        av_opt_child_class_iterate3780x18002f140
                                        av_opt_child_next3790x18002f120
                                        av_opt_copy3800x18002f1e0
                                        av_opt_eval_double3810x18002ef30
                                        av_opt_eval_flags3820x18002edf0
                                        av_opt_eval_float3830x18002eef0
                                        av_opt_eval_int3840x18002ee30
                                        av_opt_eval_int643850x18002eeb0
                                        av_opt_eval_q3860x18002ef70
                                        av_opt_eval_uint3870x18002ee70
                                        av_opt_find3880x18002d9c0
                                        av_opt_find23890x18002d7a0
                                        av_opt_flag_is_set3900x18002efb0
                                        av_opt_free3910x18002d490
                                        av_opt_freep_ranges3920x18002f840
                                        av_opt_get3930x18002c6b0
                                        av_opt_get_chlayout3940x18002ce00
                                        av_opt_get_dict_val3950x18002ce80
                                        av_opt_get_double3960x18002c930
                                        av_opt_get_image_size3970x18002cb60
                                        av_opt_get_int3980x18002c810
                                        av_opt_get_key_value3990x18002d100
                                        av_opt_get_pixel_fmt4000x18002cd20
                                        av_opt_get_q4010x18002ca30
                                        av_opt_get_sample_fmt4020x18002cd90
                                        av_opt_get_video_rate4030x18002cbf0
                                        av_opt_is_set_to_default4040x18002f8e0
                                        av_opt_is_set_to_default_by_name4050x1800301b0
                                        av_opt_next4060x18002b740
                                        av_opt_ptr4070x18002f160
                                        av_opt_query_ranges4080x18002f7f0
                                        av_opt_query_ranges_default4090x18002aa70
                                        av_opt_serialize4100x1800301f0
                                        av_opt_set4110x18002b790
                                        av_opt_set_bin4120x18002bf70
                                        av_opt_set_chlayout4130x18002c660
                                        av_opt_set_defaults4140x18002ede0
                                        av_opt_set_defaults24150x18002ea70
                                        av_opt_set_dict4160x18002d790
                                        av_opt_set_dict24170x18002d5e0
                                        av_opt_set_dict_val4180x18002c600
                                        av_opt_set_double4190x18002ba10
                                        av_opt_set_from_string4200x18002d240
                                        av_opt_set_image_size4210x18002c070
                                        av_opt_set_int4220x18002b850
                                        av_opt_set_pixel_fmt4230x18002c400
                                        av_opt_set_q4240x18002bc80
                                        av_opt_set_sample_fmt4250x18002c500
                                        av_opt_set_video_rate4260x18002c110
                                        av_opt_show24270x18002ced0
                                        av_parse_color4280x1800306d0
                                        av_parse_cpu_caps4290x18000cf80
                                        av_parse_ratio4300x180030340
                                        av_parse_time4310x180030e80
                                        av_parse_video_rate4320x1800304f0
                                        av_parse_video_size4330x180030420
                                        av_pix_fmt_count_planes4340x1800335d0
                                        av_pix_fmt_desc_get4350x1800334f0
                                        av_pix_fmt_desc_get_id4360x180033560
                                        av_pix_fmt_desc_next4370x180033520
                                        av_pix_fmt_get_chroma_sub_sample4380x180033590
                                        av_pix_fmt_swap_endianness4390x180033680
                                        av_pixelutils_get_sad_fn4400x180033d80
                                        av_q2intfloat4410x180034860
                                        av_random_bytes4420x180033da0
                                        av_rc4_alloc4430x180034a20
                                        av_rc4_crypt4440x180034b10
                                        av_rc4_init4450x180034a30
                                        av_read_image_line4460x180032760
                                        av_read_image_line24470x1800321c0
                                        av_realloc4480x180028780
                                        av_realloc_array4490x1800288d0
                                        av_realloc_f4500x1800287b0
                                        av_reallocp4510x180028810
                                        av_reallocp_array4520x180028910
                                        av_reduce4530x1800340c0
                                        av_rescale4540x180027320
                                        av_rescale_delta4550x180027480
                                        av_rescale_q4560x180027360
                                        av_rescale_q_rnd4570x180027330
                                        av_rescale_rnd4580x180027110
                                        av_ripemd_alloc4590x1800392e0
                                        av_ripemd_final4600x1800394d0
                                        av_ripemd_init4610x1800c5ee0
                                        av_ripemd_size4620x1800e2604
                                        av_ripemd_update4630x1800392f0
                                        av_sample_fmt_is_planar4640x180039ac0
                                        av_samples_alloc4650x180039cb0
                                        av_samples_alloc_array_and_samples4660x180039e10
                                        av_samples_copy4670x180039fd0
                                        av_samples_fill_arrays4680x180039be0
                                        av_samples_get_buffer_size4690x180039ae0
                                        av_samples_set_silence4700x18003a140
                                        av_set_options_string4710x18002cf40
                                        av_sha512_alloc4720x1800420a0
                                        av_sha512_final4730x180042250
                                        av_sha512_init4740x1800c60f0
                                        av_sha512_size4750x1800e2754
                                        av_sha512_update4760x1800420b0
                                        av_sha_alloc4770x18003df20
                                        av_sha_final4780x18003e110
                                        av_sha_init4790x1800c6010
                                        av_sha_size4800x1800e2744
                                        av_sha_update4810x18003df30
                                        av_shr_i4820x180023e90
                                        av_size_mult4830x1800293f0
                                        av_small_strptime4840x1800309e0
                                        av_spherical_alloc4850x180042d70
                                        av_spherical_from_name4860x180042e70
                                        av_spherical_projection_name4870x180042e50
                                        av_spherical_tile_bounds4880x180042da0
                                        av_sscanf4890x180002f50
                                        av_stereo3d_alloc4900x180042ed0
                                        av_stereo3d_alloc_size4910x180042f00
                                        av_stereo3d_create_side_data4920x180042f40
                                        av_stereo3d_from_name4930x180042fb0
                                        av_stereo3d_primary_eye_from_name4940x1800430b0
                                        av_stereo3d_primary_eye_name4950x180043090
                                        av_stereo3d_type_name4960x180042f90
                                        av_stereo3d_view_from_name4970x180043030
                                        av_stereo3d_view_name4980x180043010
                                        av_strcasecmp4990x180006120
                                        av_strdup5000x180028ac0
                                        av_strerror5010x180010cf0
                                        av_strireplace5020x1800061f0
                                        av_stristart5030x180005ba0
                                        av_stristr5040x180005c20
                                        av_strlcat5050x180005d80
                                        av_strlcatf5060x180005e30
                                        av_strlcpy5070x180005d10
                                        av_strncasecmp5080x180006180
                                        av_strndup5090x180028b30
                                        av_strnstr5100x180005ca0
                                        av_strstart5110x180005b50
                                        av_strtod5120x180012490
                                        av_strtok5130x180006080
                                        av_sub_i5140x180023800
                                        av_sub_q5150x180034410
                                        av_tea_alloc5160x1800431b0
                                        av_tea_crypt5170x1800431f0
                                        av_tea_init5180x1800431c0
                                        av_tea_size5190x1800e29e0
                                        av_thread_message_flush5200x1800437a0
                                        av_thread_message_queue_alloc5210x180043420
                                        av_thread_message_queue_free5220x1800434d0
                                        av_thread_message_queue_nb_elems5230x180043550
                                        av_thread_message_queue_recv5240x180043650
                                        av_thread_message_queue_send5250x180043590
                                        av_thread_message_queue_set_err_recv5260x180043760
                                        av_thread_message_queue_set_err_send5270x180043720
                                        av_thread_message_queue_set_free_func5280x1800434c0
                                        av_timecode_adjust_ntsc_framenum25290x180043940
                                        av_timecode_check_frame_rate5300x180044140
                                        av_timecode_get_smpte5310x1800439c0
                                        av_timecode_get_smpte_from_framenum5320x180043b80
                                        av_timecode_init5330x1800441b0
                                        av_timecode_init_from_components5340x1800442b0
                                        av_timecode_init_from_string5350x1800444c0
                                        av_timecode_make_mpeg_tc_string5360x1800440d0
                                        av_timecode_make_smpte_tc_string5370x180043ff0
                                        av_timecode_make_smpte_tc_string25380x180043e90
                                        av_timecode_make_string5390x180043ca0
                                        av_timegm5400x180030dc0
                                        av_tree_destroy5410x180045170
                                        av_tree_enumerate5420x180045330
                                        av_tree_find5430x180044970
                                        av_tree_insert5440x180044a20
                                        av_tree_node_alloc5450x180044960
                                        av_tree_node_size5460x1800e2b60
                                        av_ts_make_time_string25470x180044770
                                        av_twofish_alloc5480x180045900
                                        av_twofish_crypt5490x180045910
                                        av_twofish_init5500x1800c64b9
                                        av_twofish_size5510x1800e2b80
                                        av_tx_init5520x1800c7722
                                        av_tx_uninit5530x1800c6e70
                                        av_usleep5540x180043880
                                        av_utf8_decode5550x1800067a0
                                        av_util_ffversion5560x1800ebf00
                                        av_uuid_parse5570x1800849b0
                                        av_uuid_parse_range5580x180084ad0
                                        av_uuid_unparse5590x180084be0
                                        av_uuid_urn_parse5600x180084e60
                                        av_vbprintf5610x180007fb0
                                        av_version_info5620x180084ec0
                                        av_video_enc_params_alloc5630x180084f00
                                        av_video_enc_params_create_side_data5640x180084f60
                                        av_video_hint_alloc5650x180085010
                                        av_video_hint_create_side_data5660x180085070
                                        av_vk_frame_alloc5670x180020a50
                                        av_vkfmt_from_pixfmt5680x180020a40
                                        av_vlog5690x1800266e0
                                        av_write_image_line5700x180032f50
                                        av_write_image_line25710x180032bb0
                                        av_xtea_alloc5720x1800aee70
                                        av_xtea_crypt5730x1800aeec0
                                        av_xtea_init5740x1800aee80
                                        av_xtea_le_crypt5750x1800af010
                                        av_xtea_le_init5760x1800aeea0
                                        avpriv_alloc_fixed_dsp5770x180017160
                                        avpriv_cga_font5780x1800eed00
                                        avpriv_dict_set_timestamp5790x18000fc60
                                        avpriv_float_dsp_alloc5800x1800c59d0
                                        avpriv_fopen_utf85810x180016990
                                        avpriv_init_lls5820x1800c5e80
                                        avpriv_open5830x180016580
                                        avpriv_report_missing_feature5840x180026830
                                        avpriv_request_sample5850x180026780
                                        avpriv_scalarproduct_float_c5860x180017460
                                        avpriv_set_systematic_pal25870x180021930
                                        avpriv_slicethread_create5880x180042ac0
                                        avpriv_slicethread_execute5890x180042810
                                        avpriv_slicethread_free5900x1800429c0
                                        avpriv_solve_lls5910x180025300
                                        avpriv_tempfile5920x1800168b0
                                        avpriv_vga16_font5930x1800edd00
                                        avutil_configuration5940x180084ee0
                                        avutil_license5950x180084ef0
                                        avutil_version5960x180084ed0
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-12-03T17:43:27.566091+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64974420.42.65.92443TCP
                                        2024-12-03T17:43:27.567553+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64974620.42.65.92443TCP
                                        2024-12-03T17:43:27.623125+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64974320.42.65.92443TCP
                                        2024-12-03T17:43:27.624411+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64974520.42.65.92443TCP
                                        2024-12-03T17:46:46.269900+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.650006188.114.96.6443TCP
                                        2024-12-03T17:46:46.275407+01002048735ET MALWARE Latrodectus Loader Related Activity (POST)1192.168.2.650006188.114.96.6443TCP
                                        2024-12-03T17:47:23.184566+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65000720.42.73.29443TCP
                                        2024-12-03T17:47:28.167489+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65000820.42.73.29443TCP
                                        2024-12-03T17:47:28.974293+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65000920.42.73.29443TCP
                                        2024-12-03T17:47:31.131851+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.65001020.42.73.29443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Dec 3, 2024 17:43:07.828974962 CET497076542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:07.949058056 CET654249707103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:07.949176073 CET497076542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:07.962862015 CET497076542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:08.181905031 CET654249707103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:08.382472038 CET497096542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:08.502919912 CET65424970994.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:08.503032923 CET497096542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:08.511116028 CET497096542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:08.631164074 CET65424970994.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:09.789417982 CET65424970994.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:09.789530993 CET65424970994.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:09.789541006 CET65424970994.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:09.789591074 CET497096542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:09.789637089 CET497096542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:09.829509020 CET497096542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:09.949502945 CET65424970994.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:10.229257107 CET65424970994.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:10.229327917 CET497096542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:10.238976955 CET497096542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:10.358994007 CET65424970994.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:14.214961052 CET65424970994.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:14.215331078 CET497096542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:15.000325918 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:15.121179104 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:15.121275902 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:15.859059095 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:15.978979111 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:16.416569948 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:16.416692019 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:16.756037951 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:16.757308006 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:16.876198053 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:16.877232075 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:17.179231882 CET654249707103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:17.179291964 CET497076542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:17.179527044 CET654249707103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:17.179538965 CET654249707103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:17.179569960 CET497076542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:17.284975052 CET497076542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:17.405365944 CET654249707103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:17.819380999 CET654249707103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:17.819478035 CET497076542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:17.930037975 CET497076542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:18.050045967 CET654249707103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:20.712316990 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.712373018 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.712647915 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.712661028 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.712687969 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.712708950 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.713124990 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.713136911 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.713165998 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.713182926 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.713809967 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.713821888 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.713849068 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.713860035 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.714374065 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.714538097 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.714576960 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.715210915 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.716949940 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.720863104 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.720915079 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.832360983 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.832412958 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.914155960 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.914271116 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.914331913 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.914374113 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.916593075 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.916723967 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.916757107 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.916788101 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.924813032 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.924899101 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.924956083 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.925137043 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.933022976 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.933166027 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.933187962 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.933243036 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.941350937 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.941399097 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.941585064 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.941617966 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.949485064 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.949614048 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.949652910 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.949652910 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.957640886 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.957684040 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.957814932 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.957853079 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.965925932 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.965960979 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.966051102 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.966089010 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.974107027 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.974179029 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.974261999 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.977006912 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.981964111 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.982125044 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.982207060 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.989412069 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.989538908 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:20.989625931 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:20.997253895 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.001096010 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.034291983 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.034416914 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.034462929 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.034512997 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.119410038 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.119457006 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.119535923 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.119579077 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.121869087 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.121954918 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.122797012 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.122958899 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.123018026 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.127794027 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.127850056 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.127962112 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.128009081 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.132910967 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.133008003 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.133218050 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.133265018 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.137933969 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.138037920 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.138062000 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.138115883 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.142889023 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.142956972 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.143033028 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.143089056 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.147841930 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.147898912 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.147994041 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.148174047 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.152786970 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.152873039 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.152954102 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.152996063 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.158190966 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.158253908 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.158281088 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.158405066 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.162803888 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.162848949 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.163006067 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.163068056 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.167829037 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.168020964 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.168039083 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.168179035 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.171328068 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.171485901 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.171741009 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.171804905 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.174866915 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.174940109 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.174969912 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.175077915 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.178396940 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.178533077 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.178571939 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.178603888 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.181777954 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.181827068 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.181991100 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.182027102 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.185388088 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.185488939 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.185542107 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.185611963 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.188865900 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.188993931 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.189012051 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.189069986 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.192297935 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.192473888 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.192478895 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.192585945 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.195914984 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.195988894 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.196022987 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.196073055 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.199301004 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.199338913 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.320581913 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.320660114 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.320786953 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.320863962 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.322252035 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.322309017 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.322463989 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.322518110 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.325015068 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.325079918 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.325965881 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.326004982 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.326138020 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.326266050 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.328996897 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.329097033 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.329121113 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.329184055 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.331763029 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.331881046 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.331923008 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.332021952 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.334701061 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.334769011 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.334813118 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.334860086 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.337589979 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.337635040 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.337733984 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.337858915 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.340735912 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.340909958 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.340946913 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.340946913 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.343374968 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.343476057 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.343667984 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.346254110 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.346369982 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.346379995 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.346470118 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.349096060 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.349167109 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.349250078 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.349308968 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.351979971 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.352027893 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.352130890 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.352164984 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.354866028 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.354958057 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.355045080 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.355159044 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.357789040 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.357986927 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.358062983 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.360645056 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.360793114 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.360874891 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.363584995 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.363763094 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.363862991 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.366446972 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.366604090 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.366718054 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.369345903 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.369692087 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.369796038 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.372386932 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.372464895 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.372507095 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.373250961 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.375101089 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.375209093 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.375293016 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.377136946 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.377995968 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.378140926 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.378334045 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.380928040 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.381047010 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.381339073 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.383775949 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.383934975 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.384078026 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.386645079 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.386811018 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.387177944 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.389533997 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.389728069 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.389811039 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.392517090 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.392601013 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.392615080 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.392719030 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.395289898 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.395466089 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.395607948 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.398216009 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.398358107 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.398449898 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.401074886 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.401262045 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.401360989 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.404021025 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.404093027 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.404135942 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.404227972 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.522097111 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.522268057 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.522361040 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.522361040 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.523226976 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.523332119 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.523399115 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.523454905 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.525675058 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.525790930 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.525825024 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.526216984 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.528122902 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.528254032 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.528398991 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.528565884 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.530483007 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.530564070 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.530653000 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.530822992 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.532907009 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.532960892 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.532999992 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.533066988 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.535079956 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.535195112 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.535207033 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.535367966 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.537421942 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.537488937 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.537558079 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.537605047 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.539755106 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.539916039 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.539964914 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.539964914 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.542068005 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.542165995 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.542352915 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.542546034 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.544678926 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.544750929 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.544794083 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.544846058 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.547153950 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.547276020 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.547379971 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.547620058 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.549545050 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.549617052 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.549688101 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.549801111 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.551822901 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.551863909 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.551939011 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.552005053 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.554550886 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.554593086 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.554852009 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.554899931 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.556787014 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.556870937 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:21.556910038 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:21.557121038 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:23.284296989 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:23.404208899 CET65424973294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:23.404316902 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:23.413106918 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:23.534029961 CET65424973294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:24.693860054 CET65424973294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:24.693911076 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:24.694057941 CET65424973294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:24.694067955 CET65424973294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:24.694103956 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:24.694324017 CET65424973294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:24.694356918 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:24.714129925 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:24.834028959 CET65424973294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:25.116374016 CET65424973294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:25.117472887 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:25.239448071 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:25.360321999 CET65424973294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:25.463979959 CET654249707103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:25.464077950 CET497076542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:25.465686083 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:25.586671114 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:25.586785078 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:25.587146997 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:25.707161903 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:30.762181997 CET65424973294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:43:30.762244940 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:43:31.153105974 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:31.274044991 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:31.274223089 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:31.274487019 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:31.405003071 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:34.142429113 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:34.142488003 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:34.145433903 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:34.146363020 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:34.146413088 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:34.146511078 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:34.146524906 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:34.146548986 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:34.146569967 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:34.149393082 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:34.154694080 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:34.265450001 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:34.269503117 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:34.274714947 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:34.698091030 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:34.698282957 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:34.698894024 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:34.819231987 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.382731915 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.382793903 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.382914066 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.382926941 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.382951975 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.382980108 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.383529902 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.383542061 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.383574009 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.385004997 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.385024071 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.385051012 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.385082006 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.385828972 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.385843039 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.385888100 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.386192083 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.386234045 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.391333103 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.391396046 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.503817081 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.503956079 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.596900940 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.597003937 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.597091913 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.597138882 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.601074934 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.601159096 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.601286888 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.601329088 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.609390020 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.609447956 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.609492064 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.609534025 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.617800951 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.617862940 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.617924929 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.617969990 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.626055956 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.626107931 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.626151085 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.626193047 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.634203911 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.634274006 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.634366989 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.634418011 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.642512083 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.642575979 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.642724037 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.642771959 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.650202990 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.650271893 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.650445938 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.650495052 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.657941103 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.657995939 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.658077002 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.658123970 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.665605068 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.665662050 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.665750027 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.665796041 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.673368931 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.673423052 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.673573971 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.673616886 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.681056976 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.681118011 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.717062950 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.717196941 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.817625046 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.817739964 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.817846060 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.820239067 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.820291042 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.820420980 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.820466042 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.825659990 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.825719118 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.825828075 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.825871944 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.830961943 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.831012011 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.831327915 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.831373930 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.836463928 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.836523056 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.836637974 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.836682081 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.841839075 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.841908932 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.841998100 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.842039108 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.847268105 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.847330093 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.847450018 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.847493887 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.852675915 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.852834940 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.852842093 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.852886915 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.856251955 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.856309891 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.856384039 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.856431007 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.859920025 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.859968901 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.860119104 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.860163927 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.863698006 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.863763094 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.863953114 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.864002943 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.867353916 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.867404938 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.867486000 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.867537975 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.871170998 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.871220112 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.871298075 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.871337891 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.874669075 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.874732971 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.874737978 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.874768972 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.878236055 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.878308058 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.878338099 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.878384113 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.881875992 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.881922960 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.881995916 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.882030010 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.885585070 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.885653019 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.885680914 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.885723114 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.889233112 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.889270067 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.889313936 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.889379978 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.892899036 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.893011093 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:43.893034935 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:43.893084049 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.019377947 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.019475937 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.019484997 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.019534111 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.020677090 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.020730019 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.020819902 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.020956993 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.023972034 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.024086952 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.024116993 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.024290085 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.027542114 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.027601004 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.027729034 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.027842999 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.030390978 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.030450106 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.030478954 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.030632973 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.032671928 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.032727957 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.032845974 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.032915115 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.035972118 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.036032915 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.036186934 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.036232948 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.039232016 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.039280891 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.039428949 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.039494991 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.042525053 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.042608976 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.042701006 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.042748928 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.045763016 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.045850992 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.045857906 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.045921087 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.049071074 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.049144983 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.049180984 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.049247026 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.052494049 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.052544117 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.052649975 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.052759886 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.055351973 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.055401087 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.055497885 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.055593014 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.058603048 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.058675051 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.058752060 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.058846951 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.061899900 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.061966896 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.062014103 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.062185049 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.065162897 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.065289021 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.065315962 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.065469980 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.068356037 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.068406105 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.068547964 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.068681002 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.071690083 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.071753979 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.071871042 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.071932077 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.074807882 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.074856043 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.075001001 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.075045109 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.078138113 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.078350067 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.078429937 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.081279039 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.081415892 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.081499100 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:44.084485054 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.084638119 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:44.084713936 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.704622030 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.704677105 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.704819918 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.704857111 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.705116034 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.705137014 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.705161095 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.705178976 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.705766916 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.705780029 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.705811977 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.706324100 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.706336975 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.706366062 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.706391096 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.707027912 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.707082033 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.707634926 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.707678080 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.707791090 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.707830906 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.710587978 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.710628986 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.710700035 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.710741043 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.713423014 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.713469982 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.713596106 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.713637114 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.713913918 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.713924885 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.713957071 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.713995934 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.716389894 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.716449022 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.717031002 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.717072010 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.719343901 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.719388008 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.722839117 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.722889900 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.722985983 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.723021030 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.732193947 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.732261896 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.732335091 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.732382059 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.906898975 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.906960011 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.913656950 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.913765907 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.914990902 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.915057898 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.915144920 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.915188074 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.917741060 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.917891979 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.917926073 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.917947054 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.919065952 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.919116020 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.919251919 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.919292927 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.922023058 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.922075987 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.922244072 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.922291994 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.923470974 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.923536062 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.923671961 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.923713923 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.925430059 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.925484896 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.925700903 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.925745010 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.928657055 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.928711891 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.928848028 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.928891897 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.931025982 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.931072950 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.931139946 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.931183100 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.931925058 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.931977987 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.932102919 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.932142019 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.933984995 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.934030056 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.934154987 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.934199095 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.937412024 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.937469006 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.937552929 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.937597036 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.940270901 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.940325975 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.940439939 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.940481901 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.941063881 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.941107988 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.941260099 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.941298008 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.942996979 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.943056107 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.943133116 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.943175077 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.945842028 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.945904970 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.946028948 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.946075916 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.948914051 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.948972940 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.949052095 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.949098110 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.949327946 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.949378967 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.949466944 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.949510098 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.958007097 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.958121061 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.958178043 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.958178043 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.966515064 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.966561079 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.966623068 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.966660023 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.975227118 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.975295067 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.975356102 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.975393057 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.983747959 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.983793974 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.983871937 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.983906031 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.992393970 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.992440939 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:53.992548943 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:53.992584944 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.001032114 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.001099110 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.001162052 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.001203060 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.009803057 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.009885073 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.124502897 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.126389027 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.126512051 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.126580000 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.127006054 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.129442930 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.129616022 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.129688025 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.130214930 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.130414963 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.130465031 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.132503033 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.132635117 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.132695913 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.139028072 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.139190912 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.139241934 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.144659996 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.144890070 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.144973993 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.151230097 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.151487112 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.151549101 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.157587051 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.157841921 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.157916069 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.164724112 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.164736986 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.164788008 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.170264006 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.170456886 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.170502901 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.176279068 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.176501989 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.176568985 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.182653904 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.182842016 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.182931900 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.188946962 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.189065933 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.189126015 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.195113897 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.195353031 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.195395947 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.201540947 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.201719046 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.201798916 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.207777977 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.207941055 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.207997084 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.214230061 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.214397907 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.214458942 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.220459938 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.220681906 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.220752001 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.226712942 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.226907015 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.227037907 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.232976913 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.233211040 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.233268023 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.239308119 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.239440918 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.239502907 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.245759010 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.245877981 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.245937109 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.249927998 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.250154972 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.250222921 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.251590014 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.251718998 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.251776934 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.252146006 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.252193928 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.252289057 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.255023003 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.258260965 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.258352995 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.258368969 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.258394957 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.334981918 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.335088015 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.335134983 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.335196018 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.336404085 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.336484909 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.336726904 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.336793900 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.341136932 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.341186047 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.342533112 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.342585087 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.342664957 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.342704058 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.345232964 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.345292091 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.345382929 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.345422983 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.350127935 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.350183010 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.350404024 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.350445032 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.354474068 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.354526043 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.354680061 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.354728937 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.358990908 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.359051943 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.359108925 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.359148979 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.363421917 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.363571882 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.363645077 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.367575884 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.367712975 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.367738962 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.367786884 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.370610952 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.370663881 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.370749950 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.370791912 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.371848106 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.371897936 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.371977091 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.371989965 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.372023106 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.372073889 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.372597933 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.372641087 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.374829054 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.374874115 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.374995947 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.375037909 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.375899076 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.375947952 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.376096010 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.376138926 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.377810001 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.377859116 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.377947092 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.377986908 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.379899025 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.379952908 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.380120993 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.380162954 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.380673885 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.380716085 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.384144068 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.384196043 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.384314060 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.384355068 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.388045073 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.388092995 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.388223886 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.388266087 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.391833067 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.391890049 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.391997099 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.392040014 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.395690918 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.395752907 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.395839930 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.395888090 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.399640083 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.399707079 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.399831057 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.399879932 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.403523922 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.403573990 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.403722048 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.404211998 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.407284021 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.407365084 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.407480001 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.407531023 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.594352961 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.594485044 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.594557047 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.595649004 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.595895052 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.595957994 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.598002911 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.598175049 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.598213911 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.600686073 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.600740910 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.600833893 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.600881100 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.603401899 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.603456974 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.603539944 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.603598118 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.606132030 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.606184959 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.606266022 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.606309891 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.608702898 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.608822107 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.608885050 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.608932972 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.611488104 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.611696959 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.611711979 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.611735106 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.614119053 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.614197969 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.614233971 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.614314079 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.616777897 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.616858959 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.616919041 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.617039919 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.619510889 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.619589090 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.619632006 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.619728088 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.622092009 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.622143030 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.622262955 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.622307062 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.626281023 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.626328945 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.626470089 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.626516104 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.627762079 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.627805948 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.627871037 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.627914906 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.630383968 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.630429983 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.630501032 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.630556107 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.632890940 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.632941008 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.633142948 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.633188009 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.635626078 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.635673046 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.635741949 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.635786057 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.638186932 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.638232946 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.638323069 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.638365030 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.641103983 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.641151905 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.641319036 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.641362906 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.643660069 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.643706083 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.643786907 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.643830061 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.646322012 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.646365881 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.646451950 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.646492958 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.648893118 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.648940086 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.649049997 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.649094105 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.651544094 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.651586056 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.651705027 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.651743889 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.654301882 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.654365063 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.654412985 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.654458046 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.656941891 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.656996965 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.657118082 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.657156944 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:43:54.659603119 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:43:54.659666061 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:44:44.353866100 CET65424970994.232.43.224192.168.2.6
                                        Dec 3, 2024 17:44:44.354098082 CET497096542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:44:50.877154112 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:44:50.878988028 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:44:56.177481890 CET654249707103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:44:56.177588940 CET497076542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:44:57.655880928 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:44:57.671518087 CET497076542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:44:57.698549986 CET497126542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:44:57.698688984 CET497096542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:44:57.776561975 CET654249741103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:44:57.779011011 CET497416542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:44:57.791474104 CET654249707103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:44:57.818543911 CET65424971294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:44:57.818705082 CET65424970994.232.43.224192.168.2.6
                                        Dec 3, 2024 17:45:00.769622087 CET65424973294.232.43.224192.168.2.6
                                        Dec 3, 2024 17:45:00.769740105 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:45:12.733971119 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:45:12.755294085 CET497326542192.168.2.694.232.43.224
                                        Dec 3, 2024 17:45:12.854398012 CET654249759103.57.249.207192.168.2.6
                                        Dec 3, 2024 17:45:12.854522943 CET497596542192.168.2.6103.57.249.207
                                        Dec 3, 2024 17:45:12.875328064 CET65424973294.232.43.224192.168.2.6
                                        TimestampSource PortDest PortSource IPDest IP
                                        Dec 3, 2024 17:43:07.681756973 CET5039953192.168.2.61.1.1.1
                                        Dec 3, 2024 17:43:07.681756973 CET6016853192.168.2.61.1.1.1
                                        Dec 3, 2024 17:43:07.822453976 CET53601681.1.1.1192.168.2.6
                                        Dec 3, 2024 17:43:08.335484028 CET53503991.1.1.1192.168.2.6
                                        Dec 3, 2024 17:43:22.887890100 CET5475153192.168.2.61.1.1.1
                                        Dec 3, 2024 17:43:23.262953997 CET53547511.1.1.1192.168.2.6
                                        Dec 3, 2024 17:43:30.765247107 CET6279853192.168.2.61.1.1.1
                                        Dec 3, 2024 17:43:31.151848078 CET53627981.1.1.1192.168.2.6
                                        Dec 3, 2024 17:46:44.703170061 CET53632371.1.1.1192.168.2.6
                                        Dec 3, 2024 17:46:44.703188896 CET53632371.1.1.1192.168.2.6
                                        Dec 3, 2024 17:46:44.703247070 CET53632371.1.1.1192.168.2.6
                                        Dec 3, 2024 17:46:44.703452110 CET53632371.1.1.1192.168.2.6
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Dec 3, 2024 17:43:07.681756973 CET192.168.2.61.1.1.10x4e5fStandard query (0)vutarf.comA (IP address)IN (0x0001)false
                                        Dec 3, 2024 17:43:07.681756973 CET192.168.2.61.1.1.10x3582Standard query (0)huanvn.comA (IP address)IN (0x0001)false
                                        Dec 3, 2024 17:43:22.887890100 CET192.168.2.61.1.1.10xd364Standard query (0)vutarf.comA (IP address)IN (0x0001)false
                                        Dec 3, 2024 17:43:30.765247107 CET192.168.2.61.1.1.10xd347Standard query (0)huanvn.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Dec 3, 2024 17:43:07.822453976 CET1.1.1.1192.168.2.60x3582No error (0)huanvn.com103.57.249.207A (IP address)IN (0x0001)false
                                        Dec 3, 2024 17:43:08.335484028 CET1.1.1.1192.168.2.60x4e5fNo error (0)vutarf.com94.232.43.224A (IP address)IN (0x0001)false
                                        Dec 3, 2024 17:43:23.262953997 CET1.1.1.1192.168.2.60xd364No error (0)vutarf.com94.232.43.224A (IP address)IN (0x0001)false
                                        Dec 3, 2024 17:43:31.151848078 CET1.1.1.1192.168.2.60xd347No error (0)huanvn.com103.57.249.207A (IP address)IN (0x0001)false
                                        Dec 3, 2024 17:46:44.703170061 CET1.1.1.1192.168.2.60x13dServer failure (2)reateberam.comnonenoneA (IP address)IN (0x0001)false
                                        Dec 3, 2024 17:46:44.703188896 CET1.1.1.1192.168.2.60x13dServer failure (2)reateberam.comnonenoneA (IP address)IN (0x0001)false
                                        Dec 3, 2024 17:46:44.703247070 CET1.1.1.1192.168.2.60x13dServer failure (2)reateberam.comnonenoneA (IP address)IN (0x0001)false
                                        Dec 3, 2024 17:46:44.703452110 CET1.1.1.1192.168.2.60x13dServer failure (2)reateberam.comnonenoneA (IP address)IN (0x0001)false

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:11:43:02
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\loaddll64.exe
                                        Wow64 process (32bit):false
                                        Commandline:loaddll64.exe "C:\Users\user\Desktop\avutil.dll.dll"
                                        Imagebase:0x7ff7a7210000
                                        File size:165'888 bytes
                                        MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:1
                                        Start time:11:43:02
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff66e660000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:2
                                        Start time:11:43:02
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",#1
                                        Imagebase:0x7ff732310000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:3
                                        Start time:11:43:02
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,DLLMain
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000003.00000002.4678724103.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000003.00000003.3250744554.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000003.00000003.2290158761.0000021E06F25000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000003.00000003.3250525715.0000021E0152D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:high
                                        Has exited:false

                                        Target ID:4
                                        Start time:11:43:02
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",#1
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000004.00000002.4681807964.0000023B61A2C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:high
                                        Has exited:false

                                        Target ID:6
                                        Start time:11:43:05
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,av_add_q
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:11:43:08
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe C:\Users\user\Desktop\avutil.dll.dll,av_add_stable
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:9
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",DLLMain
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000009.00000002.4718709422.0000026D524AC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000009.00000003.2620826714.0000026D524DB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000009.00000003.2620889065.0000026D524DB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:high
                                        Has exited:false

                                        Target ID:10
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_add_q
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:11
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_add_stable
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:12
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_version
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:13
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_license
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:14
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avutil_configuration
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:15
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_vga16_font
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:16
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_tempfile
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:17
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_solve_lls
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:18
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_free
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:19
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_execute
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:20
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_slicethread_create
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:21
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_set_systematic_pal2
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:22
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_scalarproduct_float_c
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:23
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_request_sample
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:24
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_report_missing_feature
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:25
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_open
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:26
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_init_lls
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:27
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_fopen_utf8
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:28
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_float_dsp_alloc
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:29
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_dict_set_timestamp
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:30
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_cga_font
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:31
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",avpriv_alloc_fixed_dsp
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:32
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_le_init
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:33
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_le_crypt
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:34
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_init
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:35
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_crypt
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:36
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_xtea_alloc
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:37
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_write_image_line2
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:38
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_write_image_line
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:39
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vlog
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:40
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vkfmt_from_pixfmt
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:41
                                        Start time:11:43:12
                                        Start date:03/12/2024
                                        Path:C:\Windows\System32\rundll32.exe
                                        Wow64 process (32bit):false
                                        Commandline:rundll32.exe "C:\Users\user\Desktop\avutil.dll.dll",av_vk_frame_alloc
                                        Imagebase:0x7ff743440000
                                        File size:71'680 bytes
                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:0.7%
                                          Dynamic/Decrypted Code Coverage:98.3%
                                          Signature Coverage:19.7%
                                          Total number of Nodes:238
                                          Total number of Limit Nodes:11
                                          execution_graph 54626 26ce85f22a8 54627 26ce85f233c 54626->54627 54635 26ce85f22c0 malloc 54626->54635 54648 26ce85fb5f0 DecodePointer 54627->54648 54629 26ce85f2341 54649 26ce85f3b0c 47 API calls _getptd_noexit 54629->54649 54632 26ce85f2331 54634 26ce85f22d8 54634->54635 54642 26ce85fb62c 47 API calls 2 library calls 54634->54642 54643 26ce85fb6a0 47 API calls 9 library calls 54634->54643 54644 26ce85fb0c8 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 54634->54644 54635->54632 54635->54634 54636 26ce85f2321 54635->54636 54640 26ce85f2326 54635->54640 54645 26ce85fb5f0 DecodePointer 54635->54645 54646 26ce85f3b0c 47 API calls _getptd_noexit 54636->54646 54647 26ce85f3b0c 47 API calls _getptd_noexit 54640->54647 54642->54634 54643->54634 54645->54635 54646->54640 54647->54632 54648->54629 54649->54632 54650 26ce6870009 54653 26ce6870024 54650->54653 54654 26ce687008a 54653->54654 54655 26ce687015e VirtualAlloc 54654->54655 54656 26ce6870194 54655->54656 54658 26ce687001d 54655->54658 54657 26ce6870346 LoadLibraryA 54656->54657 54656->54658 54657->54656 54657->54658 54659 26ce85fbfb8 54660 26ce85fbfda _W_store_winword 54659->54660 54661 26ce85fc036 54660->54661 54662 26ce85fc016 54660->54662 54689 26ce85fc00a 54660->54689 54664 26ce85fc084 54661->54664 54667 26ce85fc079 54661->54667 54712 26ce85f3a9c 47 API calls _getptd_noexit 54662->54712 54668 26ce85fc099 54664->54668 54716 26ce85fbd68 48 API calls 4 library calls 54664->54716 54715 26ce85f3a9c 47 API calls _getptd_noexit 54667->54715 54704 26ce8603450 54668->54704 54673 26ce85fc01b 54713 26ce85f3b0c 47 API calls _getptd_noexit 54673->54713 54675 26ce85fc023 54714 26ce85fa4e8 7 API calls _invalid_parameter_noinfo 54675->54714 54678 26ce85fc6ee WriteFile 54699 26ce85fc506 _Strftime_l 54678->54699 54679 26ce85fc0c9 GetConsoleMode 54680 26ce85fc109 54679->54680 54697 26ce85fc364 _Strftime_l 54679->54697 54682 26ce85fc118 GetConsoleCP 54680->54682 54680->54697 54681 26ce85fc73d 54681->54689 54722 26ce85f3b0c 47 API calls _getptd_noexit 54681->54722 54682->54681 54700 26ce85fc13c _write_nolock 54682->54700 54684 26ce85fc769 54723 26ce85f3a9c 47 API calls _getptd_noexit 54684->54723 54685 26ce85fc467 WriteFile 54685->54697 54687 26ce85fc62a WideCharToMultiByte 54690 26ce85fc676 WriteFile 54687->54690 54687->54697 54688 26ce85fc554 WriteFile 54688->54697 54688->54699 54724 26ce85f1440 54689->54724 54690->54699 54692 26ce85fc736 54721 26ce85f3abc 47 API calls 2 library calls 54692->54721 54693 26ce85fc1ee WideCharToMultiByte 54696 26ce85fc231 WriteFile 54693->54696 54693->54697 54696->54697 54701 26ce85fc26c 54696->54701 54697->54678 54697->54681 54697->54685 54697->54687 54697->54688 54697->54689 54697->54692 54719 26ce85f3b0c 47 API calls _getptd_noexit 54697->54719 54720 26ce85f3a9c 47 API calls _getptd_noexit 54697->54720 54698 26ce86047a8 WriteConsoleW CreateFileW _putwch_nolock 54698->54701 54699->54690 54699->54697 54700->54693 54700->54697 54700->54701 54718 26ce85fd60c 47 API calls _LocaleUpdate::_LocaleUpdate 54700->54718 54701->54697 54701->54698 54701->54700 54703 26ce85fc28c WriteFile 54701->54703 54703->54697 54703->54701 54705 26ce8603459 54704->54705 54707 26ce8603466 54704->54707 54733 26ce85f3b0c 47 API calls _getptd_noexit 54705->54733 54709 26ce85fc0a0 54707->54709 54734 26ce85f3b0c 47 API calls _getptd_noexit 54707->54734 54709->54697 54717 26ce85fd224 47 API calls 2 library calls 54709->54717 54710 26ce860349d 54735 26ce85fa4e8 7 API calls _invalid_parameter_noinfo 54710->54735 54712->54673 54713->54675 54714->54689 54715->54673 54716->54668 54717->54679 54718->54700 54719->54697 54720->54697 54721->54681 54722->54684 54723->54689 54725 26ce85f1449 54724->54725 54726 26ce85f1454 54725->54726 54727 26ce85f9ff8 IsProcessorFeaturePresent 54725->54727 54728 26ce85fa00f 54727->54728 54736 26ce85f7088 RtlVirtualUnwind __crtCapturePreviousContext _GetEstablisherFrame 54728->54736 54730 26ce85fa022 54737 26ce85f9fac UnhandledExceptionFilter IsDebuggerPresent __raise_securityfailure 54730->54737 54733->54709 54734->54710 54735->54709 54736->54730 54738 7ffd936f1330 54739 7ffd936f1336 54738->54739 54740 7ffd936f133e VirtualAllocExNuma 54738->54740 54742 7ffd936f13e2 54740->54742 54742->54742 54743 26ce85f393c 54744 26ce85f3958 54743->54744 54747 26ce85f395d 54743->54747 54757 26ce85fe074 GetCurrentProcessId QueryPerformanceCounter __security_init_cookie 54744->54757 54746 26ce85f39e8 54754 26ce85f39b2 54746->54754 54804 26ce85c4300 54746->54804 54747->54746 54747->54754 54758 26ce85f37dc 54747->54758 54751 26ce85f3a2f 54752 26ce85f37dc _CRT_INIT 83 API calls 54751->54752 54751->54754 54752->54754 54753 26ce85c4300 _DllMainCRTStartup 131 API calls 54755 26ce85f3a22 54753->54755 54756 26ce85f37dc _CRT_INIT 83 API calls 54755->54756 54756->54751 54757->54747 54759 26ce85f386b 54758->54759 54760 26ce85f37ee 54758->54760 54762 26ce85f38c1 54759->54762 54768 26ce85f386f _CRT_INIT 54759->54768 54808 26ce85fafb0 GetProcessHeap 54760->54808 54764 26ce85f38c6 54762->54764 54765 26ce85f3924 54762->54765 54763 26ce85f37f3 54790 26ce85f37f7 __security_init_cookie _CRT_INIT 54763->54790 54809 26ce85fd390 51 API calls 8 library calls 54763->54809 54834 26ce85f7134 TlsGetValue 54764->54834 54765->54790 54835 26ce85fd1e8 47 API calls 2 library calls 54765->54835 54768->54790 54830 26ce85fb0e0 49 API calls free 54768->54830 54772 26ce85f3897 54782 26ce85f38a6 _CRT_INIT 54772->54782 54831 26ce85faf3c 47 API calls 2 library calls 54772->54831 54776 26ce85f38a1 54832 26ce85fd410 TlsFree _mtterm 54776->54832 54778 26ce85f3803 _CRT_INIT _RTC_Initialize 54778->54790 54810 26ce85fe120 52 API calls 2 library calls 54778->54810 54782->54790 54833 26ce85fd410 TlsFree _mtterm 54782->54833 54786 26ce85f3825 54811 26ce85fac0c 54786->54811 54790->54746 54791 26ce85f3831 54792 26ce85f3835 54791->54792 54793 26ce85f383c 54791->54793 54825 26ce85fd410 TlsFree _mtterm 54792->54825 54826 26ce85fdc84 58 API calls 3 library calls 54793->54826 54796 26ce85f3841 54797 26ce85f3855 54796->54797 54827 26ce85fdf40 57 API calls 5 library calls 54796->54827 54803 26ce85f3859 54797->54803 54829 26ce85faf3c 47 API calls 2 library calls 54797->54829 54800 26ce85f3869 54800->54792 54801 26ce85f384a 54801->54797 54828 26ce85fb260 56 API calls 5 library calls 54801->54828 54803->54790 54805 26ce85c4321 54804->54805 54806 26ce85c4323 54804->54806 54805->54751 54805->54753 54868 26ce85c4340 54806->54868 54808->54763 54809->54778 54810->54786 54836 26ce85f49f0 54811->54836 54813 26ce85fac3b 54814 26ce85f6318 _calloc_crt 47 API calls 54813->54814 54816 26ce85fac4f 54814->54816 54815 26ce85facca GetStartupInfoW 54817 26ce85fae26 _getstream 54815->54817 54820 26ce85face4 54815->54820 54816->54815 54818 26ce85fac5f _wfsopen 54816->54818 54817->54818 54819 26ce85fae6e GetStdHandle 54817->54819 54818->54791 54819->54817 54821 26ce85fae99 GetFileType 54819->54821 54820->54817 54822 26ce85f6318 _calloc_crt 47 API calls 54820->54822 54823 26ce85fad40 _getstream 54820->54823 54821->54817 54822->54820 54823->54817 54824 26ce85fadc8 GetFileType 54823->54824 54824->54823 54826->54796 54827->54801 54828->54797 54829->54800 54830->54772 54831->54776 54835->54790 54837 26ce85f4a1f EnterCriticalSection 54836->54837 54838 26ce85f4a0e 54836->54838 54842 26ce85f4abc 54838->54842 54843 26ce85f4ad9 54842->54843 54844 26ce85f4af2 54842->54844 54862 26ce85fb62c 47 API calls 2 library calls 54843->54862 54846 26ce85f4b0a 54844->54846 54847 26ce85f4a13 54844->54847 54865 26ce85f6398 47 API calls malloc 54846->54865 54847->54837 54861 26ce85fb228 47 API calls 3 library calls 54847->54861 54848 26ce85f4ade 54863 26ce85fb6a0 47 API calls 9 library calls 54848->54863 54851 26ce85f4b14 54852 26ce85f4b2b 54851->54852 54853 26ce85f4b1c 54851->54853 54856 26ce85f49f0 _lock 47 API calls 54852->54856 54866 26ce85f3b0c 47 API calls _getptd_noexit 54853->54866 54854 26ce85f4ae8 54864 26ce85fb0c8 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 54854->54864 54858 26ce85f4b35 54856->54858 54860 26ce85f4b21 _getstream _alloc_osfhnd 54858->54860 54867 26ce85f1e24 47 API calls 4 library calls 54858->54867 54860->54847 54862->54848 54863->54854 54865->54851 54866->54860 54867->54860 54912 26ce85c4750 54868->54912 54870 26ce85c4374 _NMSG_WRITE 54871 26ce85c4402 SHGetSpecialFolderPathW lstrcatW lstrcatW lstrcatW lstrcatW 54870->54871 54923 26ce85c56e0 54871->54923 54873 26ce85c449a SafeRWList 54874 26ce85c46af 54873->54874 54933 26ce85cacf0 49 API calls 4 library calls 54873->54933 54949 26ce85c58c0 64 API calls 2 library calls 54874->54949 54877 26ce85c46bc 54950 26ce85c4700 64 API calls 2 library calls 54877->54950 54878 26ce85c44c7 54934 26ce85c4a40 89 API calls 4 library calls 54878->54934 54881 26ce85c44dc std::runtime_error::runtime_error 54935 26ce85cb0a0 80 API calls 8 library calls 54881->54935 54882 26ce85c46ca collate 54884 26ce85f1440 _Stoldx 4 API calls 54882->54884 54886 26ce85c46e8 54884->54886 54885 26ce85c4505 Concurrency::details::SchedulerBase::PushRunnableToInactive 54936 26ce85cb0a0 80 API calls 8 library calls 54885->54936 54886->54805 54888 26ce85c4527 54937 26ce85c5540 49 API calls 4 library calls 54888->54937 54890 26ce85c453c 54938 26ce85c4a40 89 API calls 4 library calls 54890->54938 54892 26ce85c4552 std::runtime_error::runtime_error 54939 26ce85cb0a0 80 API calls 8 library calls 54892->54939 54894 26ce85c457b Concurrency::details::SchedulerBase::PushRunnableToInactive collate 54940 26ce85cb0a0 80 API calls 8 library calls 54894->54940 54896 26ce85c45ab 54941 26ce85c5540 49 API calls 4 library calls 54896->54941 54898 26ce85c45bf 54942 26ce85c4a40 89 API calls 4 library calls 54898->54942 54900 26ce85c45d5 std::runtime_error::runtime_error 54943 26ce85cb0a0 80 API calls 8 library calls 54900->54943 54902 26ce85c45fe Concurrency::details::SchedulerBase::PushRunnableToInactive collate 54944 26ce85cb0a0 80 API calls 8 library calls 54902->54944 54904 26ce85c462e 54945 26ce85c5540 49 API calls 4 library calls 54904->54945 54906 26ce85c4640 54946 26ce85c4a40 89 API calls 4 library calls 54906->54946 54908 26ce85c4656 std::runtime_error::runtime_error 54947 26ce85cb0a0 80 API calls 8 library calls 54908->54947 54910 26ce85c467f Concurrency::details::SchedulerBase::PushRunnableToInactive collate 54948 26ce85cb0a0 80 API calls 8 library calls 54910->54948 54913 26ce85c4797 _NMSG_WRITE 54912->54913 54914 26ce85c479b 54913->54914 54915 26ce85c47c7 54913->54915 54951 26ce85c5540 49 API calls 4 library calls 54914->54951 54952 26ce85c5540 49 API calls 4 library calls 54915->54952 54918 26ce85c47d6 _DllMainCRTStartup 54922 26ce85c47af collate _DllMainCRTStartup 54918->54922 54953 26ce85c5670 49 API calls _DllMainCRTStartup 54918->54953 54919 26ce85f1440 _Stoldx 4 API calls 54920 26ce85c4884 54919->54920 54920->54870 54922->54919 54925 26ce85c5710 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 54923->54925 54954 26ce85c80d0 84 API calls 2 library calls 54925->54954 54926 26ce85c575a 54955 26ce85c8550 54 API calls 2 library calls 54926->54955 54928 26ce85c57b1 54956 26ce85c85e0 117 API calls 4 library calls 54928->54956 54930 26ce85c57d4 54931 26ce85c5800 54930->54931 54957 26ce85c5050 49 API calls 2 library calls 54930->54957 54931->54873 54933->54878 54934->54881 54935->54885 54936->54888 54937->54890 54938->54892 54939->54894 54940->54896 54941->54898 54942->54900 54943->54902 54944->54904 54945->54906 54946->54908 54947->54910 54948->54874 54949->54877 54950->54882 54951->54922 54952->54918 54953->54922 54954->54926 54955->54928 54956->54930 54957->54931 54958 26ce85f9cdc 54959 26ce85f9d07 __crtDownlevelLocaleNameToLCID 54958->54959 54960 26ce85f9d03 GetLocaleInfoEx 54958->54960 54962 26ce85f9d0c GetLocaleInfoW 54959->54962 54961 26ce85f9d1c 54960->54961 54962->54961

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 72 26ce6870024-26ce6870088 73 26ce687008a-26ce6870098 72->73 74 26ce687009a-26ce68700a5 73->74 75 26ce68700a7-26ce68700ac 73->75 74->74 74->75 76 26ce68700ae-26ce68700b8 75->76 76->76 77 26ce68700ba-26ce68700bd 76->77 78 26ce6870121-26ce6870127 77->78 79 26ce68700bf-26ce68700c7 77->79 78->73 80 26ce687012d-26ce687012e 78->80 81 26ce68700c9-26ce68700d5 79->81 82 26ce6870130-26ce687018e call 26ce6870418 * 3 VirtualAlloc 80->82 83 26ce68700db-26ce68700e6 81->83 84 26ce6870384-26ce6870388 81->84 98 26ce6870404 82->98 99 26ce6870194-26ce68701aa 82->99 83->83 86 26ce68700e8-26ce68700eb 83->86 84->82 86->84 88 26ce68700f1-26ce68700fd 86->88 90 26ce6870103-26ce687010b 88->90 91 26ce68700ff 88->91 93 26ce6870112-26ce6870116 90->93 94 26ce687010d-26ce687010f 90->94 91->90 93->78 96 26ce6870118-26ce687011f 93->96 94->93 96->81 102 26ce6870406-26ce6870416 98->102 100 26ce68701ac-26ce68701b3 99->100 101 26ce68701c8-26ce68701e6 99->101 103 26ce68701b5-26ce68701c6 100->103 101->98 104 26ce68701ec-26ce68701f1 101->104 103->101 103->103 105 26ce68701f3-26ce68701f9 104->105 106 26ce687020b-26ce687020e 105->106 107 26ce68701fb-26ce6870205 105->107 108 26ce6870220-26ce6870237 106->108 109 26ce6870210-26ce687021a 106->109 107->106 110 26ce6870207-26ce6870208 107->110 112 26ce6870251-26ce687025e 108->112 113 26ce6870239-26ce687023a 108->113 109->108 111 26ce687021c-26ce687021d 109->111 110->106 111->108 112->105 115 26ce6870260-26ce6870265 112->115 114 26ce687023c-26ce687024f 113->114 114->112 114->114 115->98 116 26ce687026b-26ce6870273 115->116 117 26ce687032a-26ce6870334 116->117 118 26ce6870279-26ce687027a 116->118 117->98 119 26ce687033a-26ce6870340 117->119 120 26ce687027d-26ce6870294 118->120 121 26ce6870342-26ce6870343 119->121 122 26ce68703b1-26ce68703be 119->122 123 26ce687031f-26ce6870322 120->123 124 26ce687029a 120->124 128 26ce6870346-26ce6870356 LoadLibraryA 121->128 126 26ce68703c0-26ce68703cc 122->126 127 26ce68703e6-26ce6870402 122->127 123->120 125 26ce6870328 123->125 129 26ce687029c-26ce68702b5 124->129 125->117 130 26ce68703de-26ce68703e4 126->130 127->102 128->98 131 26ce687035c-26ce6870365 128->131 132 26ce6870317-26ce687031a 129->132 133 26ce68702b7-26ce68702dc 129->133 130->127 135 26ce68703ce-26ce68703db 130->135 136 26ce68703a9-26ce68703af 131->136 137 26ce6870367-26ce6870368 131->137 132->129 134 26ce687031c 132->134 139 26ce68702de-26ce68702f2 133->139 134->123 135->130 136->122 136->128 140 26ce687036a-26ce687037d 137->140 139->139 141 26ce68702f4-26ce6870300 139->141 144 26ce687037f-26ce6870382 140->144 145 26ce687038d-26ce6870392 140->145 142 26ce6870302-26ce6870315 141->142 142->132 142->142 146 26ce6870394-26ce68703a1 144->146 145->146 146->140 148 26ce68703a3-26ce68703a7 146->148 148->136
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: AllocLibraryLoadVirtual
                                          • String ID: .$3$e$k$l$r
                                          • API String ID: 3550616410-427081609
                                          • Opcode ID: 291297bbe044f9a5b47e76894c7116349fbdee25044733f7824d139af3bc4b69
                                          • Instruction ID: ea0a942164159a61caf241467d81bb2b9d7ab423c78f97bcfab0b378217a4043
                                          • Opcode Fuzzy Hash: 291297bbe044f9a5b47e76894c7116349fbdee25044733f7824d139af3bc4b69
                                          • Instruction Fuzzy Hash: C1D1E670224F0D4BDB2DFB59D8886B5B3E2FB96315F34416ED487C7296DA32A8438790

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: lstrcat$char_traits$FileModuleNameProcessorVirtual$Concurrency::FolderListPathRootRoot::SafeSpecialctypeshared_ptrstd::ios_base::getlocstd::ios_base::width
                                          • String ID: DLLMain$\NTUSER.DAT.Not
                                          • API String ID: 3304544195-2041910327
                                          • Opcode ID: d30e8e5b88aad5fa04ee92c3bd5113da6591793adca71e7613593e8e8900fb11
                                          • Instruction ID: 62fb6becf574f6eca70bba12693b0e33ec9605917630a114be88902111b10c59
                                          • Opcode Fuzzy Hash: d30e8e5b88aad5fa04ee92c3bd5113da6591793adca71e7613593e8e8900fb11
                                          • Instruction Fuzzy Hash: D491017222B9C595EA20FB54F4983FA7375F7C4340FA01112D6DE87AAAEF2AC505CB40

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4682694752.00007FFD936F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD936F0000, based on PE: true
                                          • Associated: 00000000.00000002.4682663036.00007FFD936F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.4682925629.00007FFD937BC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.4682995000.00007FFD937BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.4683825189.00007FFD947FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.4683844155.00007FFD94804000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.4683860746.00007FFD94805000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.4683877974.00007FFD94808000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd936f0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: AllocNumaVirtual
                                          • String ID: +=$,=$@
                                          • API String ID: 4233825816-2127940403
                                          • Opcode ID: 90f39fe90f72f0608001160906d043fdca6e6bb2d5c2e1c5a3b78c0ae946c4bd
                                          • Instruction ID: bbba4b2386b4a80d8c10cab31753d40dd162d69387ae24ce7f2f0fec0b22dc07
                                          • Opcode Fuzzy Hash: 90f39fe90f72f0608001160906d043fdca6e6bb2d5c2e1c5a3b78c0ae946c4bd
                                          • Instruction Fuzzy Hash: 91112FA1B0439801FFA993B9E53537D6646A716FF0EC043399D2D17BC6D96C41058340

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 654 26ce85f78d8-26ce85f8a22 call 26ce85f3b7c 658 26ce85f8a25-26ce85f8a29 654->658 659 26ce85f8a2b 658->659 660 26ce85f8a54-26ce85f8a62 658->660 662 26ce85f8a2e call 26ce85f6398 659->662 661 26ce85f8a6a-26ce85f8a6e 660->661 663 26ce85f8a70-26ce85f8a88 call 26ce85fa17c 661->663 664 26ce85f8a8e-26ce85f8aaf call 26ce85f3f10 661->664 665 26ce85f8a33-26ce85f8a39 662->665 663->664 677 26ce85f9041-26ce85f9056 call 26ce85fa508 663->677 664->661 678 26ce85f8ab1-26ce85f8ab3 664->678 668 26ce85f8a3f-26ce85f8a4f call 26ce85f3cd0 665->668 669 26ce85f903d-26ce85f903f 665->669 668->660 673 26ce85f9009-26ce85f900e 669->673 675 26ce85f9010-26ce85f9015 673->675 676 26ce85f901c-26ce85f903c 673->676 675->676 685 26ce85f9057-26ce85f906c call 26ce85fa508 677->685 680 26ce85f8ab7-26ce85f8abb 678->680 682 26ce85f8ae3-26ce85f8afc call 26ce85f3f10 680->682 683 26ce85f8abd-26ce85f8add call 26ce85fa17c 680->683 682->680 690 26ce85f8afe-26ce85f8b00 682->690 683->682 683->685 693 26ce85f906d-26ce85f9082 call 26ce85fa508 685->693 692 26ce85f8b04-26ce85f8b08 690->692 695 26ce85f8b0a-26ce85f8b2a call 26ce85fa17c 692->695 696 26ce85f8b30-26ce85f8b49 call 26ce85f3f10 692->696 700 26ce85f9083-26ce85f9098 call 26ce85fa508 693->700 695->693 695->696 696->692 704 26ce85f8b4b-26ce85f8b4d 696->704 707 26ce85f9099-26ce85f90ae call 26ce85fa508 700->707 706 26ce85f8b54-26ce85f8b58 704->706 708 26ce85f8b5a-26ce85f8b7a call 26ce85fa17c 706->708 709 26ce85f8b80-26ce85f8b99 call 26ce85f3f10 706->709 717 26ce85f90af-26ce85f90c4 call 26ce85fa508 707->717 708->700 708->709 709->706 716 26ce85f8b9b-26ce85f8b9d 709->716 718 26ce85f8ba4-26ce85f8ba8 716->718 725 26ce85f90c5-26ce85f90da call 26ce85fa508 717->725 720 26ce85f8baa-26ce85f8bca call 26ce85fa17c 718->720 721 26ce85f8bd0-26ce85f8be9 call 26ce85f3f10 718->721 720->707 720->721 721->718 729 26ce85f8beb-26ce85f8bef 721->729 733 26ce85f90db-26ce85f90f0 call 26ce85fa508 725->733 731 26ce85f8c16-26ce85f8c2c call 26ce85f3f10 729->731 732 26ce85f8bf1-26ce85f8c10 call 26ce85fa17c 729->732 740 26ce85f8c53-26ce85f8c69 call 26ce85f3f10 731->740 741 26ce85f8c2e-26ce85f8c4d call 26ce85fa17c 731->741 732->717 732->731 742 26ce85f90f1-26ce85f9106 call 26ce85fa508 733->742 750 26ce85f8c6b-26ce85f8c8a call 26ce85fa17c 740->750 751 26ce85f8c90-26ce85f8ca6 call 26ce85f3f10 740->751 741->725 741->740 749 26ce85f9107-26ce85f911c call 26ce85fa508 742->749 758 26ce85f911d-26ce85f9132 call 26ce85fa508 749->758 750->733 750->751 759 26ce85f8cbb-26ce85f8cc4 751->759 760 26ce85f8ca8-26ce85f8cb5 751->760 768 26ce85f9133-26ce85f9148 call 26ce85fa508 758->768 762 26ce85f8cc9-26ce85f8ccc 759->762 760->759 763 26ce85f8cc6 762->763 764 26ce85f8cce-26ce85f8cd2 762->764 763->762 766 26ce85f8cd4-26ce85f8cfd call 26ce8602a48 764->766 767 26ce85f8d03-26ce85f8d1e call 26ce85f7628 764->767 766->742 766->767 767->762 775 26ce85f8d20-26ce85f8d29 767->775 776 26ce85f9149-26ce85f915e call 26ce85fa508 768->776 777 26ce85f8d2e-26ce85f8d31 775->777 782 26ce85f915f-26ce85f9174 call 26ce85fa508 776->782 779 26ce85f8d2b 777->779 780 26ce85f8d33-26ce85f8d37 777->780 779->777 783 26ce85f8d39-26ce85f8d62 call 26ce8602a48 780->783 784 26ce85f8d68-26ce85f8d83 call 26ce85f7628 780->784 792 26ce85f9175-26ce85f918a call 26ce85fa508 782->792 783->749 783->784 784->777 791 26ce85f8d85-26ce85f8d8e 784->791 793 26ce85f8d93-26ce85f8d96 791->793 800 26ce85f918b-26ce85f91a0 call 26ce85fa508 792->800 795 26ce85f8d98-26ce85f8d9c 793->795 796 26ce85f8d90 793->796 798 26ce85f8d9e-26ce85f8dc7 call 26ce8602a48 795->798 799 26ce85f8dcd-26ce85f8de8 call 26ce85f7628 795->799 796->793 798->758 798->799 799->793 808 26ce85f8dea-26ce85f8df3 799->808 807 26ce85f91a1-26ce85f91b7 call 26ce85fa508 800->807 810 26ce85f8df8-26ce85f8dfb 808->810 812 26ce85f8df5 810->812 813 26ce85f8dfd-26ce85f8e01 810->813 812->810 814 26ce85f8e03-26ce85f8e2c call 26ce8602a48 813->814 815 26ce85f8e32-26ce85f8e4d call 26ce85f7628 813->815 814->768 814->815 815->810 820 26ce85f8e4f-26ce85f8e58 815->820 821 26ce85f8e5d-26ce85f8e60 820->821 822 26ce85f8e5a 821->822 823 26ce85f8e62-26ce85f8e66 821->823 822->821 824 26ce85f8e68-26ce85f8e91 call 26ce8602a48 823->824 825 26ce85f8e97-26ce85f8eb2 call 26ce85f7628 823->825 824->776 824->825 825->821 830 26ce85f8eb4 825->830 831 26ce85f8eb9-26ce85f8ebc 830->831 832 26ce85f8eb6 831->832 833 26ce85f8ebe-26ce85f8ec2 831->833 832->831 834 26ce85f8ec4-26ce85f8eec call 26ce8602a48 833->834 835 26ce85f8ef2-26ce85f8f06 call 26ce85f7628 833->835 834->782 834->835 840 26ce85f8f0b-26ce85f8f0e 835->840 841 26ce85f8f08 840->841 842 26ce85f8f10-26ce85f8f14 840->842 841->840 843 26ce85f8f16-26ce85f8f3e call 26ce8602a48 842->843 844 26ce85f8f44-26ce85f8f58 call 26ce85f7628 842->844 843->792 843->844 849 26ce85f8f5d-26ce85f8f60 844->849 850 26ce85f8f5a 849->850 851 26ce85f8f62-26ce85f8f66 849->851 850->849 852 26ce85f8f68-26ce85f8f90 call 26ce8602a48 851->852 853 26ce85f8f96-26ce85f8faa call 26ce85f7628 851->853 852->800 852->853 858 26ce85f8faf-26ce85f8fb2 853->858 859 26ce85f8fb4-26ce85f8fb8 858->859 860 26ce85f8fac 858->860 861 26ce85f8fba-26ce85f8fe2 call 26ce8602a48 859->861 862 26ce85f8fe8-26ce85f9003 call 26ce85f7628 859->862 860->858 861->807 861->862 862->658 862->673
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _invoke_watson$Locale$SleepUpdateUpdate::___updatetlocinfo__updatetmbcinfo_getptd_malloc_crtmalloc
                                          • String ID:
                                          • API String ID: 3294838543-0
                                          • Opcode ID: 521078f5cd82ac0f084921f5033d007348db3b2902225dc428b05784ca17b11c
                                          • Instruction ID: 06c5418329f9265671ed8a3c7bb710817a9ab5c9685987b846ff0b57339e8320
                                          • Opcode Fuzzy Hash: 521078f5cd82ac0f084921f5033d007348db3b2902225dc428b05784ca17b11c
                                          • Instruction Fuzzy Hash: 9922C13232AA4486FB64EB65E81F7BA3362F754784F649025DB8B86695DF3BD4058300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Mpunct$Lockitstd::_$std::ios_base::getloc$Lockit::_Lockit::~_$std::locale::locale
                                          • String ID: $0123456789-
                                          • API String ID: 132018215-700845222
                                          • Opcode ID: 60c27871b8621bc0c9a776556df6c880f16a64ad241ae21a9c7b511643420f0b
                                          • Instruction ID: cb2b0dcb18529b18928c244ccbf428298da35379a61336b8ec032d5d27339167
                                          • Opcode Fuzzy Hash: 60c27871b8621bc0c9a776556df6c880f16a64ad241ae21a9c7b511643420f0b
                                          • Instruction Fuzzy Hash: FBA2473260B68085FB20AB65C4583BE37B1FB55B88F649016DE8B5BBD5CF27C895CB00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Mpunct$Lockitstd::_$std::ios_base::getloc$Lockit::_Lockit::~_$std::locale::locale
                                          • String ID: $0123456789-
                                          • API String ID: 132018215-700845222
                                          • Opcode ID: fd60dde3f0e5ed17a34b0ce817ebb90d0591360cd0ee5566e54b3aceb4ca2f06
                                          • Instruction ID: 6e88487048832587b16a835d337f59455e3be5194a3baf9436765ad7eba8c6f8
                                          • Opcode Fuzzy Hash: fd60dde3f0e5ed17a34b0ce817ebb90d0591360cd0ee5566e54b3aceb4ca2f06
                                          • Instruction Fuzzy Hash: 51A2383260B68085FB60AB65D4583BE37B2FB45B88F649015DE8A1BBD5DF37C895C301
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Mpunct$Lockitstd::_$std::ios_base::getloc$Lockit::_Lockit::~_$std::locale::locale
                                          • String ID: $0123456789-
                                          • API String ID: 132018215-700845222
                                          • Opcode ID: 412ebe9269c493e5726af88abb894bace85a57de134f1800497118e7ef52c84f
                                          • Instruction ID: dfd3737ea3441d603a445db046ba0bc8c0f88242ac8f054922a7746c6e208ec1
                                          • Opcode Fuzzy Hash: 412ebe9269c493e5726af88abb894bace85a57de134f1800497118e7ef52c84f
                                          • Instruction Fuzzy Hash: A2A27D3260F68089FB25AB75C8583BD37B1F755B88F644416DE8B1BB96CF2BC8558320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitLockit::_std::_std::ios_base::getloc$Mpunctlocaleconvstd::locale::locale
                                          • String ID: $$$$$
                                          • API String ID: 280637346-798797307
                                          • Opcode ID: bdf690cb125a074a7188a53bf61b6b763a23d8da378ea9d39ed0c8cbcd31311e
                                          • Instruction ID: f3ad4c4b65ad91d165fa6fdc41e1bfc77b157d143bcf43a314b8a973b9ba29a3
                                          • Opcode Fuzzy Hash: bdf690cb125a074a7188a53bf61b6b763a23d8da378ea9d39ed0c8cbcd31311e
                                          • Instruction Fuzzy Hash: 29A26E70228A468AEB74FB1A805977977F1FF5A310FB4415AE4C6C7293DB2BDC428781
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitLockit::_std::_std::ios_base::getloc$Mpunctlocaleconvstd::locale::locale
                                          • String ID: $$$$$
                                          • API String ID: 280637346-798797307
                                          • Opcode ID: eef031cd9eaabbc570829bf82e32b443498f5b3608fb8350dd4ba77db166997c
                                          • Instruction ID: 20465ee44281164cbedcfc6575f2bb89f25829d8a23b9ccd05ceaf46ef017b3f
                                          • Opcode Fuzzy Hash: eef031cd9eaabbc570829bf82e32b443498f5b3608fb8350dd4ba77db166997c
                                          • Instruction Fuzzy Hash: 2EA25D70228A4A8AEB75BB1E805877977F1FF5A300FB4515AE4CAC7293D72BD842C741
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitLockit::_std::_std::ios_base::getloc$Mpunctlocaleconvstd::locale::locale
                                          • String ID: $$$$$
                                          • API String ID: 280637346-798797307
                                          • Opcode ID: 4c18d35050e8cf8f572192a96411797e63cf445442ff4103ec6e9a0563a2ef7e
                                          • Instruction ID: f45d6ca9767fb20404ec7bdfa2d759d142bb320c856621eb176c6dc0c98d0fa1
                                          • Opcode Fuzzy Hash: 4c18d35050e8cf8f572192a96411797e63cf445442ff4103ec6e9a0563a2ef7e
                                          • Instruction Fuzzy Hash: BCA26130628B498FE775BB2A8069779F7F1FB56304F74518AD4DAC7293C623E8428781
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getloc$Mpunct
                                          • String ID: $$$$$
                                          • API String ID: 4161885152-798797307
                                          • Opcode ID: 5e3a662610487c8e3ddd3b18f70fa8c9fc7be83a72ef20f7899166f84c343da3
                                          • Instruction ID: 09505198b1d932089d0f4da775fc899a8152eb3fab0de6aae1a4926dc7bc8c3c
                                          • Opcode Fuzzy Hash: 5e3a662610487c8e3ddd3b18f70fa8c9fc7be83a72ef20f7899166f84c343da3
                                          • Instruction Fuzzy Hash: 46926130228A468BEB74BB1A805A77D7BF1FF56304FB4515AE4C6C7293D72BD8428781
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getloc$Mpunct
                                          • String ID: $$$$$
                                          • API String ID: 4161885152-798797307
                                          • Opcode ID: fc2bbccc12045fbc8c21ef7f8c78b6684704d45146c539d2158c5cc0326641d6
                                          • Instruction ID: 846b890530e488e9da1f7c49d6a1a0ecefea73fbd1fd669d248a62ece334e264
                                          • Opcode Fuzzy Hash: fc2bbccc12045fbc8c21ef7f8c78b6684704d45146c539d2158c5cc0326641d6
                                          • Instruction Fuzzy Hash: 7E928230628A468BEB74BB19A05977977F1FF56300FB4515AE4C6C7383DB2BD8828781
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getloc$Mpunct
                                          • String ID: $$$$$
                                          • API String ID: 4161885152-798797307
                                          • Opcode ID: a8fae0d38d37e0f927b68bfab163fa84d13f2718d1e3d4a018e1805ba4bc1a7e
                                          • Instruction ID: f37c4e0b97a6e7d71891cc6a67ebfbb6994ec623193fdfd2f4d2db3ee7279362
                                          • Opcode Fuzzy Hash: a8fae0d38d37e0f927b68bfab163fa84d13f2718d1e3d4a018e1805ba4bc1a7e
                                          • Instruction Fuzzy Hash: A292AF30628A498FEB75BB2A8069778B7F1FB57304F74514AD4DAC7293C623F8428781
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_std::ios_base::getloc$Mpunctlocaleconvstd::locale::locale
                                          • String ID: 0123456789ABCDEFabcdef-+XxPp
                                          • API String ID: 1771764317-3606100449
                                          • Opcode ID: d0c935d1eb7fee9e72ae943eb111c1065fb69439d988de5b5829165648df1abe
                                          • Instruction ID: cc03b6fb9b5e4ee984c126f8ebf8e80460685f9e7d27dec4ed3fc274aa90e244
                                          • Opcode Fuzzy Hash: d0c935d1eb7fee9e72ae943eb111c1065fb69439d988de5b5829165648df1abe
                                          • Instruction Fuzzy Hash: 0692363620F680C5FA64AB6681583BE77B1FB81B84F649015DE8B0B7D5DF2BC896C311
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_std::ios_base::getloc$Mpunctlocaleconvstd::locale::locale
                                          • String ID: 0123456789ABCDEFabcdef-+XxPp
                                          • API String ID: 1771764317-3606100449
                                          • Opcode ID: 127ee6d417b2a901dd8abde2732992d2fc45a6e8d2c9ed35a2b699a2b19159da
                                          • Instruction ID: f25180bde22641d0cab9ff4e5a2b175ddf1c8e32a0d1b7ae451544547e6e8c74
                                          • Opcode Fuzzy Hash: 127ee6d417b2a901dd8abde2732992d2fc45a6e8d2c9ed35a2b699a2b19159da
                                          • Instruction Fuzzy Hash: D0926A3620F68085FA64AB66815837E37B1FB91B84F648805DE9B2B7D5CF37C896C311
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_std::ios_base::getloc$Mpunctlocaleconvstd::locale::locale
                                          • String ID: 0123456789ABCDEFabcdef-+XxPp
                                          • API String ID: 1771764317-3606100449
                                          • Opcode ID: 35fd5fe3c7343d7ba8878f5d61dceb1aa3ab23820ace81f01204e0a2f043b718
                                          • Instruction ID: d7189a5fbb516f7560cf643bf095c81fe81c4fdce664eafe97a55ca0b263e7c7
                                          • Opcode Fuzzy Hash: 35fd5fe3c7343d7ba8878f5d61dceb1aa3ab23820ace81f01204e0a2f043b718
                                          • Instruction Fuzzy Hash: B6828F3630FA808AFB65AA65C1583BD3BB1B741B84F748502CADB17796DF27D856CB00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getloc$Mpunct
                                          • String ID: 0123456789-+Ee
                                          • API String ID: 4161885152-1347306980
                                          • Opcode ID: 63da71c29f913481ec287aef2007a4f8c74ad4193af97d5ee967edaa42889e0b
                                          • Instruction ID: 086240261d094958d7263428528fd7de622a4676e43b7d94a993cd38bdc2c86c
                                          • Opcode Fuzzy Hash: 63da71c29f913481ec287aef2007a4f8c74ad4193af97d5ee967edaa42889e0b
                                          • Instruction Fuzzy Hash: C0825B3220B6808AFB64AB6581583BE37B1FB81B84F649419DE8B177D5DF37C896C311
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getloc$Mpunct
                                          • String ID: 0123456789-+Ee
                                          • API String ID: 4161885152-1347306980
                                          • Opcode ID: e2f70bdb7614c13ac1d1ed27f86cfebf576c1c41d2762d4cf0bd4c9359251953
                                          • Instruction ID: b21d010f8484d177c2bc3619b3d2357c9a804a212ea6a931b229581bd878519c
                                          • Opcode Fuzzy Hash: e2f70bdb7614c13ac1d1ed27f86cfebf576c1c41d2762d4cf0bd4c9359251953
                                          • Instruction Fuzzy Hash: 3D826A3220B68086FB64AB6581583BE37B1FB41B88F64940ADE9B0B7D5DF37C856C351
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getloc$Mpunct
                                          • String ID: 0123456789-+Ee
                                          • API String ID: 4161885152-1347306980
                                          • Opcode ID: 4f2a568fd0fa06215ae3915de8a3ab2ffbe2514b51c3d54fb028b4f6270e0670
                                          • Instruction ID: 780c584e590a731734c3831d1487e12aa4f52418650c8d7145e4d48b010ef1a3
                                          • Opcode Fuzzy Hash: 4f2a568fd0fa06215ae3915de8a3ab2ffbe2514b51c3d54fb028b4f6270e0670
                                          • Instruction Fuzzy Hash: D272943660F68489FB56AB6581583BC3BB1A743B84F748046CE9BA7796CF37C456CB00
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitMpunctstd::_$Lockit::_Lockit::~_std::ios_base::getloc$std::locale::locale
                                          • String ID:
                                          • API String ID: 947048306-0
                                          • Opcode ID: 0cea55ac70b9b642a92812e7ac831c00b23b20cabd8d84924705d018515a6540
                                          • Instruction ID: bdc253043b95d721f56834ee3dda787abddc0afc13d2ff76ff386b499d881c83
                                          • Opcode Fuzzy Hash: 0cea55ac70b9b642a92812e7ac831c00b23b20cabd8d84924705d018515a6540
                                          • Instruction Fuzzy Hash: FC32BF3260EB9086FB15AF25C8493FD73B1F794B88F644111EACA17A99EF3AC585C310
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitMpunctstd::_$Lockit::_Lockit::~_std::ios_base::getloc$std::locale::locale
                                          • String ID:
                                          • API String ID: 947048306-0
                                          • Opcode ID: 57225d8178d5a7826e752d5fdcf6b896c1117a65cce17eeac9dccfc814194e7f
                                          • Instruction ID: 0e12588422194cbc6aaa4622a5ef3324a4ffcddfaff4bddf92b89c85d102e194
                                          • Opcode Fuzzy Hash: 57225d8178d5a7826e752d5fdcf6b896c1117a65cce17eeac9dccfc814194e7f
                                          • Instruction Fuzzy Hash: 4A328D3260AA9085FB51AF25D8493FA77B1F744B8CF649111EECA17AD9EF3AC591C300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitMpunctstd::_$Lockit::_Lockit::~_Mtx_guardMtx_guard::~_std::ios_base::getloc$char_traitsstd::locale::locale
                                          • String ID:
                                          • API String ID: 320299097-0
                                          • Opcode ID: 1e38ba58a473fc653b5fb7d7208e81ddcca2ae6904e5fc9c9f9c1b4a438aa956
                                          • Instruction ID: 2ab583ac3442954a3cbdca7f28dd40d3021283ef03e5ca88a0e8f17a5b32eec1
                                          • Opcode Fuzzy Hash: 1e38ba58a473fc653b5fb7d7208e81ddcca2ae6904e5fc9c9f9c1b4a438aa956
                                          • Instruction Fuzzy Hash: 9D328E3260EBC485FB219F25C8483ED3771F355B88F649112DA8A27B9ADF3AC685C351
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                                          • String ID:
                                          • API String ID: 1584724053-0
                                          • Opcode ID: bb9541adda1de7d3445963b5d25e419d471c8ff25f1e67a4739099756cf48ec5
                                          • Instruction ID: ce0a3f8ff547a809f61503e6d98d67aaf8f7317e4aa03db7ab5914a8c118e5d6
                                          • Opcode Fuzzy Hash: bb9541adda1de7d3445963b5d25e419d471c8ff25f1e67a4739099756cf48ec5
                                          • Instruction Fuzzy Hash: C331C73272768445FB15BB25D80E7AD76A1E785BC8F688125DE8F4B79ADF3AC0018700
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getloc$Mpunct
                                          • String ID:
                                          • API String ID: 4161885152-0
                                          • Opcode ID: 94a13e67048d1d6a9d8e37f184acf902a8c7ba278c4ab9bc088bfc03991e9617
                                          • Instruction ID: efed210bc34b15c8106a21d6c5c070ccd4598d66088ef5c1f2f7949c7b540d4d
                                          • Opcode Fuzzy Hash: 94a13e67048d1d6a9d8e37f184acf902a8c7ba278c4ab9bc088bfc03991e9617
                                          • Instruction Fuzzy Hash: 82C1B232B0BA808AFB12AF75D4093FD73B1AB55B48F544111DE8A6B689EF37D549C340
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getloc$Mpunct
                                          • String ID:
                                          • API String ID: 4161885152-0
                                          • Opcode ID: f00c66f29c94808db36d4885cf7ef90ee5ec9d3b98dc7c305995b2eb568d4440
                                          • Instruction ID: e49227eda98dcc8ddee4d6940cbb939e73b55c4ec4924774e86e1310553a3ae3
                                          • Opcode Fuzzy Hash: f00c66f29c94808db36d4885cf7ef90ee5ec9d3b98dc7c305995b2eb568d4440
                                          • Instruction Fuzzy Hash: 92C1A23270BA808AFB11AF75D4093FD77B1AB55B88F544111DE8A67698EF3AC44AC340
                                          APIs
                                            • Part of subcall function 0000026CE85D4084: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85D40A5
                                            • Part of subcall function 0000026CE85D4084: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85D40CA
                                            • Part of subcall function 0000026CE85D4084: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85D40F4
                                            • Part of subcall function 0000026CE85D4084: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85D419E
                                          • _Mpunct.LIBCPMT ref: 0000026CE85DA08B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Mpunct
                                          • String ID: 0123456789ABCDEFabcdef-+Xx
                                          • API String ID: 1602828969-2799312399
                                          • Opcode ID: 7dbf2398d83a6101ae2da8d3b390b5f264cdba2bf70ca7d8335ce0f5fc087c69
                                          • Instruction ID: dd4e5685ca2fc395ebc6739846b94098a78049841422239640a69e4e151a7acf
                                          • Opcode Fuzzy Hash: 7dbf2398d83a6101ae2da8d3b390b5f264cdba2bf70ca7d8335ce0f5fc087c69
                                          • Instruction Fuzzy Hash: 60128E3664B68085FB22EB65D8587BF37B2A751B88F649011DE8A1B7C9DF27C885C340
                                          APIs
                                            • Part of subcall function 0000026CE85D41B4: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85D41D5
                                            • Part of subcall function 0000026CE85D41B4: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85D41FA
                                            • Part of subcall function 0000026CE85D41B4: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85D4224
                                            • Part of subcall function 0000026CE85D41B4: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85D42CE
                                          • _Mpunct.LIBCPMT ref: 0000026CE85DA68B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Mpunct
                                          • String ID: 0123456789ABCDEFabcdef-+Xx
                                          • API String ID: 1602828969-2799312399
                                          • Opcode ID: 7b3c67ad858661928af9faacf2c89209e5ecf5b10ac5bc819cddf012cd7f63ad
                                          • Instruction ID: 0727b7421a5f90d62dedc2581bc78e872609c76bee24fe5de2391097bc49a9d3
                                          • Opcode Fuzzy Hash: 7b3c67ad858661928af9faacf2c89209e5ecf5b10ac5bc819cddf012cd7f63ad
                                          • Instruction Fuzzy Hash: 13128E3674B68085FB22AB65D8143BF37B1E751B88F658115DE8A1B7C9DF2BC886C340
                                          APIs
                                            • Part of subcall function 0000026CE85CCA04: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85CCA25
                                            • Part of subcall function 0000026CE85CCA04: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85CCA4A
                                            • Part of subcall function 0000026CE85CCA04: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85CCA74
                                            • Part of subcall function 0000026CE85CCA04: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85CCB1E
                                          • _Mpunct.LIBCPMT ref: 0000026CE85CEA42
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Mpunct
                                          • String ID: 0123456789ABCDEFabcdef-+Xx
                                          • API String ID: 1602828969-2799312399
                                          • Opcode ID: eac750de68e4787b266f5ef38c7d335a81a2325707c2c7f5fddab37cd7e7ff26
                                          • Instruction ID: 4a6cb5f2e1668fdc86047ceab8b9212e26881301cdbdf03f26b57b7e41e6fd84
                                          • Opcode Fuzzy Hash: eac750de68e4787b266f5ef38c7d335a81a2325707c2c7f5fddab37cd7e7ff26
                                          • Instruction Fuzzy Hash: 1712723270BA8089FB51AA75C0583BC3BB1A741B58F784556CE8B1B796CF3BC846CB50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _errno$Locale_invalid_parameter_noinfo$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_getptd_malloc_crtmalloc
                                          • String ID:
                                          • API String ID: 2296220707-0
                                          • Opcode ID: 6aa674c8055749afedaf64fe2c3a3141dc6f8a211f07435de9dbe9f590e5f553
                                          • Instruction ID: 78e022d127ab1be2875fd971b5334d7100c9600e173e1ff578ce9eb3d2c67108
                                          • Opcode Fuzzy Hash: 6aa674c8055749afedaf64fe2c3a3141dc6f8a211f07435de9dbe9f590e5f553
                                          • Instruction Fuzzy Hash: D542C031674F084BEBB8FE2A98493BA73E1FB56314F70462E98DAC21C7DE279445C641
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitLockit::_std::_$Mpunct
                                          • String ID:
                                          • API String ID: 2786813426-0
                                          • Opcode ID: 009ce831dae9a5ce6a7a4ddd12d0b70f0d4bd9197f41654b24551dadfc115c49
                                          • Instruction ID: 12e099bb82033436be2502998e3abe8ca8b29009bf2121f28703ce0133ceb691
                                          • Opcode Fuzzy Hash: 009ce831dae9a5ce6a7a4ddd12d0b70f0d4bd9197f41654b24551dadfc115c49
                                          • Instruction Fuzzy Hash: 88329130628A598FEF74BB1D809477977F1FB56300FB4419AD48ACB287D62BD846C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitLockit::_std::_$Mpunct
                                          • String ID:
                                          • API String ID: 2786813426-0
                                          • Opcode ID: d515880b7b93e990b9d568f8ee64ddb0c755f866ce721ed4f019a15d56ae3cde
                                          • Instruction ID: c6648523b7b071101b293a979acbf9979d2958ecc01a833155bc15c03d0409cd
                                          • Opcode Fuzzy Hash: d515880b7b93e990b9d568f8ee64ddb0c755f866ce721ed4f019a15d56ae3cde
                                          • Instruction Fuzzy Hash: F6327434628A498BEB79FB19C09877973F1EF56300FB4415AD48ACB2C7DA2BD846C741
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitLockit::_std::_$Mpunct
                                          • String ID:
                                          • API String ID: 2786813426-0
                                          • Opcode ID: f2428fd340c50561f6db4ff7a0457febc66b2a7363e2f288f65a24a427b2e275
                                          • Instruction ID: b253bd44685d62a6664374454ab92b242766dbd3d2a96454b4464e42ccb3931b
                                          • Opcode Fuzzy Hash: f2428fd340c50561f6db4ff7a0457febc66b2a7363e2f288f65a24a427b2e275
                                          • Instruction Fuzzy Hash: F622D730628B488FEB75FB19809C779B7F1EB56304F78429AD4D6CB197D623E8068781
                                          APIs
                                          • std::ios_base::getloc.LIBCPMTD ref: 0000026CE85E4215
                                            • Part of subcall function 0000026CE85C3F40: std::locale::locale.LIBCPMTD ref: 0000026CE85C3F64
                                            • Part of subcall function 0000026CE85CABE0: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85CABF9
                                            • Part of subcall function 0000026CE85CABE0: __int64.LIBCPMTD ref: 0000026CE85CAC12
                                            • Part of subcall function 0000026CE85CABE0: std::locale::_Getfacet.LIBCPMTD ref: 0000026CE85CAC29
                                            • Part of subcall function 0000026CE85CABE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85CACDA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$GetfacetLockit::_Lockit::~___int64std::ios_base::getlocstd::locale::_std::locale::locale
                                          • String ID:
                                          • API String ID: 4021809434-0
                                          • Opcode ID: 6a765142226b2d9bac43f800b895823ec632b3642f1421cfc312e46ae7fa21ce
                                          • Instruction ID: cca580253b080f94a1d1fbe4b8a1335198781d2a4b7b7dbee4fd4d17c9696b0d
                                          • Opcode Fuzzy Hash: 6a765142226b2d9bac43f800b895823ec632b3642f1421cfc312e46ae7fa21ce
                                          • Instruction Fuzzy Hash: 5A426A7660EA8086FB24AF25DA483BD3771FB85B88F649102DF8A17B95CF3BC5558310
                                          APIs
                                          • std::ios_base::getloc.LIBCPMTD ref: 0000026CE85E3A05
                                            • Part of subcall function 0000026CE85C3F40: std::locale::locale.LIBCPMTD ref: 0000026CE85C3F64
                                            • Part of subcall function 0000026CE85D2EB4: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85D2ED5
                                            • Part of subcall function 0000026CE85D2EB4: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85D2EFA
                                            • Part of subcall function 0000026CE85D2EB4: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85D2F24
                                            • Part of subcall function 0000026CE85D2EB4: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85D2FCE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$std::ios_base::getlocstd::locale::locale
                                          • String ID:
                                          • API String ID: 824625536-0
                                          • Opcode ID: 67fd4645e13582e230cc2643c37768ccc5b68469e6477c4bf51e7c8c460bf56a
                                          • Instruction ID: 299f38563cd686ba5fcf7411b0f219ee005478d944ceef25f207fc14c2df132d
                                          • Opcode Fuzzy Hash: 67fd4645e13582e230cc2643c37768ccc5b68469e6477c4bf51e7c8c460bf56a
                                          • Instruction Fuzzy Hash: 77427A7260EA8086FB24AB26D9483BD3771FB85B84F248111DEDA17BA5DF3BC595C310
                                          APIs
                                          • std::ios_base::getloc.LIBCPMTD ref: 0000026CE85EC1D1
                                            • Part of subcall function 0000026CE85C3F40: std::locale::locale.LIBCPMTD ref: 0000026CE85C3F64
                                            • Part of subcall function 0000026CE85CC674: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85CC695
                                            • Part of subcall function 0000026CE85CC674: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85CC6BA
                                            • Part of subcall function 0000026CE85CC674: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85CC6E4
                                            • Part of subcall function 0000026CE85CC674: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85CC78E
                                            • Part of subcall function 0000026CE85E94D4: _Stollx.LIBCPMT ref: 0000026CE85E96DC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Stollxstd::ios_base::getlocstd::locale::locale
                                          • String ID:
                                          • API String ID: 3095835090-0
                                          • Opcode ID: 43bbc00d5fdc2421479fa4bdb99ccad7ee23ed2110236d7a3546eda68dabee41
                                          • Instruction ID: 4754fb3174c20256582f8f5d1ef2e33bab4a3fe870734b3cf44f3649efe1caab
                                          • Opcode Fuzzy Hash: 43bbc00d5fdc2421479fa4bdb99ccad7ee23ed2110236d7a3546eda68dabee41
                                          • Instruction Fuzzy Hash: 1442AE7261EA8085FB14AB29C9883BD37B1F785B84F248206DFDA07796CF3BD8558710
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: EnumLocalesSystem
                                          • String ID:
                                          • API String ID: 2099609381-0
                                          • Opcode ID: 0ca195e7d1b074bf2f4b5ce76eaeb73d5cf53f4307d2a5ac3e1115a18521518f
                                          • Instruction ID: b04f6676c53ecc3901d2b77d2eeb63ba73065731e79d54f2aee05234ec27944b
                                          • Opcode Fuzzy Hash: 0ca195e7d1b074bf2f4b5ce76eaeb73d5cf53f4307d2a5ac3e1115a18521518f
                                          • Instruction Fuzzy Hash: 7DE01271A2BA45C1F750BB52FC8EB7137B4B358319FB11541C5AD86764CE7B80D58700
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: 11be26dbcfdda8cd03b6d2b1e8fe4740f292b6f7e10c13c7d9c1ea55355ea2d2
                                          • Instruction ID: 9048c5691a3c7f1fba5bc6efc8f157b75c0d284556d1e384cd9770514acaeef1
                                          • Opcode Fuzzy Hash: 11be26dbcfdda8cd03b6d2b1e8fe4740f292b6f7e10c13c7d9c1ea55355ea2d2
                                          • Instruction Fuzzy Hash: 96D0126262D68482DB3A6BBA583613A3A74D319B10F6C40358F9745291891F449A8304
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9023e75844d7579a1f174f03874c0f8af64d5fc2987f99361e3b0206e8ada974
                                          • Instruction ID: e165c281c5e9531893b4ec4efdd05549b3311bc42284f0922282758be915e45c
                                          • Opcode Fuzzy Hash: 9023e75844d7579a1f174f03874c0f8af64d5fc2987f99361e3b0206e8ada974
                                          • Instruction Fuzzy Hash: 9D9124FB56F6C40AF2726A64586F2AD3FB8E766B14F6D408AC7C1C72C3D5470806871A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _errno_invalid_parameter_noinfo
                                          • String ID:
                                          • API String ID: 2959964966-0
                                          • Opcode ID: 00064e2cae6b781ccd039dc32df355349fc432545892e5035897992754b165b2
                                          • Instruction ID: 992fb5e313e18c5dd878982a1b618f2d2883309f3aa1398e8dd3f59c2adaef12
                                          • Opcode Fuzzy Hash: 00064e2cae6b781ccd039dc32df355349fc432545892e5035897992754b165b2
                                          • Instruction Fuzzy Hash: 29318F352386098AFB78FA62985E3BE73E1E752300F30852B98CBC5487EE279506C741
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 837f9116cbe3f5bb14f2c0012b83809750004cebf97b73b88b754a310a23b8da
                                          • Instruction ID: f7843c952f92f60528cfdc9367ba4c47eb1407ebbda75791c2000ca190f84de6
                                          • Opcode Fuzzy Hash: 837f9116cbe3f5bb14f2c0012b83809750004cebf97b73b88b754a310a23b8da
                                          • Instruction Fuzzy Hash: A2B0929B51E98209F1B0180408BE2A627DAAB2AA28F2990498A828B2C2E6070C060306

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2217 26ce68a3018-26ce68a3021 2218 26ce68a3032-26ce68a303a call 26ce68a1b50 2217->2218 2221 26ce68a303c-26ce68a3041 2218->2221 2222 26ce68a3023-26ce68a302d call 26ce68aae98 2218->2222 2225 26ce68a302f-26ce68a3030 2222->2225 2226 26ce68a3042-26ce68a3094 call 26ce68a0d88 call 26ce68a3860 2222->2226 2225->2218 2231 26ce68a3096-26ce68a309d call 26ce68aa858 2226->2231 2232 26ce68a3113-26ce68a3115 2226->2232 2238 26ce68a309f-26ce68a30a1 2231->2238 2243 26ce68a30a6-26ce68a30ad call 26ce68acc38 2231->2243 2234 26ce68a3117-26ce68a311f 2232->2234 2235 26ce68a3169-26ce68a316c 2232->2235 2237 26ce68a3125-26ce68a3133 2234->2237 2234->2238 2239 26ce68a316e-26ce68a317c call 26ce68a69dc 2235->2239 2240 26ce68a31cc-26ce68a31cf 2235->2240 2245 26ce68a3135 call 26ce68aaaf8 2237->2245 2246 26ce68a313a-26ce68a3142 call 26ce68aa988 2237->2246 2244 26ce68a31dd-26ce68a31e2 2238->2244 2241 26ce68a31d8 2239->2241 2254 26ce68a317e-26ce68a3191 call 26ce68a5bc0 2239->2254 2240->2241 2242 26ce68a31d1-26ce68a31d3 call 26ce68aca90 2240->2242 2241->2244 2242->2241 2259 26ce68a30b6-26ce68a30db call 26ce68adabc call 26ce68ad9c8 call 26ce68aa4b4 2243->2259 2260 26ce68a30af-26ce68a30b4 call 26ce68aa878 2243->2260 2245->2246 2256 26ce68a3154-26ce68a3157 2246->2256 2257 26ce68a3144-26ce68a3153 call 26ce68aa7e4 call 26ce68accb8 call 26ce68aa878 2246->2257 2254->2238 2268 26ce68a3197-26ce68a31aa call 26ce68a69f8 2254->2268 2256->2241 2264 26ce68a3159-26ce68a3160 2256->2264 2257->2256 2290 26ce68a30e4-26ce68a30eb call 26ce68ad52c 2259->2290 2291 26ce68a30dd-26ce68a30e2 call 26ce68accb8 2259->2291 2260->2238 2264->2241 2269 26ce68a3162-26ce68a3167 call 26ce68accb8 2264->2269 2280 26ce68a31ac-26ce68a31c0 call 26ce68acb74 2268->2280 2281 26ce68a31c2-26ce68a31c7 call 26ce68a16cc 2268->2281 2269->2241 2280->2241 2281->2238 2297 26ce68a310c-26ce68a3111 call 26ce68aa7e4 2290->2297 2298 26ce68a30ed-26ce68a30f4 call 26ce68ad7e8 2290->2298 2291->2260 2297->2291 2298->2297 2303 26ce68a30f6-26ce68a30ff call 26ce68aab08 2298->2303 2303->2297 2306 26ce68a3101-26ce68a3107 2303->2306 2306->2241
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _errnofree$_callnewh_calloc_crt_ioterm$EnvironmentExceptionInitializeStringsThrow__crt_calloc_impl_cinit_freeptd_heap_init_initptd_ioinit_lock_malloc_crt_mtinit_setenvpmalloc
                                          • String ID:
                                          • API String ID: 712202392-0
                                          • Opcode ID: 3899b92c9def8d1737fd4a241c48e478abdd423faa6e3756210bf445b346c25b
                                          • Instruction ID: 47660ff43ca4ca4b731106d703da1ac666a31054613a02d07901aa5d7e7903ed
                                          • Opcode Fuzzy Hash: 3899b92c9def8d1737fd4a241c48e478abdd423faa6e3756210bf445b346c25b
                                          • Instruction Fuzzy Hash: CE5107306247064BFAF4B7B7995D7B922B5EB76340F30052BAD86C61D3EA2BC8418712

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2307 26ce85fb0e0-26ce85fb104 DecodePointer 2308 26ce85fb106-26ce85fb10c 2307->2308 2309 26ce85fb120-26ce85fb13a call 26ce85f1e24 2307->2309 2311 26ce85fb119 2308->2311 2312 26ce85fb10e-26ce85fb117 call 26ce85f1e24 2308->2312 2315 26ce85fb156-26ce85fb195 call 26ce85f1e24 * 3 2309->2315 2316 26ce85fb13c-26ce85fb142 2309->2316 2311->2309 2312->2308 2312->2311 2328 26ce85fb1a9-26ce85fb1c3 EncodePointer 2315->2328 2329 26ce85fb197-26ce85fb19f 2315->2329 2318 26ce85fb144-26ce85fb14d call 26ce85f1e24 2316->2318 2319 26ce85fb14f 2316->2319 2318->2316 2318->2319 2319->2315 2330 26ce85fb1c5-26ce85fb1ca call 26ce85f1e24 2328->2330 2331 26ce85fb1d2-26ce85fb1dc 2328->2331 2329->2328 2332 26ce85fb1a1-26ce85fb1a4 call 26ce85f1e24 2329->2332 2330->2331 2335 26ce85fb1eb-26ce85fb1fa 2331->2335 2336 26ce85fb1de-26ce85fb1e3 call 26ce85f1e24 2331->2336 2332->2328 2339 26ce85fb21b-26ce85fb225 2335->2339 2340 26ce85fb1fc-26ce85fb20d 2335->2340 2336->2335 2340->2339 2342 26ce85fb20f-26ce85fb214 call 26ce85f1e24 2340->2342 2342->2339
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
                                          • String ID:
                                          • API String ID: 4099253644-0
                                          • Opcode ID: b4bc968d3c6e0ca3411d4d7c887ffc2f2a0207fe4ca6a95d778c9ae964d27bd5
                                          • Instruction ID: 21f793191116e0f3defdf0e67b1f26676d6f914d85995b0aa72c3406a8f15119
                                          • Opcode Fuzzy Hash: b4bc968d3c6e0ca3411d4d7c887ffc2f2a0207fe4ca6a95d778c9ae964d27bd5
                                          • Instruction Fuzzy Hash: C0314D7166BA80C1FE55BB51F86E3B833B8AB54794F380225DADB8A2D5DF3F84448701

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2345 26ce85e2f0c-26ce85e2f60 call 26ce85c3f40 call 26ce85d2eb4 2350 26ce85e2f7b-26ce85e2f8d 2345->2350 2351 26ce85e2f62-26ce85e2f6b 2345->2351 2352 26ce85e31c2-26ce85e31c5 2350->2352 2353 26ce85e2f93 2350->2353 2351->2350 2365 26ce85e2f6d-26ce85e2f75 2351->2365 2356 26ce85e31cb 2352->2356 2357 26ce85e3341-26ce85e3344 2352->2357 2354 26ce85e2f99-26ce85e2f9c 2353->2354 2355 26ce85e3172-26ce85e31b4 2353->2355 2359 26ce85e30c2-26ce85e30c5 2354->2359 2360 26ce85e2fa2 2354->2360 2378 26ce85e31b9-26ce85e31bd 2355->2378 2363 26ce85e33e3-26ce85e33ea 2356->2363 2364 26ce85e31d1-26ce85e31d4 2356->2364 2361 26ce85e334a-26ce85e334d 2357->2361 2362 26ce85e3403-26ce85e341a call 26ce85d1d1c 2357->2362 2369 26ce85e30cb-26ce85e30cd 2359->2369 2370 26ce85e3166 2359->2370 2366 26ce85e2fa8-26ce85e2fab 2360->2366 2367 26ce85e30b2-26ce85e30bd 2360->2367 2371 26ce85e33f3-26ce85e33fa 2361->2371 2372 26ce85e3353-26ce85e3356 2361->2372 2392 26ce85e3421-26ce85e342e 2362->2392 2393 26ce85e341c-26ce85e341f 2362->2393 2363->2371 2374 26ce85e31da-26ce85e31dd 2364->2374 2375 26ce85e32f7-26ce85e3338 2364->2375 2365->2350 2366->2355 2376 26ce85e2fb1-26ce85e2fb3 2366->2376 2377 26ce85e32af-26ce85e32c6 2367->2377 2379 26ce85e3156-26ce85e3161 2369->2379 2380 26ce85e30d3-26ce85e30d5 2369->2380 2370->2355 2371->2362 2372->2363 2381 26ce85e335c-26ce85e335f 2372->2381 2383 26ce85e32a4-26ce85e32ab 2374->2383 2384 26ce85e31e3 2374->2384 2375->2357 2376->2375 2386 26ce85e2fb9-26ce85e2fbb 2376->2386 2394 26ce85e32cc-26ce85e32ef call 26ce85d9bc8 2377->2394 2387 26ce85e3431-26ce85e343e call 26ce85e78c4 2378->2387 2379->2377 2388 26ce85e30d7-26ce85e30da 2380->2388 2389 26ce85e3134-26ce85e3149 2380->2389 2390 26ce85e33c1-26ce85e33d6 2381->2390 2391 26ce85e3361-26ce85e3363 2381->2391 2383->2377 2384->2393 2395 26ce85e31e9-26ce85e31ec 2384->2395 2396 26ce85e3067-26ce85e3094 call 26ce85dac30 2386->2396 2397 26ce85e2fc1-26ce85e2fc3 2386->2397 2420 26ce85e3443-26ce85e3469 2387->2420 2421 26ce85e3440 2387->2421 2388->2389 2398 26ce85e30dc-26ce85e30de 2388->2398 2389->2379 2390->2363 2399 26ce85e3365-26ce85e3367 2391->2399 2400 26ce85e33b1-26ce85e33b8 2391->2400 2392->2387 2393->2387 2394->2375 2403 26ce85e31ee-26ce85e31f1 2395->2403 2404 26ce85e326c-26ce85e3281 2395->2404 2396->2387 2425 26ce85e309a-26ce85e30ad 2396->2425 2407 26ce85e303a-26ce85e3062 2397->2407 2408 26ce85e2fc5-26ce85e2fc8 2397->2408 2398->2379 2409 26ce85e30e0-26ce85e30e2 2398->2409 2399->2393 2410 26ce85e336d-26ce85e339a call 26ce85dac30 2399->2410 2400->2390 2403->2375 2413 26ce85e31f7-26ce85e31fa 2403->2413 2406 26ce85e3289 2404->2406 2415 26ce85e328f-26ce85e329f call 26ce85dac30 2406->2415 2407->2394 2416 26ce85e2fca-26ce85e2fcc 2408->2416 2417 26ce85e3015-26ce85e302a 2408->2417 2409->2393 2418 26ce85e30e8-26ce85e312f 2409->2418 2410->2387 2435 26ce85e33a0-26ce85e33a9 2410->2435 2422 26ce85e31fc-26ce85e31ff 2413->2422 2423 26ce85e324d-26ce85e326a 2413->2423 2415->2387 2427 26ce85e2ff6-26ce85e3013 2416->2427 2428 26ce85e2fce-26ce85e2fd1 2416->2428 2430 26ce85e3032-26ce85e3035 2417->2430 2418->2378 2421->2420 2422->2393 2424 26ce85e3205-26ce85e3233 call 26ce85dac30 2422->2424 2423->2406 2424->2387 2437 26ce85e3239-26ce85e3248 2424->2437 2425->2387 2427->2430 2428->2393 2433 26ce85e2fd7-26ce85e2ff4 2428->2433 2430->2415 2433->2430 2435->2400 2437->2387
                                          APIs
                                          • std::ios_base::getloc.LIBCPMTD ref: 0000026CE85E2F48
                                            • Part of subcall function 0000026CE85C3F40: std::locale::locale.LIBCPMTD ref: 0000026CE85C3F64
                                            • Part of subcall function 0000026CE85D2EB4: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85D2ED5
                                            • Part of subcall function 0000026CE85D2EB4: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85D2EFA
                                            • Part of subcall function 0000026CE85D2EB4: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85D2F24
                                            • Part of subcall function 0000026CE85D2EB4: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85D2FCE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$std::ios_base::getlocstd::locale::locale
                                          • String ID: %H : %M$%H : %M : S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm$c
                                          • API String ID: 824625536-3998755201
                                          • Opcode ID: 9ea7233a1195fdad9958adce2f8bb786a2981300ba8746fa4110a12b4cbdb550
                                          • Instruction ID: d0ea431479ff68badc508799dcc9686744083913e7c45246985550e84f449339
                                          • Opcode Fuzzy Hash: 9ea7233a1195fdad9958adce2f8bb786a2981300ba8746fa4110a12b4cbdb550
                                          • Instruction Fuzzy Hash: 30E16D3251EB8486FB649F24E8487FD77B0F785788F644215EACA07AA9DF3AC645C700

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2438 26ce85e346c-26ce85e34c0 call 26ce85c3f40 call 26ce85cabe0 2443 26ce85e34db-26ce85e34ed 2438->2443 2444 26ce85e34c2-26ce85e34cb 2438->2444 2445 26ce85e3722-26ce85e3725 2443->2445 2446 26ce85e34f3 2443->2446 2444->2443 2458 26ce85e34cd-26ce85e34d5 2444->2458 2449 26ce85e372b 2445->2449 2450 26ce85e38a1-26ce85e38a4 2445->2450 2447 26ce85e34f9-26ce85e34fc 2446->2447 2448 26ce85e36d2-26ce85e3714 2446->2448 2452 26ce85e3622-26ce85e3625 2447->2452 2453 26ce85e3502 2447->2453 2471 26ce85e3719-26ce85e371d 2448->2471 2456 26ce85e3943-26ce85e394a 2449->2456 2457 26ce85e3731-26ce85e3734 2449->2457 2454 26ce85e38aa-26ce85e38ad 2450->2454 2455 26ce85e3963-26ce85e397a call 26ce85d1f04 2450->2455 2462 26ce85e362b-26ce85e362d 2452->2462 2463 26ce85e36c6 2452->2463 2459 26ce85e3508-26ce85e350b 2453->2459 2460 26ce85e3612-26ce85e361d 2453->2460 2464 26ce85e3953-26ce85e395a 2454->2464 2465 26ce85e38b3-26ce85e38b6 2454->2465 2485 26ce85e3981-26ce85e398e 2455->2485 2486 26ce85e397c-26ce85e397f 2455->2486 2456->2464 2467 26ce85e373a-26ce85e373d 2457->2467 2468 26ce85e3857-26ce85e3898 2457->2468 2458->2443 2459->2448 2469 26ce85e3511-26ce85e3513 2459->2469 2470 26ce85e380f-26ce85e3826 2460->2470 2472 26ce85e36b6-26ce85e36c1 2462->2472 2473 26ce85e3633-26ce85e3635 2462->2473 2463->2448 2464->2455 2465->2456 2474 26ce85e38bc-26ce85e38bf 2465->2474 2476 26ce85e3804-26ce85e380b 2467->2476 2477 26ce85e3743 2467->2477 2468->2450 2469->2468 2479 26ce85e3519-26ce85e351b 2469->2479 2487 26ce85e382c-26ce85e384f call 26ce85d9dfc 2470->2487 2480 26ce85e3991-26ce85e399e call 26ce85e78c4 2471->2480 2472->2470 2481 26ce85e3637-26ce85e363a 2473->2481 2482 26ce85e3694-26ce85e36a9 2473->2482 2483 26ce85e3921-26ce85e3936 2474->2483 2484 26ce85e38c1-26ce85e38c3 2474->2484 2476->2470 2477->2486 2488 26ce85e3749-26ce85e374c 2477->2488 2489 26ce85e35c7-26ce85e35f4 call 26ce85dac30 2479->2489 2490 26ce85e3521-26ce85e3523 2479->2490 2513 26ce85e39a3-26ce85e39c9 2480->2513 2514 26ce85e39a0 2480->2514 2481->2482 2491 26ce85e363c-26ce85e363e 2481->2491 2482->2472 2483->2456 2492 26ce85e38c5-26ce85e38c7 2484->2492 2493 26ce85e3911-26ce85e3918 2484->2493 2485->2480 2486->2480 2487->2468 2496 26ce85e374e-26ce85e3751 2488->2496 2497 26ce85e37cc-26ce85e37e1 2488->2497 2489->2480 2518 26ce85e35fa-26ce85e360d 2489->2518 2500 26ce85e359a-26ce85e35c2 2490->2500 2501 26ce85e3525-26ce85e3528 2490->2501 2491->2472 2502 26ce85e3640-26ce85e3642 2491->2502 2492->2486 2503 26ce85e38cd-26ce85e38fa call 26ce85dac30 2492->2503 2493->2483 2496->2468 2506 26ce85e3757-26ce85e375a 2496->2506 2499 26ce85e37e9 2497->2499 2508 26ce85e37ef-26ce85e37ff call 26ce85dac30 2499->2508 2500->2487 2509 26ce85e352a-26ce85e352c 2501->2509 2510 26ce85e3575-26ce85e358a 2501->2510 2502->2486 2511 26ce85e3648-26ce85e368f 2502->2511 2503->2480 2528 26ce85e3900-26ce85e3909 2503->2528 2515 26ce85e375c-26ce85e375f 2506->2515 2516 26ce85e37ad-26ce85e37ca 2506->2516 2508->2480 2520 26ce85e3556-26ce85e3573 2509->2520 2521 26ce85e352e-26ce85e3531 2509->2521 2523 26ce85e3592-26ce85e3595 2510->2523 2511->2471 2514->2513 2515->2486 2517 26ce85e3765-26ce85e3793 call 26ce85dac30 2515->2517 2516->2499 2517->2480 2530 26ce85e3799-26ce85e37a8 2517->2530 2518->2480 2520->2523 2521->2486 2526 26ce85e3537-26ce85e3554 2521->2526 2523->2508 2526->2523 2528->2493 2530->2480
                                          APIs
                                          • std::ios_base::getloc.LIBCPMTD ref: 0000026CE85E34A8
                                            • Part of subcall function 0000026CE85C3F40: std::locale::locale.LIBCPMTD ref: 0000026CE85C3F64
                                            • Part of subcall function 0000026CE85CABE0: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85CABF9
                                            • Part of subcall function 0000026CE85CABE0: __int64.LIBCPMTD ref: 0000026CE85CAC12
                                            • Part of subcall function 0000026CE85CABE0: std::locale::_Getfacet.LIBCPMTD ref: 0000026CE85CAC29
                                            • Part of subcall function 0000026CE85CABE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85CACDA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$GetfacetLockit::_Lockit::~___int64std::ios_base::getlocstd::locale::_std::locale::locale
                                          • String ID: %H : %M$%H : %M : S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm$c
                                          • API String ID: 4021809434-3998755201
                                          • Opcode ID: 8e1deff4405f140ca104af93d567ca82f55d7d783d531e69af03a14ea99d4600
                                          • Instruction ID: 2d7db27f2412d8a2555fee1ea1857882c8e4633e44886b1d0ff88fc2907b1dc2
                                          • Opcode Fuzzy Hash: 8e1deff4405f140ca104af93d567ca82f55d7d783d531e69af03a14ea99d4600
                                          • Instruction Fuzzy Hash: 6CE16D7251EA8486FB649F24E8483FD77B1F784788F644205EACA47BA9DF3AC645C700

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2531 26ce85ebc38-26ce85ebc8c call 26ce85c3f40 call 26ce85cc674 2536 26ce85ebca7-26ce85ebcb9 2531->2536 2537 26ce85ebc8e-26ce85ebc97 2531->2537 2538 26ce85ebcbf 2536->2538 2539 26ce85ebeee-26ce85ebef1 2536->2539 2537->2536 2545 26ce85ebc99-26ce85ebca1 2537->2545 2541 26ce85ebcc5-26ce85ebcc8 2538->2541 2542 26ce85ebe9e-26ce85ebee0 2538->2542 2543 26ce85ebef7 2539->2543 2544 26ce85ec06d-26ce85ec070 2539->2544 2546 26ce85ebdee-26ce85ebdf1 2541->2546 2547 26ce85ebcce 2541->2547 2566 26ce85ebee5-26ce85ebee9 2542->2566 2550 26ce85ec10f-26ce85ec116 2543->2550 2551 26ce85ebefd-26ce85ebf00 2543->2551 2548 26ce85ec076-26ce85ec079 2544->2548 2549 26ce85ec12f-26ce85ec146 call 26ce85cc368 2544->2549 2545->2536 2555 26ce85ebdf7-26ce85ebdf9 2546->2555 2556 26ce85ebe92 2546->2556 2552 26ce85ebcd4-26ce85ebcd7 2547->2552 2553 26ce85ebdde-26ce85ebde9 2547->2553 2557 26ce85ec11f-26ce85ec126 2548->2557 2558 26ce85ec07f-26ce85ec082 2548->2558 2571 26ce85ec148-26ce85ec14b 2549->2571 2581 26ce85ec14d-26ce85ec15a 2549->2581 2550->2557 2560 26ce85ebf06-26ce85ebf09 2551->2560 2561 26ce85ec023-26ce85ec064 2551->2561 2552->2542 2564 26ce85ebcdd-26ce85ebcdf 2552->2564 2565 26ce85ebfdb-26ce85ebff2 2553->2565 2567 26ce85ebe82-26ce85ebe8d 2555->2567 2568 26ce85ebdff-26ce85ebe01 2555->2568 2556->2542 2557->2549 2558->2550 2569 26ce85ec088-26ce85ec08b 2558->2569 2562 26ce85ebfd0-26ce85ebfd7 2560->2562 2563 26ce85ebf0f 2560->2563 2561->2544 2562->2565 2563->2571 2572 26ce85ebf15-26ce85ebf18 2563->2572 2564->2561 2575 26ce85ebce5-26ce85ebce7 2564->2575 2573 26ce85ebff8-26ce85ec01b call 26ce85e92bc 2565->2573 2576 26ce85ec15d-26ce85ec16a call 26ce85d1424 2566->2576 2567->2565 2577 26ce85ebe03-26ce85ebe06 2568->2577 2578 26ce85ebe60-26ce85ebe75 2568->2578 2579 26ce85ec0ed-26ce85ec102 2569->2579 2580 26ce85ec08d-26ce85ec08f 2569->2580 2571->2576 2582 26ce85ebf1a-26ce85ebf1d 2572->2582 2583 26ce85ebf98-26ce85ebfad 2572->2583 2573->2561 2586 26ce85ebd93-26ce85ebdc0 call 26ce85e94d4 2575->2586 2587 26ce85ebced-26ce85ebcef 2575->2587 2604 26ce85ec16f-26ce85ec195 2576->2604 2605 26ce85ec16c 2576->2605 2577->2578 2588 26ce85ebe08-26ce85ebe0a 2577->2588 2578->2567 2579->2550 2589 26ce85ec091-26ce85ec093 2580->2589 2590 26ce85ec0dd-26ce85ec0e4 2580->2590 2581->2576 2582->2561 2591 26ce85ebf23-26ce85ebf26 2582->2591 2595 26ce85ebfb5 2583->2595 2586->2576 2613 26ce85ebdc6-26ce85ebdd9 2586->2613 2596 26ce85ebd66-26ce85ebd8e 2587->2596 2597 26ce85ebcf1-26ce85ebcf4 2587->2597 2588->2567 2598 26ce85ebe0c-26ce85ebe0e 2588->2598 2589->2571 2599 26ce85ec099-26ce85ec0c6 call 26ce85e94d4 2589->2599 2590->2579 2602 26ce85ebf79-26ce85ebf96 2591->2602 2603 26ce85ebf28-26ce85ebf2b 2591->2603 2607 26ce85ebfbb-26ce85ebfcb call 26ce85e94d4 2595->2607 2596->2573 2608 26ce85ebcf6-26ce85ebcf8 2597->2608 2609 26ce85ebd41-26ce85ebd56 2597->2609 2598->2571 2600 26ce85ebe14-26ce85ebe5b 2598->2600 2599->2576 2619 26ce85ec0cc-26ce85ec0d5 2599->2619 2600->2566 2602->2595 2603->2571 2612 26ce85ebf31-26ce85ebf5f call 26ce85e94d4 2603->2612 2605->2604 2607->2576 2615 26ce85ebcfa-26ce85ebcfd 2608->2615 2616 26ce85ebd22-26ce85ebd3f 2608->2616 2611 26ce85ebd5e-26ce85ebd61 2609->2611 2611->2607 2612->2576 2623 26ce85ebf65-26ce85ebf74 2612->2623 2613->2576 2615->2571 2617 26ce85ebd03-26ce85ebd20 2615->2617 2616->2611 2617->2611 2619->2590 2623->2576
                                          APIs
                                          • std::ios_base::getloc.LIBCPMTD ref: 0000026CE85EBC74
                                            • Part of subcall function 0000026CE85C3F40: std::locale::locale.LIBCPMTD ref: 0000026CE85C3F64
                                            • Part of subcall function 0000026CE85CC674: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85CC695
                                            • Part of subcall function 0000026CE85CC674: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85CC6BA
                                            • Part of subcall function 0000026CE85CC674: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85CC6E4
                                            • Part of subcall function 0000026CE85CC674: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85CC78E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$std::ios_base::getlocstd::locale::locale
                                          • String ID: %H : %M$%H : %M : S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm$c
                                          • API String ID: 824625536-3998755201
                                          • Opcode ID: c37271404475d0014721bef1fed1c0e1cecc04706b38c11d20b1fc59747c924a
                                          • Instruction ID: 283372e0f9d7bd6c531a661917c0a39a812ecc6bdc99963a5a19811c14ac1b55
                                          • Opcode Fuzzy Hash: c37271404475d0014721bef1fed1c0e1cecc04706b38c11d20b1fc59747c924a
                                          • Instruction Fuzzy Hash: C9E19F7251EB8486FB649F24E8483BD77B0F785788F244206EACA17B59DF3AC645CB01
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: 783429eb793c2f2f50d0740cc6b0d3dbcf1faffe9df41ccb9df6b9a803999d4c
                                          • Instruction ID: 8aa79ed0f16d92be02d00a6595211ef2986e8f3d12211317901024a265dd7f54
                                          • Opcode Fuzzy Hash: 783429eb793c2f2f50d0740cc6b0d3dbcf1faffe9df41ccb9df6b9a803999d4c
                                          • Instruction Fuzzy Hash: D7315E3220FA4081FA11FB55E4492BA7771E794BA0F780222DADA476F9EE37C845CB00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 4217240666-3145022300
                                          • Opcode ID: 1ff498fc3fba5fdf49fdedaaaf28a20aa44f259ac781903afc3c6c16cf0d7928
                                          • Instruction ID: 744cfa8cdc56a0add17f56f0532abf46ed14ced94c83c067f5ad5806f7419a85
                                          • Opcode Fuzzy Hash: 1ff498fc3fba5fdf49fdedaaaf28a20aa44f259ac781903afc3c6c16cf0d7928
                                          • Instruction Fuzzy Hash: 8E317E7220FA4081FA11FB55E4492BA7370F794BA4F690622DADE476E9DF37D842C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: 48616abfac1a981897439173c93a6e5aaf7991275bd66df3e03a16717abd7810
                                          • Instruction ID: b2033556831db78c3604883280f8b8426d2cfb16981aaea42ae41743b58f5fac
                                          • Opcode Fuzzy Hash: 48616abfac1a981897439173c93a6e5aaf7991275bd66df3e03a16717abd7810
                                          • Instruction Fuzzy Hash: 4E31403221FA4181FA11BB55E4492BA7770F794BA4F740222DADA437E9EF7BC845C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockctypestd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 757613215-3145022300
                                          • Opcode ID: 27ff36a41daa2afd465fce565ffe5753e683ad286d1df17b1f83c21b9b33a9ce
                                          • Instruction ID: 61584996c5d14ead360616fefbbd9dbc9f59e188e6e6ebe711c73a47369a5a13
                                          • Opcode Fuzzy Hash: 27ff36a41daa2afd465fce565ffe5753e683ad286d1df17b1f83c21b9b33a9ce
                                          • Instruction Fuzzy Hash: 3031723121FB4181FA10BB55E4492BA7770F794BA4F654A22DADE436EDDF3BD4428700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: e44b50d4e94eb0d1351846dbd8529780eaeaffd3bd116e536ad6d8b979878f95
                                          • Instruction ID: 244c7dc5ef19dcf4c579cdc7e2928b10c21033d88c116bf2c50d90f9f86e4632
                                          • Opcode Fuzzy Hash: e44b50d4e94eb0d1351846dbd8529780eaeaffd3bd116e536ad6d8b979878f95
                                          • Instruction Fuzzy Hash: C1317E3221BB4181FA10FB55E5492BA7370E790BA4F780222DADE476E9DF3BC845C701
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: b569cdc1653f4c7f6180cbb6e0faa1c39ac808a66fab2fc048e17dcba9d08f51
                                          • Instruction ID: bc6ee2cff924ef323dd2946cfe4540b6f2e253d1f05c671a05856c4605f59309
                                          • Opcode Fuzzy Hash: b569cdc1653f4c7f6180cbb6e0faa1c39ac808a66fab2fc048e17dcba9d08f51
                                          • Instruction Fuzzy Hash: ED31303261FB4181FA11FB55E4592BA7770E794BA4F780222DADA436F9EE37C846C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 4059195664-3145022300
                                          • Opcode ID: d94e50aa53ccc9d6944cd3aed90cdf3e84a64a3bd5255cb9728456337b3ddaed
                                          • Instruction ID: 330d23bb507101ae387421715f25dba0d7c227d76e19927feea10cc5fb4db108
                                          • Opcode Fuzzy Hash: d94e50aa53ccc9d6944cd3aed90cdf3e84a64a3bd5255cb9728456337b3ddaed
                                          • Instruction Fuzzy Hash: 35316D3221BB4081FA10FB55E9492BA7770F794BE4F785222DADA432E9DF27C842C701
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 4217240666-3145022300
                                          • Opcode ID: 4b7540098f8ea2fd8cb3a6c4dc7befb07f8a31645b2c4940871eb245c6e3b5b3
                                          • Instruction ID: f27e3bd94bb6549912b33b57fa744cd1930d9d6c313ed4a4cf7d6e003a859bef
                                          • Opcode Fuzzy Hash: 4b7540098f8ea2fd8cb3a6c4dc7befb07f8a31645b2c4940871eb245c6e3b5b3
                                          • Instruction Fuzzy Hash: F3314E3221FB40C1FE15EB55E8492B97771E794BE4F780222DADA536E9DE37C8418710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: ad4db0a7af812267d7f8cad6930e3dc199e4210e7b6ad20d02838aa8ea755007
                                          • Instruction ID: 02ef77d8dbe3fac4fd9b0843edae9ffc5dc2175ccc6d119a981a3cad34d0b36a
                                          • Opcode Fuzzy Hash: ad4db0a7af812267d7f8cad6930e3dc199e4210e7b6ad20d02838aa8ea755007
                                          • Instruction Fuzzy Hash: D0315F3261FB4181FA11BB55E8492BA7770E790BA4F281222DADA472F9EE37C441C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 4059195664-3145022300
                                          • Opcode ID: 1fe0c26a9036abef5ee95c4ac4b3fdedf737f9338d7163a728943c57dc64d707
                                          • Instruction ID: ae3387029dc321dd87e933f350b0e22243f963826229f2721dc3baa7e0984122
                                          • Opcode Fuzzy Hash: 1fe0c26a9036abef5ee95c4ac4b3fdedf737f9338d7163a728943c57dc64d707
                                          • Instruction Fuzzy Hash: 9E314C3221FA40D1FE11BB55E5482BA7770E794BA0F684222DADA436E9DE2BC8468701
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: d82304bf4a96c8aa3365fbec0ce9b6afb946fba8665589bd6e4ea4bbafcdc822
                                          • Instruction ID: a0c314ae80b0d4497e334434fb6987bd80e79385e1902f9414ec5bcdeb77aee2
                                          • Opcode Fuzzy Hash: d82304bf4a96c8aa3365fbec0ce9b6afb946fba8665589bd6e4ea4bbafcdc822
                                          • Instruction Fuzzy Hash: CB316F3261FA41C1FE10BB55E5492BA7770E790BA0F680222DADA436F9EF37C841C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: f6e975c9ed1fc811ddeed3bf09c1872f6a5632ab065b9bea6ee0b1db81a6e053
                                          • Instruction ID: e58075772238c8fb058f8761815f27f83ae00616c401565d2a075aa08207cf8a
                                          • Opcode Fuzzy Hash: f6e975c9ed1fc811ddeed3bf09c1872f6a5632ab065b9bea6ee0b1db81a6e053
                                          • Instruction Fuzzy Hash: EB316D3221FA4081FE11AB55E8482B97771F794BA4F680222DAEF536E9DF37C841C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: 5a55c19257780c8c169a156cca45b48a9cb7959a6ebe7d38ac67adaa113ab4e8
                                          • Instruction ID: 5321760b5abd00d7cc6125d76b800c1c320a0047b91acd02e2a60fa5846322f7
                                          • Opcode Fuzzy Hash: 5a55c19257780c8c169a156cca45b48a9cb7959a6ebe7d38ac67adaa113ab4e8
                                          • Instruction Fuzzy Hash: C7317E3221FB4081FA11BB15E8482B97771E794BA4F380222DAEA577E9DE3BC8418710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: c69e9b5502f2b5cb16499cf93693c14af8bc71d40f19607121fcaa26e48801a2
                                          • Instruction ID: 33313cdbfa809508eac226643278b5592d8d52b5fcba64f054c69433e803977f
                                          • Opcode Fuzzy Hash: c69e9b5502f2b5cb16499cf93693c14af8bc71d40f19607121fcaa26e48801a2
                                          • Instruction Fuzzy Hash: E931423620FA4081FA11BB55E44D2BA7770F794BA4F640222DADA436EAEF3BC845C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: e92ebb4505384e37149a9af64b0ed7b997fd3b62a18224f75f4565cc40b02c60
                                          • Instruction ID: 3e2f62ba47ab72d83cf8496d49f6d1a291f3b9c13a195626fb9050dff7148a75
                                          • Opcode Fuzzy Hash: e92ebb4505384e37149a9af64b0ed7b997fd3b62a18224f75f4565cc40b02c60
                                          • Instruction Fuzzy Hash: 7C31523221FB4181FA10BB55E4492BA7770E794BA5F781222DAEB436F9EE37C445C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: bb88f8af8f6ad0f94797e91181e4a5fede4ca1b0857083484043c23cb2229bcb
                                          • Instruction ID: 29ecd2406683f438c11077a04ce8b66e6405a1ea05436aca38776cb9906d1793
                                          • Opcode Fuzzy Hash: bb88f8af8f6ad0f94797e91181e4a5fede4ca1b0857083484043c23cb2229bcb
                                          • Instruction Fuzzy Hash: B031703220FA4491FA11BB15E84D2B97771F790BA4F784223DADA576E9DF3BC8418700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: ce52fca3fe3199b9ca64d09fb7b68cda433c6417c830918da4d940205a12b32f
                                          • Instruction ID: 110e122696ff5a625d99c237107e9d912cd5aae20dd1dc2b2a86b996c8e10112
                                          • Opcode Fuzzy Hash: ce52fca3fe3199b9ca64d09fb7b68cda433c6417c830918da4d940205a12b32f
                                          • Instruction Fuzzy Hash: 4A31723220BA4091FA10FB15E5492B97774E794BA4F781223DADA436E9DF37C842CF00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 560648410-3145022300
                                          • Opcode ID: 29cb517ef353edaf7fe96a55ad9e16f417422b8bc592340c9ae3e73a311cc7df
                                          • Instruction ID: 0be971ec8300dd78133c60c5b18072280b0fd3e2467768fa87e7f49873b81294
                                          • Opcode Fuzzy Hash: 29cb517ef353edaf7fe96a55ad9e16f417422b8bc592340c9ae3e73a311cc7df
                                          • Instruction Fuzzy Hash: EB31623221FA4082FA11BF55E84D2B97771F390BA4FA80212D6EA536E9DF37C4458700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: 536d951579794d9ac5848435dcda0d8056ecb28f286086e041b4dee6b5989298
                                          • Instruction ID: 0ba298adf4729cab63610eebbe5df36d6f5339eef9094954bfd9b9c833df47ed
                                          • Opcode Fuzzy Hash: 536d951579794d9ac5848435dcda0d8056ecb28f286086e041b4dee6b5989298
                                          • Instruction Fuzzy Hash: 7A314F3221BA4091FE11AB55E4492BAB770E794BA4F784222DA9A477F9EE3BC445C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockctypestd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 757613215-3145022300
                                          • Opcode ID: df4a671e88b4901a954107639c9d9fabf74deb048c105a0cb1eb7e8a5d1e765f
                                          • Instruction ID: 18a142a8b39b06848479b82fbc2bfef25febcff5a3b2287827e3b2184baed0cd
                                          • Opcode Fuzzy Hash: df4a671e88b4901a954107639c9d9fabf74deb048c105a0cb1eb7e8a5d1e765f
                                          • Instruction Fuzzy Hash: C331503221FA4081FA11FB55E5592B977B0E394BA4F681227DADA436E9DF37C845CB00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 560648410-3145022300
                                          • Opcode ID: ae2b33eba0b5e10c670be5b46dedf71b670be409d592ec7623dc0068669dc4ac
                                          • Instruction ID: 56ae73c78c3b1e755f8e494b9eaa3075f4355faebdd14715076836eab898411c
                                          • Opcode Fuzzy Hash: ae2b33eba0b5e10c670be5b46dedf71b670be409d592ec7623dc0068669dc4ac
                                          • Instruction Fuzzy Hash: 84316F7220FA4081FA10BB55E5492BA7770F794BA4F784222DADA472F9EE37C8468700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 560648410-3145022300
                                          • Opcode ID: 7e8749b240ba5670e75988a1d08956d1c9e00ca2f6b9f8a9a670e6f4b17f3c11
                                          • Instruction ID: 8545c2314f87c9ef4829d47b41f62636507c22e3974c307f22b5c748c371739e
                                          • Opcode Fuzzy Hash: 7e8749b240ba5670e75988a1d08956d1c9e00ca2f6b9f8a9a670e6f4b17f3c11
                                          • Instruction Fuzzy Hash: FC31603261FB4081FA11FB55E88D2B97771E790BA4F784222DADA536E9DE37C845C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: cb7218c9b988feff46bbc91aa592dedbc53cea0b91ed73328e4fffe9f7b77c5a
                                          • Instruction ID: 035b3e4afc42a385c108cc6488ebdbc7c8810917ebecde044727f5e61c45e93c
                                          • Opcode Fuzzy Hash: cb7218c9b988feff46bbc91aa592dedbc53cea0b91ed73328e4fffe9f7b77c5a
                                          • Instruction Fuzzy Hash: 6A31753160FA4081FA10BB56E4592BA7374E794BA4F780213D6DE437E9DE3BC842CB00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 560648410-3145022300
                                          • Opcode ID: 27282701b454dac3068bf00fab1c7e364559ed58de656c77c796e4e0c147b80e
                                          • Instruction ID: e9b61865726abc64dd7f23a81a28babf8d93dfe1cfd53a4b4287b9df74bee824
                                          • Opcode Fuzzy Hash: 27282701b454dac3068bf00fab1c7e364559ed58de656c77c796e4e0c147b80e
                                          • Instruction Fuzzy Hash: C8314F3261FA4081FA11BB55E4492BA7771F794BA4F784222DADB436F9DF3BC8468700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: a319b8759b665be4c8045255bfd444d3c342c13c887630317bc6ad245192e08a
                                          • Instruction ID: b5ff1b80f7751a5758d11030647e2246abe630a0f43cc966564e55c57d493161
                                          • Opcode Fuzzy Hash: a319b8759b665be4c8045255bfd444d3c342c13c887630317bc6ad245192e08a
                                          • Instruction Fuzzy Hash: C1314B3220BA40C1FA51FB55E4492B97775F794BA4F680223DADA476E9DF2BD842CB00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 560648410-3145022300
                                          • Opcode ID: 8e39b244ec004d33a78bec66716c19fd785043de6809f57852e2fe2761deb095
                                          • Instruction ID: 3ba4943c65f4612354ac3f6d7a9d0028246c3e4ef3a0bc564917386460e84969
                                          • Opcode Fuzzy Hash: 8e39b244ec004d33a78bec66716c19fd785043de6809f57852e2fe2761deb095
                                          • Instruction Fuzzy Hash: 7D31633221FB4181FA10BB55E8492BA7771E794BA4F781222DADA536F9EE37C445C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 4059195664-3145022300
                                          • Opcode ID: 2041dd7da891098dc9ea848057da1134df316c48a7d12d52e319c026ea6f695a
                                          • Instruction ID: 9d20e538d1841757acace173279b780fcffbbd3cfe69c7df769e383704c12b99
                                          • Opcode Fuzzy Hash: 2041dd7da891098dc9ea848057da1134df316c48a7d12d52e319c026ea6f695a
                                          • Instruction Fuzzy Hash: 46314D3221FA4181FA11FB15E9492B97771E394BA4F684223DADA476E9DF37C8428B00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 560648410-3145022300
                                          • Opcode ID: cf3a473d4a2924b6d3a61fecd1b2eafc96592f01937f7426af8f1c781fe91554
                                          • Instruction ID: 7f6341e9ba8a2431410d774a54b784777fcd5790b1b19b6f90dc151fb3dff046
                                          • Opcode Fuzzy Hash: cf3a473d4a2924b6d3a61fecd1b2eafc96592f01937f7426af8f1c781fe91554
                                          • Instruction Fuzzy Hash: D0314F3221FA4081FA10FB55E9492BA7770F794BA4F680222DEDA436E9EF77C845C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockcodecvtstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 2760077954-3145022300
                                          • Opcode ID: dc53cec89c99da22bcd306d525d4bf72450f34741b04eaec344622fce76dc459
                                          • Instruction ID: 37281a79fe82e43f8c876870b9c5f74e02fb3828e17d92d7cf8571c04d96f2dd
                                          • Opcode Fuzzy Hash: dc53cec89c99da22bcd306d525d4bf72450f34741b04eaec344622fce76dc459
                                          • Instruction Fuzzy Hash: E531603120FB4095FA11BB55E4492BA7770E794BA0F790622DEDA436E9DE2BD8828700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: 2127f81a5437bb88b075241f3d29aaf0cf321937bbea42743d9c4b13c04cc0b3
                                          • Instruction ID: 4d9755c6d1f26e5df71ff14b7e32b7de918f3820bb74384098a7eabe11bff75d
                                          • Opcode Fuzzy Hash: 2127f81a5437bb88b075241f3d29aaf0cf321937bbea42743d9c4b13c04cc0b3
                                          • Instruction Fuzzy Hash: B731403221FB4091FA10BB55E4492BA7770E794BA4F685222DADB436F9EF37C446C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 4217240666-3145022300
                                          • Opcode ID: 0aac932d3e7c268931cf707a4d93752f56fee1ca9c031bf76c3d673b10170def
                                          • Instruction ID: 02f49a8a0000043356dd1cec113aca238ab4d8427806f552454a706c90bb0b13
                                          • Opcode Fuzzy Hash: 0aac932d3e7c268931cf707a4d93752f56fee1ca9c031bf76c3d673b10170def
                                          • Instruction Fuzzy Hash: E6317E3220FA4081FA10FB55E5492BA7770F794BA4F794622DADA436E9DF7BD842C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacet__int64_lockstd::locale::_
                                          • String ID: bad cast
                                          • API String ID: 1666373992-3145022300
                                          • Opcode ID: 93a5699e027cb8ef89e0de3b46b91101183ef16d26cf5389666435c13f441cb5
                                          • Instruction ID: 0349bfef26122be6b4e6aeaf494d684fd782f02b815fdff2ac3128697cef238b
                                          • Opcode Fuzzy Hash: 93a5699e027cb8ef89e0de3b46b91101183ef16d26cf5389666435c13f441cb5
                                          • Instruction Fuzzy Hash: 7031EC3211EE8481EA60EB15E4853AAB774F7C57A4F640212EADE437A9DF3AC544CF00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacet__int64_lockstd::locale::_
                                          • String ID: bad cast
                                          • API String ID: 1666373992-3145022300
                                          • Opcode ID: d78c58cc6dc32a45fa35aa0ea62847462abab04b09d4575ad04a92c308c6451f
                                          • Instruction ID: 4aeeeabc0777b5e63068988fba7c27b486c710856961a67d6d2ab0416d549e53
                                          • Opcode Fuzzy Hash: d78c58cc6dc32a45fa35aa0ea62847462abab04b09d4575ad04a92c308c6451f
                                          • Instruction Fuzzy Hash: 0931CC7215EE8481EA60EB15E48836AB774F7847A4F600212EADE437E9DF3AC545CB04
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 885392049-3145022300
                                          • Opcode ID: 9ba023ed03df909f6066c7b5c14fd05801aa9986d2c2f223f424258040ee7ccc
                                          • Instruction ID: 549ddff0caa8df397f017db55da3ea1a513b5bad600a8c3d26864ad9cd93790e
                                          • Opcode Fuzzy Hash: 9ba023ed03df909f6066c7b5c14fd05801aa9986d2c2f223f424258040ee7ccc
                                          • Instruction Fuzzy Hash: 38315F3221FB4082FA10EB19E5492BA7370F794BA4F684222DADA436E9DF37C4958741
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 885392049-3145022300
                                          • Opcode ID: 4ee676152d8a6d3fc2897e1a750d37abcf8e05a29651dc9c84745b4ac20e915c
                                          • Instruction ID: 6da64fcae70638659419af2c9438573d5fbe834dd226e0c70d15cabc7f2699ca
                                          • Opcode Fuzzy Hash: 4ee676152d8a6d3fc2897e1a750d37abcf8e05a29651dc9c84745b4ac20e915c
                                          • Instruction Fuzzy Hash: A931903621BB4081FA10FB55E5492BA7370F790BA4F681222DADA432EADF37C842C701
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 885392049-3145022300
                                          • Opcode ID: 61d228dc35f4783f95f4f267f4efbd83b46e62b23daaabd50ddf3d7b4201f6b8
                                          • Instruction ID: d2e12adfac35094bfcb0eb747f0c01d793e179df46951915316f3da1dcc4acb6
                                          • Opcode Fuzzy Hash: 61d228dc35f4783f95f4f267f4efbd83b46e62b23daaabd50ddf3d7b4201f6b8
                                          • Instruction Fuzzy Hash: C8315E3221BA4081FA10FB55E5492BA7770F794BA4F784222DADB436E9DF37C846C701
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 885392049-3145022300
                                          • Opcode ID: ace5dc31f61c09f8b1992fbad1866961798bcf55ab3e40703d2c29ce2fc2ab2b
                                          • Instruction ID: 54fe1096f11297d51604ae4f3e4838440d4675f5ff7b7f50b97201300175a1a9
                                          • Opcode Fuzzy Hash: ace5dc31f61c09f8b1992fbad1866961798bcf55ab3e40703d2c29ce2fc2ab2b
                                          • Instruction Fuzzy Hash: 04318F3260FB41C1FA10FB65E5492BA7770E791BA4F780222DADA472E9DE37D846C701
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 885392049-3145022300
                                          • Opcode ID: f8706b51eb17ae2e159a5494a8dec2db18e3578be03e998b402b1e0e9252aa95
                                          • Instruction ID: 433dc44fb1d1b3e75627fca1581ad85ad2c3730093bfc55ec5e8bfb197c9b06e
                                          • Opcode Fuzzy Hash: f8706b51eb17ae2e159a5494a8dec2db18e3578be03e998b402b1e0e9252aa95
                                          • Instruction Fuzzy Hash: 0331A03261FB4081FA21FB15E84C2B97771E790BA4F780222DADA536E9DE37C842C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 885392049-3145022300
                                          • Opcode ID: 59c119c6cd78f5f12ab19a5a93b0e181c0794a7f240d0e73d8738324ff7228fb
                                          • Instruction ID: 103150c4595faff8dba9e43d22536d54caf1f2d4372af79a015ef1becdff378a
                                          • Opcode Fuzzy Hash: 59c119c6cd78f5f12ab19a5a93b0e181c0794a7f240d0e73d8738324ff7228fb
                                          • Instruction Fuzzy Hash: 80314D3261FB4081FA21AB55E84D2B97771E394BA4F680222DADA936E9DF37C841C700
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: free$_errno
                                          • String ID:
                                          • API String ID: 2288870239-0
                                          • Opcode ID: b4bc968d3c6e0ca3411d4d7c887ffc2f2a0207fe4ca6a95d778c9ae964d27bd5
                                          • Instruction ID: 8a5b1f2d6b5f35e12fcf0a40936d7009bb73e16e8406d16b0648f8bd7c063050
                                          • Opcode Fuzzy Hash: b4bc968d3c6e0ca3411d4d7c887ffc2f2a0207fe4ca6a95d778c9ae964d27bd5
                                          • Instruction Fuzzy Hash: E5415070264B0A4FFBE4FF59D899B7432F2F756311F780019DA46C22A2CBAF98458B11
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Exception_getptd$DestructObject$Raise_amsg_exit_getptd_noexit
                                          • String ID: csm
                                          • API String ID: 1037122555-1018135373
                                          • Opcode ID: f0fb30d1909b450c6e57b082ed5d02df015822f95b1b763569599858bfad4588
                                          • Instruction ID: 133ebf49754b1aa1d1fac510b570bfab99efa242611ee22329d209935648ab34
                                          • Opcode Fuzzy Hash: f0fb30d1909b450c6e57b082ed5d02df015822f95b1b763569599858bfad4588
                                          • Instruction Fuzzy Hash: C6213E7620A68186E630EB96E04536E77B1F385BA6F154216DFDA03795CF3BD486CB00
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: free$Sleep_malloc_crtmalloc
                                          • String ID:
                                          • API String ID: 2523592665-0
                                          • Opcode ID: caada0040375c754c365269c74eac08a2c7c6ecaf5709b2b132bd05a7a63ca1e
                                          • Instruction ID: f0ca27df3681ebdac76143de2b4301f34740cb8a7fd0fdd51d5a66280cf652f4
                                          • Opcode Fuzzy Hash: caada0040375c754c365269c74eac08a2c7c6ecaf5709b2b132bd05a7a63ca1e
                                          • Instruction Fuzzy Hash: D261BE3231AB4093EF21FB12E94936A33B9F788794F6441259F8D87B51DF3AC4668748
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _errno_invalid_parameter_noinfo$_getptd_noexit
                                          • String ID:
                                          • API String ID: 1573762532-0
                                          • Opcode ID: 54267be0af5665c456a7c7659a763348ac507c77e1cf2204fcfa820cb5cdd029
                                          • Instruction ID: a4e1064c9a2c42007bd972a66f1f9b31861480fc8cc796a49c59f415f38a0741
                                          • Opcode Fuzzy Hash: 54267be0af5665c456a7c7659a763348ac507c77e1cf2204fcfa820cb5cdd029
                                          • Instruction Fuzzy Hash: 7151FBB4534A494BEBB4BB2A90593B673F0FB25321FB8025FA8C6C71C7D6278841C745
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: codecvtshared_ptr
                                          • String ID: bad conversion
                                          • API String ID: 864914841-2629740042
                                          • Opcode ID: f686c19bb21e7c99195cfd856166b89ac244ed319bd7e827f4bfb7f3c19f572a
                                          • Instruction ID: 3cc803d29a6e2724ac866d9128e23f8678d854c039173d774f42f79c72419a4e
                                          • Opcode Fuzzy Hash: f686c19bb21e7c99195cfd856166b89ac244ed319bd7e827f4bfb7f3c19f572a
                                          • Instruction Fuzzy Hash: 7091E83221FAC495EA70EB15E4593FAB3B0F795780F600516D6CE83AA9DF6AC544CF40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Locale_errno_invalid_parameter_noinfo$UpdateUpdate::__getptd_noexit
                                          • String ID:
                                          • API String ID: 781512312-0
                                          • Opcode ID: 18b03093d7903f9cb9c0e6ccd3bd8cd556307edb59b32dac925bc1e85bd82eca
                                          • Instruction ID: b9dc661227e4f55118dd2e7809a6fb40bc92efa048499a41a9b3638279e2cb3c
                                          • Opcode Fuzzy Hash: 18b03093d7903f9cb9c0e6ccd3bd8cd556307edb59b32dac925bc1e85bd82eca
                                          • Instruction Fuzzy Hash: 72415834434A1A4BEBB8BB3A80687B6B3F0FB52321FB4021BA4D5C71D7D6678841C345
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _errno_invalid_parameter_noinfo$_getptd_noexit
                                          • String ID:
                                          • API String ID: 1573762532-0
                                          • Opcode ID: e6115aaee9bd6988ad82c43c6dd58144aeb0dd506a0ad067c6414fbe19083d80
                                          • Instruction ID: 23b0531214e93e7439e55709d636c88d832d32eb76bc24a6f47ec6dba8f56549
                                          • Opcode Fuzzy Hash: e6115aaee9bd6988ad82c43c6dd58144aeb0dd506a0ad067c6414fbe19083d80
                                          • Instruction Fuzzy Hash: 424127F2A3B29181FF75BF22A0483B972BAE740B94FA44011DAD58B6C5D73BC951C718
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Locale_errno_invalid_parameter_noinfo$UpdateUpdate::__getptd_noexit
                                          • String ID:
                                          • API String ID: 781512312-0
                                          • Opcode ID: dfee2ec86327835073bb60d14cfa61aec5f3f40ef22b560a8e2aa4c0f90f1485
                                          • Instruction ID: 349c3c1edb2c2f6d7d4b4916d10fbe5ca7f7ee9812bdf6968d9cc096bf5130f1
                                          • Opcode Fuzzy Hash: dfee2ec86327835073bb60d14cfa61aec5f3f40ef22b560a8e2aa4c0f90f1485
                                          • Instruction Fuzzy Hash: 15415EB262A26085FB76771190583B933B4EB50BA4FB44026E7D8877C4DB2BC851C704
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitLockit::_std::_$Getfacet__int64_lockstd::locale::_
                                          • String ID:
                                          • API String ID: 1826629674-0
                                          • Opcode ID: 475c35bb957f92cb08b03fdb3f7c4018d5127f34752569f9ef8619f3a0f66de7
                                          • Instruction ID: 059a1e36d65e5c47614b2c834f8822cd62d6d1857cb79067acf0151639d08365
                                          • Opcode Fuzzy Hash: 475c35bb957f92cb08b03fdb3f7c4018d5127f34752569f9ef8619f3a0f66de7
                                          • Instruction Fuzzy Hash: AD31143052CB488FD7A0FB18D448B6AB7F1FB99315F640A1AB0C9C31A1DB36E540CB42
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitLockit::_std::_$Getfacet__int64_lockstd::locale::_
                                          • String ID:
                                          • API String ID: 1826629674-0
                                          • Opcode ID: a7a86c66bce9f8c002374eae96e0059bdcbbf72b2e3551aa10e057cb6c724dea
                                          • Instruction ID: 898397e7ba9e3d3b54ecb17fa02f82dab4897c9c298330829228d81d01ee386c
                                          • Opcode Fuzzy Hash: a7a86c66bce9f8c002374eae96e0059bdcbbf72b2e3551aa10e057cb6c724dea
                                          • Instruction Fuzzy Hash: 1931D031128B489FD794FB19C488B6AB7F1FB99315F640A1AB0C9C31A1DB36E544CB42
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                          • String ID:
                                          • API String ID: 3191669884-0
                                          • Opcode ID: ec2a6dd435b50d5e993b3328a406cbf0fc12b9938289ae1a38fd3c4af6446b14
                                          • Instruction ID: 9066748fc31f57e6bbdbc1b6b536afc94fb170b7948f401e046d6eb2e851d1af
                                          • Opcode Fuzzy Hash: ec2a6dd435b50d5e993b3328a406cbf0fc12b9938289ae1a38fd3c4af6446b14
                                          • Instruction Fuzzy Hash: EA31B1B261A78086F731AB11948976DB7B8F744BE0F348121EED547795CB77C841CB04
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _getptd
                                          • String ID: MOC$RCC$csm
                                          • API String ID: 3186804695-2671469338
                                          • Opcode ID: 79c6bdfdf6facc246eee842b2de7a644aa034f1ac0e2309a20206dc5bd345c8d
                                          • Instruction ID: f3ea6b90a55d46118da6eda9b8455aa487d6ea7f98e2e9b0cba2ebbd30f688b5
                                          • Opcode Fuzzy Hash: 79c6bdfdf6facc246eee842b2de7a644aa034f1ac0e2309a20206dc5bd345c8d
                                          • Instruction Fuzzy Hash: BCF0303561B104C6FB663F94804F3BC35F0F794B06FB68461E2C6027829FBF45918A52
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Mtx_guardMtx_guard::~_std::ios_base::getlocstrcspn$Mpunctchar_traitslocaleconv
                                          • String ID:
                                          • API String ID: 1081295294-0
                                          • Opcode ID: 80fff96529f72534f19313b91b76645ccdf41dfbacd5eccac0a68e6ac0f0d792
                                          • Instruction ID: e4d24a671a56ca2c9b1a6821a2598bb681b28215733695595f657accd9612dd7
                                          • Opcode Fuzzy Hash: 80fff96529f72534f19313b91b76645ccdf41dfbacd5eccac0a68e6ac0f0d792
                                          • Instruction Fuzzy Hash: EFF1A030A28F5C8FDB64FF69C4856EDB7F1FB69300F60015AE48AD7183DA32A9458781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: char_traits$GetfacetLockitLockit::___int64ctypestd::_std::ios_base::getlocstd::ios_base::widthstd::locale::_std::locale::locale
                                          • String ID:
                                          • API String ID: 3820056732-0
                                          • Opcode ID: f7d4b075ec16be0e298c79dab2fc69bc85944e118794892976690d5cb4385092
                                          • Instruction ID: 86d93e1799712d7e7c94e48eab32cdaa6c65dc9cb9ce248a32b7114e59e6f229
                                          • Opcode Fuzzy Hash: f7d4b075ec16be0e298c79dab2fc69bc85944e118794892976690d5cb4385092
                                          • Instruction Fuzzy Hash: E9E19234118B889FE7A4FB69C0587BEB7F1FF99341F60491EA48DD7261DA76E4808702
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getlocstrcspn$Mpunctlocaleconv
                                          • String ID:
                                          • API String ID: 897058063-0
                                          • Opcode ID: e6d4c13a13f37a2c0e240a87e1a0af4942c429ab79be8636b1550a59db188ce2
                                          • Instruction ID: 74ed63ffb08cc1100d2827e71ad1dd519d24dd6af5fa845264bef5032519baac
                                          • Opcode Fuzzy Hash: e6d4c13a13f37a2c0e240a87e1a0af4942c429ab79be8636b1550a59db188ce2
                                          • Instruction Fuzzy Hash: 2CE1913670AA8089FB10AFA5C4493FD73B1F758B88FA44115DE8A57B99DF3AC54AC340
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getlocstrcspn$Mpunctlocaleconv
                                          • String ID:
                                          • API String ID: 897058063-0
                                          • Opcode ID: 519f33cb95e0d99ee0d4355dc84f9f0201176b2b605b694342907c18314ab85a
                                          • Instruction ID: de0f245bec8fe43c3b4b16257246916ee0068d6179287cd5104195402554d86f
                                          • Opcode Fuzzy Hash: 519f33cb95e0d99ee0d4355dc84f9f0201176b2b605b694342907c18314ab85a
                                          • Instruction Fuzzy Hash: C5E1903270AA80C9FB10AFA5C4493FD73B1E758B88F644115DE8A57B99EF3AC549C340
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getlocstrcspn$Mpunctlocaleconv
                                          • String ID:
                                          • API String ID: 897058063-0
                                          • Opcode ID: 249c8184b0c50b0624f1531bd89af645a8e4f17256f81473f5670aed722e2b0a
                                          • Instruction ID: 3dea9a5c0494b2a9d5eec0dd7b84282eab17adbadcc55c804e8514702aa28de9
                                          • Opcode Fuzzy Hash: 249c8184b0c50b0624f1531bd89af645a8e4f17256f81473f5670aed722e2b0a
                                          • Instruction Fuzzy Hash: 8DD17E32B0AA8489FB109FB5D0543EC7771F749B88F645116DE8A27B8ADF3AC546CB40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: char_traits
                                          • String ID:
                                          • API String ID: 1158913984-0
                                          • Opcode ID: 76944e2627019ce81bd9c091a5413294dd97fbccb27d42a7feae6066973e9caa
                                          • Instruction ID: 2ce055a07e505372e24e62587169e6294c43a75cad1474098e8f71104c1bbfcb
                                          • Opcode Fuzzy Hash: 76944e2627019ce81bd9c091a5413294dd97fbccb27d42a7feae6066973e9caa
                                          • Instruction Fuzzy Hash: C8C1B930128B448AE774FB25C4597BEB7F1FB96301F70092BA4CAC21A3DE76A584D752
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: char_traits$Lockitstd::_$GetfacetLockit::_Lockit::~___int64ctypestd::ios_base::getlocstd::ios_base::widthstd::locale::_std::locale::locale
                                          • String ID:
                                          • API String ID: 2740546168-0
                                          • Opcode ID: a07e37d6cc49bf2a2ce72d55d671cce5715a6d797d1835dc9c2bdc10f607b4b5
                                          • Instruction ID: 7d49ecb95b6bf341de04fe357e6cc0526d4944edcdc5c775aac460fb7f6ac27b
                                          • Opcode Fuzzy Hash: a07e37d6cc49bf2a2ce72d55d671cce5715a6d797d1835dc9c2bdc10f607b4b5
                                          • Instruction Fuzzy Hash: 2CC1BB3620EBC485EA60EB55E49536EB7B0F7C4B84F604516EACE47B69DF7EC4408B01
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: char_traits
                                          • String ID:
                                          • API String ID: 1158913984-0
                                          • Opcode ID: 62264f4c2282442cdc3c1f905bd9bad1ff7143b47ade65a719556a1dd44444ed
                                          • Instruction ID: 6dd05d2d394b54298ef04e2b5b4dcd751ee00dd6dfbc07bae880cb2207e050dc
                                          • Opcode Fuzzy Hash: 62264f4c2282442cdc3c1f905bd9bad1ff7143b47ade65a719556a1dd44444ed
                                          • Instruction Fuzzy Hash: BBB1D53611F68081FA20BB95E4593FAB3B0F794784F600127E6CA87A9ADF6BC544DF50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcodecvtstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 2666907392-0
                                          • Opcode ID: 786228c0cbaae2e5be0ca3ccd782fa5b01697f06a74618a99b9e5aa10a8d0d32
                                          • Instruction ID: 31128ea9f9b1aa1d9a22047b799a1e5da5859688d061a3c68e626cfb3edbbd51
                                          • Opcode Fuzzy Hash: 786228c0cbaae2e5be0ca3ccd782fa5b01697f06a74618a99b9e5aa10a8d0d32
                                          • Instruction Fuzzy Hash: 74418431128E084FE774FF19D4A8A6673F1FBA5310F70065B949AC32A7CA36A845C791
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: 14be1b1fd9718fc3f34adfb3cbca17648e58064d730dfa3a608ea707c9c1eaf3
                                          • Instruction ID: a1db6be18de4fb7ef26d0a13727754e547b8aac5776704fd3203c2195ed593d6
                                          • Opcode Fuzzy Hash: 14be1b1fd9718fc3f34adfb3cbca17648e58064d730dfa3a608ea707c9c1eaf3
                                          • Instruction Fuzzy Hash: 02418331129A088FE778FF19D49867A73F1FB69310F70055BA595C32A7DA36E805C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 3809448442-0
                                          • Opcode ID: e16598f94629519630b94ae800744cf899b351421400b9fa78f81e17fa1edaa5
                                          • Instruction ID: d089eb7743bd5a59c02804b939ce75efed1a98d80f525bdde25cf30f9638730e
                                          • Opcode Fuzzy Hash: e16598f94629519630b94ae800744cf899b351421400b9fa78f81e17fa1edaa5
                                          • Instruction Fuzzy Hash: D5418031628A094FE765FB59D498AAA73F1FB75300F70055B9086C32A6DE27EC058B81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: 244ef1690acba6a5cb0dd3559b1bc5566f4c94bd989e195887cab2b3b6a165ed
                                          • Instruction ID: 6725d043f821a5066b00954868a9839c39f4c7ad0dcafe82819626bd20927283
                                          • Opcode Fuzzy Hash: 244ef1690acba6a5cb0dd3559b1bc5566f4c94bd989e195887cab2b3b6a165ed
                                          • Instruction Fuzzy Hash: 64418031228B094FE775FB59D498ABA73F1FB75310F70065B9096C32A6DA27A8058B81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: bc7c18e89f00e4146b619dee3e1b955b084c897949153250966cdf59237aa082
                                          • Instruction ID: 2b0e2b5f06a33185a9e645bbfe277bb4ac280332a0dd2bcad5420b7ea8b61116
                                          • Opcode Fuzzy Hash: bc7c18e89f00e4146b619dee3e1b955b084c897949153250966cdf59237aa082
                                          • Instruction Fuzzy Hash: 4E417131628A084FE765FB29D48867577F1FBA9310F70166A908AD32A6DA36E841C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: e02caa4fb9f9f2feb070e3db7e870884112d88562d0c71a5ab28d0eb569987ff
                                          • Instruction ID: 106b2ccb86ef8a27c0798951f32dfc79a3aa9a050b4680ab756af6e735970075
                                          • Opcode Fuzzy Hash: e02caa4fb9f9f2feb070e3db7e870884112d88562d0c71a5ab28d0eb569987ff
                                          • Instruction Fuzzy Hash: 79416531128B098FE768FF19D4986BA77F1FB65310F70066B9496C32A7DA36E805C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: 41d49ad4b7121165f543fc67f64dc3071c0984782cb30c3a214f00ddd9751a84
                                          • Instruction ID: 09c2f945c01e52829b9006b3ec4e98af8cd2bd6d725d6c4f41ddf8d0ba78628d
                                          • Opcode Fuzzy Hash: 41d49ad4b7121165f543fc67f64dc3071c0984782cb30c3a214f00ddd9751a84
                                          • Instruction Fuzzy Hash: CD416231128B084FE765FF69D49867AB3F1FB6A310F30066B9495D32A7DA32E845C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 3240839640-0
                                          • Opcode ID: b689417173be9a58d7525dd7f69df29017bd0b297875d8cf91ba4b2357bb2b2e
                                          • Instruction ID: b5678875abc645d47af5a965fbf1eb2ba26f4124e0337251de67ca22a24888f5
                                          • Opcode Fuzzy Hash: b689417173be9a58d7525dd7f69df29017bd0b297875d8cf91ba4b2357bb2b2e
                                          • Instruction Fuzzy Hash: D141A331528E084FE764FF29D488A7677F1FB65310F34155BA08ED31A7DA36E9418781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: d9cb5c1c6ae06c0d428bbbd94a39445ef9bd2be3a68fcd0c49b05d0f5fcf55f6
                                          • Instruction ID: 476fcf4a7454b3a80084f87062f1fd495ab8f4b11b8538028fdf71ad360a050a
                                          • Opcode Fuzzy Hash: d9cb5c1c6ae06c0d428bbbd94a39445ef9bd2be3a68fcd0c49b05d0f5fcf55f6
                                          • Instruction Fuzzy Hash: 80418231128A084FE778FF19D498ABA73F1FB65310F70065B9495D32A7CA36E9458781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 4068408745-0
                                          • Opcode ID: 441b8e41e1d8b8a705fa5094bdd223caa96ea1b284aea36a97238e43f629e6f4
                                          • Instruction ID: cd878b27d2a0a3b0be2f2694d053712c3e6cc89a17d2ddfa9b5c8d01e136a462
                                          • Opcode Fuzzy Hash: 441b8e41e1d8b8a705fa5094bdd223caa96ea1b284aea36a97238e43f629e6f4
                                          • Instruction Fuzzy Hash: 10418131628E194FE764FF5AD488AA573F1FB7A300F70066B9095C32A3DA36A845C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 4068408745-0
                                          • Opcode ID: d3f43ab89e984d6a3700269965d375e20708ad9f940fdae27254e6f2a65f332c
                                          • Instruction ID: f6a476e4032a7c16d163e7792d01ee2bbd2dff81c5daf788681e7996d41bcd0c
                                          • Opcode Fuzzy Hash: d3f43ab89e984d6a3700269965d375e20708ad9f940fdae27254e6f2a65f332c
                                          • Instruction Fuzzy Hash: 52413231128B188FE765FF2AD49867AB3F1FB65310F30066B9499C31A7DA36E845C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: 6f298ffa6e497c2eaaf01785e43fc4dce3c4a55519c401323b13ede0ce761a3d
                                          • Instruction ID: 4a7906617877b67f69142f0705288247350ab0711dcb0efbad98863a2d3d409c
                                          • Opcode Fuzzy Hash: 6f298ffa6e497c2eaaf01785e43fc4dce3c4a55519c401323b13ede0ce761a3d
                                          • Instruction Fuzzy Hash: 3941A231528A084FE7B4FF29D4886B977F1FB69310F30155B919AC31A7DA36E8428781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 3809448442-0
                                          • Opcode ID: f8b94c656457c1187a9d8cbcd32f96ed1970e85c5a83aee131887960ce47540c
                                          • Instruction ID: 96fa0caeaeb1df62c28fdf39ff9850325c1f9462d1a2b066953422a3576abb3a
                                          • Opcode Fuzzy Hash: f8b94c656457c1187a9d8cbcd32f96ed1970e85c5a83aee131887960ce47540c
                                          • Instruction Fuzzy Hash: 45418331128B098FE765FB5AD498AB573F1FB79311F70065B9085C32A3CA26EC05C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 4068408745-0
                                          • Opcode ID: 7040e9f09c21cb0afca421e897f27dcdacf665d9cacd4426a9b98b6e033285e0
                                          • Instruction ID: 16fe4bad55847e8467a7f7bfb4c5d042078641c8b4438dd7e8dd7b80f7e924af
                                          • Opcode Fuzzy Hash: 7040e9f09c21cb0afca421e897f27dcdacf665d9cacd4426a9b98b6e033285e0
                                          • Instruction Fuzzy Hash: 96417F31128E084FE764FB69D498A7A73B1FB75310F70066B9086D32A7DA36E845C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 3809448442-0
                                          • Opcode ID: f056f9edf8a4f6c957cdc38cd9e619afd480da16a60ef54abf923e9647275c7d
                                          • Instruction ID: d4d38fcd1c6c98a4682d28e16bcce9023384559ea2b8431dfc9d541c43fcf2e2
                                          • Opcode Fuzzy Hash: f056f9edf8a4f6c957cdc38cd9e619afd480da16a60ef54abf923e9647275c7d
                                          • Instruction Fuzzy Hash: 67419271529A094FE765FF19D488A6A77F1EB59310F30096A908AC31A7CA36EC418781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 3809448442-0
                                          • Opcode ID: 7860dc70e9bf5cc0d0039a70ddbee0ae88935c02dea494e287fd0833cf40dded
                                          • Instruction ID: f4c95b6b426fb9cd633292cfc633680b96417656a876cb7675513bb0d85a6ff5
                                          • Opcode Fuzzy Hash: 7860dc70e9bf5cc0d0039a70ddbee0ae88935c02dea494e287fd0833cf40dded
                                          • Instruction Fuzzy Hash: AF418131228A094FE765FF5AD498ABA73F1FB75300F70065B9089C32A7CA36E845C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockctypestd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 3320480354-0
                                          • Opcode ID: 26618e56ba12d3068fdef7dd0408fe412cbf25b8add2ed8ae57410b806273332
                                          • Instruction ID: dac033bedde85d8a2d7463994560881055091f0a711eb17caecfe0f58c7944e9
                                          • Opcode Fuzzy Hash: 26618e56ba12d3068fdef7dd0408fe412cbf25b8add2ed8ae57410b806273332
                                          • Instruction Fuzzy Hash: 8F416571128B088FE765FF19D498A79B3F1FB6A310F30455BA085C32A7DA72E845CB81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockctypestd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 3320480354-0
                                          • Opcode ID: 399c9e31cdefa6e34355b3389e5769c9eacfa5db4b9d05f97f7b15c89971f269
                                          • Instruction ID: 261a889c7e804ac96e9990b369e6e0c67a8b89b6a6e121b9d5431b0cefcd7cdc
                                          • Opcode Fuzzy Hash: 399c9e31cdefa6e34355b3389e5769c9eacfa5db4b9d05f97f7b15c89971f269
                                          • Instruction Fuzzy Hash: 24417431128E084FEB69FF1AD49867673F1FB65310F70065B9495C32A7CA36E845CB81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: 915cf86895ac07d937b62642654921994e7e6139a02f3fdf34537d2804a32b4b
                                          • Instruction ID: 4ed84b2cbb84f882532623bb1f06b9c8ee24ddd72622d9c00e1f9a9139cf4cd1
                                          • Opcode Fuzzy Hash: 915cf86895ac07d937b62642654921994e7e6139a02f3fdf34537d2804a32b4b
                                          • Instruction Fuzzy Hash: 54416431128B184FE764FF19D898A7A73F1FB65310F70065B9486C32A7DA36A945CB81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 3809448442-0
                                          • Opcode ID: 77321c750d283a068eef52474f1328485b1adbfdf4c2edc2983fef81da2ed23e
                                          • Instruction ID: 7b32dda1712ca075c16d704417ebcfed1dba0be9544bf648fce838e4d3b64ff0
                                          • Opcode Fuzzy Hash: 77321c750d283a068eef52474f1328485b1adbfdf4c2edc2983fef81da2ed23e
                                          • Instruction Fuzzy Hash: 73417331228B094FE765FB69D4986A673F1FB75310F70055BA096C32A7DA36E8058781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: 5cfbe0f19a11e7d9f6b8e2c9b460ff2103601be7b6c7b550dceed3157f851894
                                          • Instruction ID: ad12bb62267941d5c03a99382913e458573948d5bf1fd28be93e022b217a8bde
                                          • Opcode Fuzzy Hash: 5cfbe0f19a11e7d9f6b8e2c9b460ff2103601be7b6c7b550dceed3157f851894
                                          • Instruction Fuzzy Hash: 95418331128B094FE765FF59D4886B973B1FB75310F70065B9096C32A6DA36E9058B81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: abd0f29150cea064db7ea93e3bd1444df1ce42a532174cbae03d5b6ef2ad6a86
                                          • Instruction ID: e228041d3f73474e9a104fed77578c72b48e8a74f644ba098be9d9414eb33579
                                          • Opcode Fuzzy Hash: abd0f29150cea064db7ea93e3bd1444df1ce42a532174cbae03d5b6ef2ad6a86
                                          • Instruction Fuzzy Hash: A3414371128B084FE765FF19D499A76B3F1FB66310F30066B9095D32A7DE32A8458781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: 7ad4993a8b174b8363bb7502690be3ae1b561dbc89bbd99c915c9381e914f89e
                                          • Instruction ID: 3376560b9aae028b0d7294b86fd69aee05f56809976264e0b08b5a5d1a699d68
                                          • Opcode Fuzzy Hash: 7ad4993a8b174b8363bb7502690be3ae1b561dbc89bbd99c915c9381e914f89e
                                          • Instruction Fuzzy Hash: 7041B430528A084FE764FF59D4986B573B1FB75300F70062B9196C32A7CA36E805CB81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 3240839640-0
                                          • Opcode ID: 76c8dbfefe16807c6c2e03d2c02e8fce80c7731968c8574b3a75b952f183e87e
                                          • Instruction ID: e8f78a4b03aa517e56fd6d7aad7f9e1fe4241e36a7761d1db5fef46261288715
                                          • Opcode Fuzzy Hash: 76c8dbfefe16807c6c2e03d2c02e8fce80c7731968c8574b3a75b952f183e87e
                                          • Instruction Fuzzy Hash: 10418331128B084FE7A4FF59D4A8A7673F1FB65300F70056BA496C32A7CA36E805CB81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: 3d9e32fe7dd0b0532a8a56be85dacd11b9ba7591c2a82d48e1cf92cf00c2def1
                                          • Instruction ID: 3b6232108d38f498412d9b5d8beffbffd5b6b53598510c31330df137e61e7279
                                          • Opcode Fuzzy Hash: 3d9e32fe7dd0b0532a8a56be85dacd11b9ba7591c2a82d48e1cf92cf00c2def1
                                          • Instruction Fuzzy Hash: 03417331528E084FE765FF19D488ABA77B1FB55310F30156E908ED32A6DA36A8458781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: 5b16358a03fb93621077fd88fa80582328bbc92a55aaa43dc3b6893833c7adb2
                                          • Instruction ID: 1b0a2a0847eea223375278dfb29f365217dcb2c3443560156596805664f6ecaa
                                          • Opcode Fuzzy Hash: 5b16358a03fb93621077fd88fa80582328bbc92a55aaa43dc3b6893833c7adb2
                                          • Instruction Fuzzy Hash: E0418331228E094FE765FB29D498AB677B1FB69300F70056B9485C32A3CA36E845C785
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 3809448442-0
                                          • Opcode ID: 3b1c8ff64b7d1c49a48d49447f4a4cc82ffe0b5f30dff20e234f5227c1eb22de
                                          • Instruction ID: 03b84fe879c63021ec580cad9d2bd2133078128c81bfb4fdca1b54bf390cfce6
                                          • Opcode Fuzzy Hash: 3b1c8ff64b7d1c49a48d49447f4a4cc82ffe0b5f30dff20e234f5227c1eb22de
                                          • Instruction Fuzzy Hash: B6419231528A084FF765FB29D488ABA77F1FB65300F30156ED08AD32A7DA76E8418781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: c2f1e7ce1e411251038a4074910defcb6052e1f5b50779ecea276810bcf71a42
                                          • Instruction ID: e08b586cd0149be9f365fbea7e42e670ccc8a64461ce0466c50d5a91c3eb3dea
                                          • Opcode Fuzzy Hash: c2f1e7ce1e411251038a4074910defcb6052e1f5b50779ecea276810bcf71a42
                                          • Instruction Fuzzy Hash: B4418431128E094FE775FB29D498AB673B1FB65310F70055BA485C32A7CA76EC05C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: d42b49580f59bf9ee5cacfae17bbef844d338c838c87811a0b20812210dc57c3
                                          • Instruction ID: ee8193bf96bb242219d40554f157578c2f3e3feba2da5159de2fc1470d2803d5
                                          • Opcode Fuzzy Hash: d42b49580f59bf9ee5cacfae17bbef844d338c838c87811a0b20812210dc57c3
                                          • Instruction Fuzzy Hash: 02418371128E098FE7A4FF59D4896BA73B1FB75300F71056B9096C32A7CA36E841C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 620047600-0
                                          • Opcode ID: 3e8bbe698a1bf48928fd66137138659e259b7ccdec2d8507b5c72f1779f4d2df
                                          • Instruction ID: 86dfbf217956cc2b6a968c09316161b559ff8b70caa77d9cf32b33cffb153027
                                          • Opcode Fuzzy Hash: 3e8bbe698a1bf48928fd66137138659e259b7ccdec2d8507b5c72f1779f4d2df
                                          • Instruction Fuzzy Hash: 88415331128B088FE765FF19D498A66B3B2FB66310F30455BA195C32A6DE33E945CB81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 3240839640-0
                                          • Opcode ID: 60f3d123f906e935d9828c950a9bb343b450096d505eb81e70dd43da5b441a09
                                          • Instruction ID: 484ab97c0355884e1fdc3fe1a30a5be9df656d622bc1d7581b161b40efee4c25
                                          • Opcode Fuzzy Hash: 60f3d123f906e935d9828c950a9bb343b450096d505eb81e70dd43da5b441a09
                                          • Instruction Fuzzy Hash: EF41A331128E084FE765FF19D4A867673F1FB69300F70065B9596C32A3CA36E841C781
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                                          • String ID: :
                                          • API String ID: 1584724053-336475711
                                          • Opcode ID: f6eab2cf8d0451a383fcd1094c8bc586515c01fa06371aa533fca521f759249e
                                          • Instruction ID: 6dd0b603e660ebc09c0dde6aff7abfb29bfa5d56ba1678ec12bc6b99c657c9b5
                                          • Opcode Fuzzy Hash: f6eab2cf8d0451a383fcd1094c8bc586515c01fa06371aa533fca521f759249e
                                          • Instruction Fuzzy Hash: 4041C13272774481FB10AB26A80A7AD37A5F784BC4F699425DF9E17745DF3AD412C304
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                                          • String ID: :
                                          • API String ID: 1584724053-336475711
                                          • Opcode ID: 604a302fabdb042f4ebc9b27cedb385bdeaebfe8a2c90ea295b00d5b5a1e0000
                                          • Instruction ID: ce543477ee196d7ee0583854c05858ec9fdd837a49dd79d0326d3b37e1cb767f
                                          • Opcode Fuzzy Hash: 604a302fabdb042f4ebc9b27cedb385bdeaebfe8a2c90ea295b00d5b5a1e0000
                                          • Instruction Fuzzy Hash: 3A41CF3232674581FB10AB26A80A3AD73A6F788BC4F689425DF9E17745CF3AD412C300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Fgetc
                                          • String ID:
                                          • API String ID: 1720979605-0
                                          • Opcode ID: f74a844098648da67d21de2c32495390ab1c3596fe8d82436c96308467037ff2
                                          • Instruction ID: 72d270c901d761d562b5c460043ddae9f08f93de3d6cf9fac505d92a37eef87a
                                          • Opcode Fuzzy Hash: f74a844098648da67d21de2c32495390ab1c3596fe8d82436c96308467037ff2
                                          • Instruction Fuzzy Hash: FFB1BC30128B488AE774FB25C4597BAF7F1FB96301F60492FA4CAC3193DE76A5458B42
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitLockit::_Mpunctstd::_std::ios_base::getloc$Stoulxstd::locale::locale
                                          • String ID:
                                          • API String ID: 1104148741-0
                                          • Opcode ID: 166b93a94447b86139d1c22adbbc14e30780d0c9cc7094b737ceab0ca3da017a
                                          • Instruction ID: 09863625ee6db1b87b8b367fec9f429e1698281129da51bba28e8687d021fa56
                                          • Opcode Fuzzy Hash: 166b93a94447b86139d1c22adbbc14e30780d0c9cc7094b737ceab0ca3da017a
                                          • Instruction Fuzzy Hash: 59815331628A0C9FDB68FB59D4596BDB3F1EB56300F60152EE48BD3293DE32A845C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitLockit::_Mpunctstd::_std::ios_base::getloc$Stoulxstd::locale::locale
                                          • String ID:
                                          • API String ID: 1104148741-0
                                          • Opcode ID: 16286996adb80dee7d5b064b22652e5f05a5085a5d70cf9cb1c6c826df7b05ca
                                          • Instruction ID: 6c074eda3eeacbb9fa396c4c1d280ca67efd7f2d98905b42bb30790b49f44818
                                          • Opcode Fuzzy Hash: 16286996adb80dee7d5b064b22652e5f05a5085a5d70cf9cb1c6c826df7b05ca
                                          • Instruction Fuzzy Hash: 9F713431628A0C9FDB68FB59D4596BDB3F1EB96300F60152EE48BD3192DE32AC45C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: LockitLockit::_Mpunctstd::_std::ios_base::getloc$Stoulxstd::locale::locale
                                          • String ID:
                                          • API String ID: 1104148741-0
                                          • Opcode ID: 3d88c636a073cdcdd73c6a924e436b277ebbf35aadf33963d9bcfa329ff9a495
                                          • Instruction ID: bc8f2057b109df405263661585af1ab0240f2b34fa814c189884df99fec8c58f
                                          • Opcode Fuzzy Hash: 3d88c636a073cdcdd73c6a924e436b277ebbf35aadf33963d9bcfa329ff9a495
                                          • Instruction Fuzzy Hash: 6B71B431628F0C4FEB68FB59D4597BDB3F1EB59310F70021AE48AD3293DE66A8458781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Fgetc
                                          • String ID:
                                          • API String ID: 1720979605-0
                                          • Opcode ID: af233356ab44033a1af5434a4fe9d0445c43cbdf01476d6f5b86da92ac9fc8ae
                                          • Instruction ID: 35ab534e45dc5b5bd29cd6182603c1901ef43f81aef5446dc3f72b07432699d8
                                          • Opcode Fuzzy Hash: af233356ab44033a1af5434a4fe9d0445c43cbdf01476d6f5b86da92ac9fc8ae
                                          • Instruction Fuzzy Hash: F0A1F93620F68084FA60FB55E4993BAB3B0E7D4790F604127E6CE47A9ADF6AC545CF40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_Mpunctstd::ios_base::getloc$Stoulxstd::locale::locale
                                          • String ID:
                                          • API String ID: 3293814644-0
                                          • Opcode ID: 1b6468ebf12914b2f0fe8338e001e18fabad8228a10c305a24cbb031952596d2
                                          • Instruction ID: 66d30812998f6e16f7ba850330ee98398104323c979bffc148e8e7de55cc3d06
                                          • Opcode Fuzzy Hash: 1b6468ebf12914b2f0fe8338e001e18fabad8228a10c305a24cbb031952596d2
                                          • Instruction Fuzzy Hash: A5519F3271BB408AFB10EBA5E8486EE73B0F785B98F500516EE9E17B99DE36C045C750
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_Mpunctstd::ios_base::getloc$Stoulxstd::locale::locale
                                          • String ID:
                                          • API String ID: 3293814644-0
                                          • Opcode ID: ba231bb55e8ad13bb8c84fadf00820e2b831a140557f64e95a63da8dc5e447dc
                                          • Instruction ID: a732a618d0cfd8c7c047a5eaf459d80b04044eb51a72ecde10c223a0927e4336
                                          • Opcode Fuzzy Hash: ba231bb55e8ad13bb8c84fadf00820e2b831a140557f64e95a63da8dc5e447dc
                                          • Instruction Fuzzy Hash: DC51BE3271BB408AFB10EBA5D8486EE7371F785B98F600516EE8E57B99DE36C005C750
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_Mpunctstd::ios_base::getloc$Stoulxstd::locale::locale
                                          • String ID:
                                          • API String ID: 3293814644-0
                                          • Opcode ID: fc64bed50a84d4864b71b968ac71fd66e0380d981a3e2c2678fe09f174b3caf6
                                          • Instruction ID: e2699760fb2d7ff261aef09d31dd991ede18dc72cf89c76dc43d7728aacb5b77
                                          • Opcode Fuzzy Hash: fc64bed50a84d4864b71b968ac71fd66e0380d981a3e2c2678fe09f174b3caf6
                                          • Instruction Fuzzy Hash: 0251CE3271BB408AFB10EB65E0487EE33B1F785B98F504516EE8A17B99DE36C444C740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 1776536810-0
                                          • Opcode ID: b9b3160839c62794a2f4426fd174e2d910c5656f38ad309ad83c3aeddb3b6001
                                          • Instruction ID: 3c5b06aa5013fc6b8b96d9cdb3a4122c7e75403eac1d133574bb5fd04a5ef857
                                          • Opcode Fuzzy Hash: b9b3160839c62794a2f4426fd174e2d910c5656f38ad309ad83c3aeddb3b6001
                                          • Instruction Fuzzy Hash: F6418231128A594FE764FF5AD4986B973F2FB79300F70065B9086C32A7CA26E845CB81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 1776536810-0
                                          • Opcode ID: 83099b52044964ab2d8c21b0e66d69e068add0a1ffda037c7dbd6fda676a952f
                                          • Instruction ID: bd86ae1003cdffa86fc2b14e6c30c3ed1152eed557846a57bc90edc47b12fea5
                                          • Opcode Fuzzy Hash: 83099b52044964ab2d8c21b0e66d69e068add0a1ffda037c7dbd6fda676a952f
                                          • Instruction Fuzzy Hash: F8416231128A084FE7B4FF59D49867A73F1FB79310F70066BA095C32A7DA36E9458781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 1776536810-0
                                          • Opcode ID: fb5e24ca2653538eeac2f84e8a1a1624b26305bbc8348ff8a181a437a36e0ba9
                                          • Instruction ID: f2a1b02e2edf7bad7f317f7990bd42ec9fe069b295b0eb1596313ab7be059696
                                          • Opcode Fuzzy Hash: fb5e24ca2653538eeac2f84e8a1a1624b26305bbc8348ff8a181a437a36e0ba9
                                          • Instruction Fuzzy Hash: 9A41C130528E094FE764FF69D488A7573F1FB69310F300A5EA08AC31A7CA36E8418781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 1776536810-0
                                          • Opcode ID: 78f14f210944464f9e1e1c2a8d13bcf1eae8f7fb983aa7ce8c5333fa9df294e0
                                          • Instruction ID: 2d12c6ac9ea5568447bde8f49f3574d7085a950fe8cbeaa5728f1950d63b42b8
                                          • Opcode Fuzzy Hash: 78f14f210944464f9e1e1c2a8d13bcf1eae8f7fb983aa7ce8c5333fa9df294e0
                                          • Instruction Fuzzy Hash: B0417431128B184FE764FF5AD498A6673F1FB75310F70065BA085C32A7CA76E845CB81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 1776536810-0
                                          • Opcode ID: bae5d00c57f016e6d8c0dc1a7b8c8c15f75d85941c89fc877493011a6d48aa01
                                          • Instruction ID: d72679b78ebfcb2d5a55c5d5a4792d7579d75a5ab275f88c02857508cdb76155
                                          • Opcode Fuzzy Hash: bae5d00c57f016e6d8c0dc1a7b8c8c15f75d85941c89fc877493011a6d48aa01
                                          • Instruction Fuzzy Hash: FC418371528A098FE765FF29D489A7573F1EB66310F30095F909EC31A7DA36E8418781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID:
                                          • API String ID: 1776536810-0
                                          • Opcode ID: 8201b41f25ef33c3613c1a68ee4a65115b9c88f9471d48fa011a91e106f7afff
                                          • Instruction ID: f35948d67663f35ab990d6648443d3aa2a4d85eb2ecd4ccadcae16e4a2ff6054
                                          • Opcode Fuzzy Hash: 8201b41f25ef33c3613c1a68ee4a65115b9c88f9471d48fa011a91e106f7afff
                                          • Instruction Fuzzy Hash: A2416031128A088FE764FB59D49867673B1FB75310F70095BA495C32A6DA37EC45CB81
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: char_traits
                                          • String ID:
                                          • API String ID: 1158913984-0
                                          • Opcode ID: 138815e70514d2f135f1c707d96a860ed4914229c68fb56bc0cde8100c9a4ae3
                                          • Instruction ID: f859d46746b0fd1325775a4d171326372a88743481a6c485b9a1db7a2a350d0b
                                          • Opcode Fuzzy Hash: 138815e70514d2f135f1c707d96a860ed4914229c68fb56bc0cde8100c9a4ae3
                                          • Instruction Fuzzy Hash: 4B41FC70138B458AE764FB26C4597BAB6F0FF96341F70092BA1C6D61A3DE27E944C702
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
                                          • String ID:
                                          • API String ID: 2998201375-0
                                          • Opcode ID: 1d846ac782697e1626f60741b10654be5d980ecfef08fe52ee6ab297ca0a43db
                                          • Instruction ID: 521de9750e868485e8501e3c7748a11e79e2dddc08ebf7701b8466fbc8ebceb9
                                          • Opcode Fuzzy Hash: 1d846ac782697e1626f60741b10654be5d980ecfef08fe52ee6ab297ca0a43db
                                          • Instruction Fuzzy Hash: 6241C37221B78086F761AF15D149339BBB5F786B88F244125EBCA57B95CF3BC4418700
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: char_traits
                                          • String ID:
                                          • API String ID: 1158913984-0
                                          • Opcode ID: efd17d778424b9709a2ebecd350b9a00f791cf1ba8a6ebccbfb2f640782f2fd7
                                          • Instruction ID: bfd074893560207bc70420e3d3d171656123fe8d7bc77e80f21a5b88196dae43
                                          • Opcode Fuzzy Hash: efd17d778424b9709a2ebecd350b9a00f791cf1ba8a6ebccbfb2f640782f2fd7
                                          • Instruction Fuzzy Hash: 9741097221F54081FA10BBA5E49937A7270FBC1785F700123E6CE87AAADE2BC9458F40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _getptd$_inconsistency$DecodePointer_amsg_exit_getptd_noexit
                                          • String ID:
                                          • API String ID: 3669027769-0
                                          • Opcode ID: d84545b744132abf258f2739307021ab7867776e2950de2c885c0764620f8872
                                          • Instruction ID: d6837c72617e9dc5a9086355b75787289452fd82f739c43470202f3fb1b193c8
                                          • Opcode Fuzzy Hash: d84545b744132abf258f2739307021ab7867776e2950de2c885c0764620f8872
                                          • Instruction Fuzzy Hash: EFF0FE3620B98080FE71BB55E24F2BD76B1A758B90F3D5521E6C61B2879F27C491C251
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _getptd$_inconsistency$DestructExceptionObject
                                          • String ID: csm
                                          • API String ID: 2821275340-1018135373
                                          • Opcode ID: 242ad1541a1665e7e88aaf19789ec1deda19dbf05a08f0dcd3087e0f0a85a81f
                                          • Instruction ID: 619e802359a56153a5ba6c6fa672da6bc170cdf5e101faed8d43a1d88848dee1
                                          • Opcode Fuzzy Hash: 242ad1541a1665e7e88aaf19789ec1deda19dbf05a08f0dcd3087e0f0a85a81f
                                          • Instruction Fuzzy Hash: 710167B610764185EB32BF31E4493BD33B4E755755F251825D9C98A785EF23D881C340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Exception_callnewh_errno$AllocFileHeaderHeapRaiseThrowmalloc
                                          • String ID: bad allocation
                                          • API String ID: 1214304046-2104205924
                                          • Opcode ID: b642b03be230f377a94fb8bf127ac4337ba363d888bade25789cd85e7bf78fa8
                                          • Instruction ID: 2faa049ac7401391b90ee4164b37fbf6d1f86f798834320d2f46fcbecf3796c5
                                          • Opcode Fuzzy Hash: b642b03be230f377a94fb8bf127ac4337ba363d888bade25789cd85e7bf78fa8
                                          • Instruction Fuzzy Hash: 29F062B522BB4A90FE60B751A00A2F573B4E784384F640410D9CE0B6A6EF2FC249CB01
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _wfsopen$fclosefseek
                                          • String ID:
                                          • API String ID: 1261181034-0
                                          • Opcode ID: 66608ed3d9a3b7f166453832a9f1b2a902d53ff026ec2d0a3286f5d598873d35
                                          • Instruction ID: f2453651b8b2ddb29171693b9a6e50b24d12217b93c60b2f70a38ff27dd7458e
                                          • Opcode Fuzzy Hash: 66608ed3d9a3b7f166453832a9f1b2a902d53ff026ec2d0a3286f5d598873d35
                                          • Instruction Fuzzy Hash: 7531D931234A094EE7F8BA5D949A37672E1E746304F74446E94CBC3393D52BDC418741
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LocinfoLocinfo::_$GettnamesLocinfo::~_freemalloc
                                          • String ID:
                                          • API String ID: 409281135-0
                                          • Opcode ID: c2fdb474924eb8315d998c80493699ed0ab12c0f657938f58dd9487b9441d48b
                                          • Instruction ID: 4f8c2cee3bee104706fa6f9f69cb611ca514dc0f068064f9ae4ffcc3289397ba
                                          • Opcode Fuzzy Hash: c2fdb474924eb8315d998c80493699ed0ab12c0f657938f58dd9487b9441d48b
                                          • Instruction Fuzzy Hash: 7531A470128B098FD7B5FF19D099BA673F0FBA9310F60029A9489C7293DB36D840C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LocinfoLocinfo::_$GettnamesLocinfo::~_freemalloc
                                          • String ID:
                                          • API String ID: 409281135-0
                                          • Opcode ID: b0350cc8b461ada8f143b32dd75d94f1cb74beae973b0a62e1c342981cbefe1a
                                          • Instruction ID: 64c3f222815dda6e391982aeb79ab84fdf8591d8073db8ea0ed02a00aaa51ea8
                                          • Opcode Fuzzy Hash: b0350cc8b461ada8f143b32dd75d94f1cb74beae973b0a62e1c342981cbefe1a
                                          • Instruction Fuzzy Hash: DB318171128B098FDB65FF19D089BA673F0FB69311F60029A9489C72A7DB76D840C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LocinfoLocinfo::_$GettnamesLocinfo::~_freemalloc
                                          • String ID:
                                          • API String ID: 409281135-0
                                          • Opcode ID: 0c3ddc91d2b006acc8b60784553b8ba10a7dca4d57a8f93519ec96857e636940
                                          • Instruction ID: 9e0b74d32815f0fa05a0358af4d9f9cb747e39763a0cc2a47cfda1ab3d86faca
                                          • Opcode Fuzzy Hash: 0c3ddc91d2b006acc8b60784553b8ba10a7dca4d57a8f93519ec96857e636940
                                          • Instruction Fuzzy Hash: A93172B1128B098FDB75FF19C089BA673F0FB69311F64069AD48AC7196DB72D800C781
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                                          • String ID:
                                          • API String ID: 1584724053-0
                                          • Opcode ID: 3daca0f6dc92f9794fddbcc1cdaa0d0f178e51dead4e14673644e8c31eb13f91
                                          • Instruction ID: 43c327ce2324fa99c5c3bc0c41da99ab21e124dfb699758aecd2b43606d45757
                                          • Opcode Fuzzy Hash: 3daca0f6dc92f9794fddbcc1cdaa0d0f178e51dead4e14673644e8c31eb13f91
                                          • Instruction Fuzzy Hash: 7631933271768582FB15AB25D91A3AD77B1E785BC4F188125DB8A0BB99DF3AD002C704
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: fpos$_errno_fseeki64_invalid_parameter_noinfofgetpos
                                          • String ID:
                                          • API String ID: 3188862907-0
                                          • Opcode ID: c6c53303b0747acdde5ada9e622c71b4572c09a9b9df7f851f5bf6a1ead528d1
                                          • Instruction ID: acc42888dbbc029fafe7740f9e51aff14ac5c3c684bd75a713055d5a3ffd29b0
                                          • Opcode Fuzzy Hash: c6c53303b0747acdde5ada9e622c71b4572c09a9b9df7f851f5bf6a1ead528d1
                                          • Instruction Fuzzy Hash: BB31E2701287488FD754FB19C44876AB7F1FB9A344F64052EE4C9C32A7DA76E841C742
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: fpos$_fseeki64fgetpos
                                          • String ID:
                                          • API String ID: 1811617113-0
                                          • Opcode ID: 4dd5a6bf44b4f08af2fe84d530f4457cc968653dd13fc1324dcdb608c86c5414
                                          • Instruction ID: e331e0e1c30a978874cd9fc596b89851680cf20187a193ec49d2efbbefe5fad7
                                          • Opcode Fuzzy Hash: 4dd5a6bf44b4f08af2fe84d530f4457cc968653dd13fc1324dcdb608c86c5414
                                          • Instruction Fuzzy Hash: BA319D305287448FD7A4FB19C44DB6AB7F1FB96345F60096AE589C31A2CA72E841CB46
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _wfsopen$fclosefseek
                                          • String ID:
                                          • API String ID: 1261181034-0
                                          • Opcode ID: 66608ed3d9a3b7f166453832a9f1b2a902d53ff026ec2d0a3286f5d598873d35
                                          • Instruction ID: a81b63d5c30d2e77febaa69f39e839f69f69ba2df5a4e7d6159d1a1ec074751a
                                          • Opcode Fuzzy Hash: 66608ed3d9a3b7f166453832a9f1b2a902d53ff026ec2d0a3286f5d598873d35
                                          • Instruction Fuzzy Hash: 1121EF3176BA4084FA64EA0A954977BB2B1A785B86F384121CE8B837D1DE3FC4418B40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                          • String ID:
                                          • API String ID: 4151157258-0
                                          • Opcode ID: eb64e8c74a50022202f8ee626fe7dbe8f97126340f84a3ce38f6fe5f0cae3986
                                          • Instruction ID: 6665ad2adc0e62ec26389b02a83b465f4607a928cb23fdbcae9995c27ad6925e
                                          • Opcode Fuzzy Hash: eb64e8c74a50022202f8ee626fe7dbe8f97126340f84a3ce38f6fe5f0cae3986
                                          • Instruction Fuzzy Hash: E221D4F212E2A441F6703615905837DBBA6E344B94F384125E6C6C66C5DB2FC6418718
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LocinfoLocinfo::_$GettnamesLocinfo::~_freemalloc
                                          • String ID:
                                          • API String ID: 409281135-0
                                          • Opcode ID: d8e69efa26ad0008533831846f76d24351a0b3f39eb347073c5dfcd3e47a997e
                                          • Instruction ID: 8157f6a66430312105eeea8a646d9999093434632803c4d691630d329b6a28c2
                                          • Opcode Fuzzy Hash: d8e69efa26ad0008533831846f76d24351a0b3f39eb347073c5dfcd3e47a997e
                                          • Instruction Fuzzy Hash: 7A218B7220BB4081FF24EF11E4583A9B3B4F794BA4FA44222CA9E47395DF3AC945C790
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: _errno_invalid_parameter_noinfofpos$_fseeki64fgetpos
                                          • String ID:
                                          • API String ID: 1989672365-0
                                          • Opcode ID: e02842f5a42da3625d84d50036dede68edc7dbfdcb998bdce8beb25ad7a6383a
                                          • Instruction ID: 8b5897c9f7e31a8e799708fd1f658afcd9aadc23f076df318efad3ae7051483b
                                          • Opcode Fuzzy Hash: e02842f5a42da3625d84d50036dede68edc7dbfdcb998bdce8beb25ad7a6383a
                                          • Instruction Fuzzy Hash: 0E31DE7620AA8485EA10EB15E49536AB7B0F7C5784F604027EBCE47B6ADF7BC5408F40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LocinfoLocinfo::_$GettnamesLocinfo::~_freemalloc
                                          • String ID:
                                          • API String ID: 409281135-0
                                          • Opcode ID: ee97dc229c5cd99bb1ca05c9355866ee283a5751f5faa2f00eedab80158d67f4
                                          • Instruction ID: 1a36e8b2f4b0bb83064d078cd329d859985da403fe0b3a2580263660e2730760
                                          • Opcode Fuzzy Hash: ee97dc229c5cd99bb1ca05c9355866ee283a5751f5faa2f00eedab80158d67f4
                                          • Instruction Fuzzy Hash: 7E219A7220BB4485FB20EF11D0583AA73B4F784B94FA14226CE9A873D5DF3AC906C780
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$LocinfoLocinfo::_$GettnamesLocinfo::~_freemalloc
                                          • String ID:
                                          • API String ID: 409281135-0
                                          • Opcode ID: 1c985824af1acae9496c5e71a96abd0544d665edfd3f96118f34935afdf6e220
                                          • Instruction ID: c4105a1accb166e75157ac8164c591b7e953f6df5d8e099688f92f8a88feefe2
                                          • Opcode Fuzzy Hash: 1c985824af1acae9496c5e71a96abd0544d665edfd3f96118f34935afdf6e220
                                          • Instruction Fuzzy Hash: 50217C3221BB4081FB24EF11D8583AA77B4F784B90F654222CA9E473E5DF3AC946C780
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: fpos$_fseeki64fgetpos
                                          • String ID:
                                          • API String ID: 1811617113-0
                                          • Opcode ID: 4dd5a6bf44b4f08af2fe84d530f4457cc968653dd13fc1324dcdb608c86c5414
                                          • Instruction ID: 29570da0b1d710a80458a1c2636bcee3f14fc6ca793bc3eff4cc586accc2f3f3
                                          • Opcode Fuzzy Hash: 4dd5a6bf44b4f08af2fe84d530f4457cc968653dd13fc1324dcdb608c86c5414
                                          • Instruction Fuzzy Hash: 9E31AD7620AA8485EA50EB15E49536AB7B0F7C5784F600417EBCE47BA9CF7BC944CF40
                                          APIs
                                          • std::locale::_Locimp::_New_Locimp.LIBCPMT ref: 0000026CE687AFA3
                                            • Part of subcall function 0000026CE687B6C0: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0000026CE687B6EE
                                          • __int64.LIBCPMTD ref: 0000026CE687AFBF
                                            • Part of subcall function 0000026CE6871398: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE68713B3
                                          • _aligned_msize.LIBCMTD ref: 0000026CE687AFD4
                                            • Part of subcall function 0000026CE68714D8: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0000026CE68714FA
                                          • codecvt.LIBCPMTD ref: 0000026CE687AFDD
                                            • Part of subcall function 0000026CE6871B18: std::locale::c_str.LIBCPMTD ref: 0000026CE6871B7A
                                            • Part of subcall function 0000026CE6871B18: std::_Locinfo::_Locinfo.LIBCPMTD ref: 0000026CE6871B87
                                            • Part of subcall function 0000026CE6871B18: collate.LIBCPMTD ref: 0000026CE6871BB3
                                            • Part of subcall function 0000026CE6871B18: std::_Locinfo::~_Locinfo.LIBCPMTD ref: 0000026CE6871BF7
                                            • Part of subcall function 0000026CE6874778: Concurrency::cancellation_token::_Clear.LIBCPMTD ref: 0000026CE68747A0
                                            • Part of subcall function 0000026CE6874778: malloc.LIBCMT ref: 0000026CE68747F9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Locimp::_std::_std::locale::_$LocimpLocinfo$AddfacClearConcurrency::cancellation_token::_Locimp_Locinfo::_Locinfo::~_LockitLockit::_New___int64_aligned_msizecodecvtcollatemallocstd::locale::c_str
                                          • String ID:
                                          • API String ID: 2541660624-0
                                          • Opcode ID: 58eda042d10801f7b57768f629ec788ac31b79f2513f95b0baad2b10f0f1f92d
                                          • Instruction ID: af58ac42eb0edf0db781cee118c5335a3e428419e65b19b38853ec89c4b59521
                                          • Opcode Fuzzy Hash: 58eda042d10801f7b57768f629ec788ac31b79f2513f95b0baad2b10f0f1f92d
                                          • Instruction Fuzzy Hash: 9D11B174228B489FD794FF2DC489B69B7F1FB99300FA40559B485C72A1D736E844C741
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Yarn$std::_$LocinfoLocinfo::_std::bad_exception::bad_exception$ExceptionGetcvtLocinfo::~_LockitLockit::_Throwcodecvtstd::locale::facet::facet
                                          • String ID:
                                          • API String ID: 3485682108-0
                                          • Opcode ID: 3871120677c23c23d88de505935f11af323c157f0d755e3ee0aa1d801b5552f5
                                          • Instruction ID: 934e12a09ea7c84f736c1366ad4926d39610ca4148cc09f42e5eacebf0102378
                                          • Opcode Fuzzy Hash: 3871120677c23c23d88de505935f11af323c157f0d755e3ee0aa1d801b5552f5
                                          • Instruction Fuzzy Hash: DD013630128B8C8FD7A4FB18D445BDBB3E1FB95300FA0561EA0D9C3191DB76A909CB42
                                          APIs
                                          • std::locale::_Locimp::_New_Locimp.LIBCPMT ref: 0000026CE85CB6FB
                                            • Part of subcall function 0000026CE85CBE18: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0000026CE85CBE46
                                          • __int64.LIBCPMTD ref: 0000026CE85CB717
                                            • Part of subcall function 0000026CE85C1AF0: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85C1B0B
                                            • Part of subcall function 0000026CE85C1AF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85C1B3D
                                          • _aligned_msize.LIBCMTD ref: 0000026CE85CB72C
                                            • Part of subcall function 0000026CE85C1C30: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0000026CE85C1C52
                                          • codecvt.LIBCPMTD ref: 0000026CE85CB735
                                            • Part of subcall function 0000026CE85C2270: std::locale::c_str.LIBCPMTD ref: 0000026CE85C22D2
                                            • Part of subcall function 0000026CE85C2270: std::_Locinfo::_Locinfo.LIBCPMTD ref: 0000026CE85C22DF
                                            • Part of subcall function 0000026CE85C2270: collate.LIBCPMTD ref: 0000026CE85C230B
                                            • Part of subcall function 0000026CE85C2270: std::_Locinfo::~_Locinfo.LIBCPMTD ref: 0000026CE85C234F
                                            • Part of subcall function 0000026CE85C4ED0: Concurrency::cancellation_token::_Clear.LIBCPMTD ref: 0000026CE85C4EF8
                                            • Part of subcall function 0000026CE85C4ED0: malloc.LIBCMT ref: 0000026CE85C4F51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Locimp::_std::locale::_$LocimpLocinfoLockit$AddfacClearConcurrency::cancellation_token::_Locimp_Locinfo::_Locinfo::~_Lockit::_Lockit::~_New___int64_aligned_msizecodecvtcollatemallocstd::locale::c_str
                                          • String ID:
                                          • API String ID: 1811419688-0
                                          • Opcode ID: 7af322f36f17e67862f741fc24bfc0139ff588b013d2130c712c45a990bd171e
                                          • Instruction ID: 63586966cb18da2ea76861c47a9452d22c972d73f6cf35a03d092fa487c26908
                                          • Opcode Fuzzy Hash: 7af322f36f17e67862f741fc24bfc0139ff588b013d2130c712c45a990bd171e
                                          • Instruction Fuzzy Hash: 0901403622BB4481EB40EF1AE49936A7370F7C4B90F605612FE9E437A5CF3AC0558B00
                                          APIs
                                          • std::bad_exception::bad_exception.LIBCMTD ref: 0000026CE85C21AA
                                            • Part of subcall function 0000026CE85C1F60: std::locale::facet::facet.LIBCPMTD ref: 0000026CE85C1F78
                                          • std::_Locinfo::_Locinfo.LIBCPMTD ref: 0000026CE85C21CE
                                            • Part of subcall function 0000026CE85C17E0: std::_Lockit::_Lockit.LIBCPMT ref: 0000026CE85C1801
                                            • Part of subcall function 0000026CE85C17E0: _Yarn.LIBCPMTD ref: 0000026CE85C1813
                                            • Part of subcall function 0000026CE85C17E0: _Yarn.LIBCPMTD ref: 0000026CE85C1825
                                            • Part of subcall function 0000026CE85C17E0: _Yarn.LIBCPMTD ref: 0000026CE85C1837
                                            • Part of subcall function 0000026CE85C17E0: _Yarn.LIBCPMTD ref: 0000026CE85C1849
                                            • Part of subcall function 0000026CE85C17E0: _Yarn.LIBCPMTD ref: 0000026CE85C185B
                                            • Part of subcall function 0000026CE85C17E0: _Yarn.LIBCPMTD ref: 0000026CE85C186D
                                            • Part of subcall function 0000026CE85C17E0: std::bad_exception::bad_exception.LIBCMTD ref: 0000026CE85C1887
                                            • Part of subcall function 0000026CE85C17E0: _CxxThrowException.LIBCMT ref: 0000026CE85C1898
                                            • Part of subcall function 0000026CE85C17E0: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0000026CE85C18A7
                                          • codecvt.LIBCPMTD ref: 0000026CE85C21E1
                                            • Part of subcall function 0000026CE85C23A0: std::_Locinfo::_Getcvt.LIBCPMTD ref: 0000026CE85C23CC
                                          • std::_Locinfo::~_Locinfo.LIBCPMTD ref: 0000026CE85C21EC
                                            • Part of subcall function 0000026CE85C18C0: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0000026CE85C18CE
                                            • Part of subcall function 0000026CE85C18C0: std::_Lockit::~_Lockit.LIBCPMT ref: 0000026CE85C1941
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::_$Yarn$Locinfo::_$LocinfoLockitstd::bad_exception::bad_exception$ExceptionGetcvtLocinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_Throwcodecvtstd::locale::facet::facet
                                          • String ID:
                                          • API String ID: 2580637281-0
                                          • Opcode ID: adcdcac3d387f150fc2c396cd21c3c6a73979b2da0c270e4eb99f33f457a8872
                                          • Instruction ID: 433cffe447fdc7e65e75d1f5a406d9ec4101b98ca97a64acad43622aed6582c4
                                          • Opcode Fuzzy Hash: adcdcac3d387f150fc2c396cd21c3c6a73979b2da0c270e4eb99f33f457a8872
                                          • Instruction Fuzzy Hash: E7F0FF7226BBC191DA60EB14E4553AA7331F7C17A0F505612E6EE436E9CF2EC508CB01
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_getptd_malloc_crt
                                          • String ID: :
                                          • API String ID: 875692556-336475711
                                          • Opcode ID: 87dcd81199e5c75fe6f4eb1ed4ca3c3cad752f6282d2ad23c1f32017a9299fd6
                                          • Instruction ID: 2c2defc41c69439aac48cbcba5c6ebc1de53352cd080a8c3fb0ffa77b2a3992d
                                          • Opcode Fuzzy Hash: 87dcd81199e5c75fe6f4eb1ed4ca3c3cad752f6282d2ad23c1f32017a9299fd6
                                          • Instruction Fuzzy Hash: 9441C931628F0C4FDB68FF29988A6B573E1F759310F65426BD89AC3197DE22D8428781
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4679454490.0000026CE6870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE6870000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce6870000_loaddll64.jbxd
                                          Similarity
                                          • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_getptd_malloc_crt
                                          • String ID: :
                                          • API String ID: 875692556-336475711
                                          • Opcode ID: b6f76ccc677749e7e47c8f1fd9208b4adf8ad809ee0fda7590a67167e05195a0
                                          • Instruction ID: bcaba9007c2e35076e079000ae3a7fc8dc65a600effbd61fbc4ab45142d0646e
                                          • Opcode Fuzzy Hash: b6f76ccc677749e7e47c8f1fd9208b4adf8ad809ee0fda7590a67167e05195a0
                                          • Instruction Fuzzy Hash: 6E41B831628E0C4FDB68FF2998896B573E1F759310F65426BE89AC3197DE32D8428781
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getlocswprintf
                                          • String ID: %.0Lf
                                          • API String ID: 2734600178-1402515088
                                          • Opcode ID: 0b52692e544fc50670088c299cef916147423b381afed6a016f19d8ad1928563
                                          • Instruction ID: cc614d453e4d09f8796b91ae72acbc466fda47d166d24b8f0d972e084cca9283
                                          • Opcode Fuzzy Hash: 0b52692e544fc50670088c299cef916147423b381afed6a016f19d8ad1928563
                                          • Instruction Fuzzy Hash: 36516D32A1AB8089F711DBA5E8443ED7374F784798F604216EE9E57B99EF3AC446C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getlocswprintf
                                          • String ID: %.0Lf
                                          • API String ID: 2734600178-1402515088
                                          • Opcode ID: 4d8b598d66f7e2c92a40726d1b63a1af653c1d6d07b5135ad9993eb8cba31dca
                                          • Instruction ID: c909e8626668e633c53071a3e1f21c1a55a1a9e905a856b1016e199dd5a0f14e
                                          • Opcode Fuzzy Hash: 4d8b598d66f7e2c92a40726d1b63a1af653c1d6d07b5135ad9993eb8cba31dca
                                          • Instruction Fuzzy Hash: BB516D32A1AB8089F711DBA5D8443ED7371F784798F604216EE9E57B99EF3AC046C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.4681374131.0000026CE85C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026CE85C0000, based on PE: true
                                          • Associated: 00000000.00000002.4681374131.0000026CE8668000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_26ce85c0000_loaddll64.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getlocswprintf
                                          • String ID: %.0Lf
                                          • API String ID: 2734600178-1402515088
                                          • Opcode ID: 4ecb6063488c6e6240f3922736982e1e2cd0c6d48fa5f7eaa1debd812ab1ff6c
                                          • Instruction ID: c8730af22bc3a2db763cdfae707bc7b1e45ceb334a785f135c7b605b2f987c57
                                          • Opcode Fuzzy Hash: 4ecb6063488c6e6240f3922736982e1e2cd0c6d48fa5f7eaa1debd812ab1ff6c
                                          • Instruction Fuzzy Hash: CA519132B1AA8089F711DB75D8483ED7770E785798F605216EE9A27B99DF3AC046C700

                                          Execution Graph

                                          Execution Coverage:1.8%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:6.9%
                                          Total number of Nodes:1121
                                          Total number of Limit Nodes:56
                                          execution_graph 71224 21e04ca22a8 71225 21e04ca233c 71224->71225 71230 21e04ca22c0 malloc 71224->71230 71246 21e04cab5f0 DecodePointer 71225->71246 71227 21e04ca2341 71247 21e04ca3b0c 47 API calls _getptd_noexit 71227->71247 71232 21e04ca22d8 71230->71232 71233 21e04ca2321 71230->71233 71237 21e04ca2326 71230->71237 71239 21e04ca2331 71230->71239 71243 21e04cab5f0 DecodePointer 71230->71243 71232->71230 71240 21e04cab62c 47 API calls 2 library calls 71232->71240 71241 21e04cab6a0 47 API calls 9 library calls 71232->71241 71242 21e04cab0c8 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 71232->71242 71244 21e04ca3b0c 47 API calls _getptd_noexit 71233->71244 71245 21e04ca3b0c 47 API calls _getptd_noexit 71237->71245 71240->71232 71241->71232 71243->71230 71244->71237 71245->71239 71246->71227 71247->71239 71290 21e04cabfb8 71291 21e04cabfda _write_nolock 71290->71291 71292 21e04cac036 71291->71292 71293 21e04cac016 71291->71293 71320 21e04cac00a 71291->71320 71296 21e04cac084 71292->71296 71300 21e04cac079 71292->71300 71343 21e04ca3a9c 47 API calls _getptd_noexit 71293->71343 71297 21e04cac099 71296->71297 71347 21e04cabd68 48 API calls 4 library calls 71296->71347 71335 21e04cb3450 71297->71335 71298 21e04cac01b 71344 21e04ca3b0c 47 API calls _getptd_noexit 71298->71344 71346 21e04ca3a9c 47 API calls _getptd_noexit 71300->71346 71306 21e04cac023 71345 21e04caa4e8 7 API calls _invalid_parameter_noinfo 71306->71345 71309 21e04cac6ee WriteFile 71325 21e04cac506 _read_nolock 71309->71325 71310 21e04cac0c9 GetConsoleMode 71311 21e04cac109 71310->71311 71324 21e04cac364 _read_nolock 71310->71324 71313 21e04cac118 GetConsoleCP 71311->71313 71311->71324 71312 21e04cac73d 71312->71320 71353 21e04ca3b0c 47 API calls _getptd_noexit 71312->71353 71313->71312 71332 21e04cac13c _write_nolock 71313->71332 71315 21e04cac467 WriteFile 71315->71324 71316 21e04cac769 71354 21e04ca3a9c 47 API calls _getptd_noexit 71316->71354 71318 21e04cac62a WideCharToMultiByte 71321 21e04cac676 WriteFile 71318->71321 71318->71324 71319 21e04cac554 WriteFile 71319->71324 71319->71325 71355 21e04ca1440 71320->71355 71321->71325 71323 21e04cac736 71352 21e04ca3abc 47 API calls 2 library calls 71323->71352 71324->71309 71324->71312 71324->71315 71324->71318 71324->71319 71324->71320 71324->71323 71350 21e04ca3b0c 47 API calls _getptd_noexit 71324->71350 71351 21e04ca3a9c 47 API calls _getptd_noexit 71324->71351 71325->71321 71325->71324 71327 21e04cac1ee WideCharToMultiByte 71327->71324 71329 21e04cac231 WriteFile 71327->71329 71329->71324 71333 21e04cac26c 71329->71333 71331 21e04cb47a8 WriteConsoleW CreateFileW _putwch_nolock 71331->71333 71332->71324 71332->71327 71332->71333 71349 21e04cad60c 47 API calls _LocaleUpdate::_LocaleUpdate 71332->71349 71333->71324 71333->71331 71333->71332 71334 21e04cac28c WriteFile 71333->71334 71334->71324 71334->71333 71336 21e04cb3459 71335->71336 71337 21e04cb3466 71335->71337 71364 21e04ca3b0c 47 API calls _getptd_noexit 71336->71364 71339 21e04cac0a0 71337->71339 71365 21e04ca3b0c 47 API calls _getptd_noexit 71337->71365 71339->71324 71348 21e04cad224 47 API calls 2 library calls 71339->71348 71341 21e04cb349d 71366 21e04caa4e8 7 API calls _invalid_parameter_noinfo 71341->71366 71343->71298 71344->71306 71345->71320 71346->71298 71347->71297 71348->71310 71349->71332 71350->71324 71351->71324 71352->71312 71353->71316 71354->71320 71356 21e04ca1449 71355->71356 71357 21e04ca1454 71356->71357 71358 21e04ca9ff8 IsProcessorFeaturePresent 71356->71358 71359 21e04caa00f 71358->71359 71367 21e04ca7088 RtlVirtualUnwind __crtCapturePreviousContext _GetEstablisherFrame 71359->71367 71361 21e04caa022 71368 21e04ca9fac UnhandledExceptionFilter IsDebuggerPresent _call_reportfault 71361->71368 71364->71339 71365->71341 71366->71339 71367->71361 71369 21e04ca393c 71370 21e04ca3958 71369->71370 71373 21e04ca395d 71369->71373 71383 21e04cae074 GetCurrentProcessId QueryPerformanceCounter __security_init_cookie _getptd_noexit 71370->71383 71372 21e04ca39e8 71374 21e04ca39b2 71372->71374 71385 21e04c74300 71372->71385 71373->71372 71373->71374 71384 21e04ca37dc 83 API calls 16 library calls 71373->71384 71379 21e04c74300 _DllMainCRTStartup 132 API calls 71380 21e04ca3a22 71379->71380 71389 21e04ca37dc 83 API calls 16 library calls 71380->71389 71382 21e04ca3a2f 71382->71374 71390 21e04ca37dc 83 API calls 16 library calls 71382->71390 71383->71373 71384->71372 71386 21e04c74323 71385->71386 71387 21e04c74321 71385->71387 71391 21e04c74340 71386->71391 71387->71379 71387->71382 71389->71382 71390->71374 71435 21e04c74750 71391->71435 71393 21e04c74374 _NMSG_WRITE 71394 21e04c74402 SHGetSpecialFolderPathW lstrcatW lstrcatW lstrcatW lstrcatW 71393->71394 71446 21e04c756e0 71394->71446 71396 21e04c7449a SafeRWList 71397 21e04c746af 71396->71397 71456 21e04c7acf0 49 API calls 4 library calls 71396->71456 71472 21e04c758c0 64 API calls 2 library calls 71397->71472 71400 21e04c744c7 71457 21e04c74a40 89 API calls 4 library calls 71400->71457 71401 21e04c746bc 71473 21e04c74700 64 API calls 2 library calls 71401->71473 71404 21e04c746ca collate 71406 21e04ca1440 _LDtento 4 API calls 71404->71406 71405 21e04c744dc std::runtime_error::runtime_error 71458 21e04c7b0a0 80 API calls 8 library calls 71405->71458 71408 21e04c746e8 71406->71408 71408->71387 71409 21e04c74505 wcstoxq 71459 21e04c7b0a0 80 API calls 8 library calls 71409->71459 71411 21e04c74527 71460 21e04c75540 49 API calls 4 library calls 71411->71460 71413 21e04c7453c 71461 21e04c74a40 89 API calls 4 library calls 71413->71461 71415 21e04c74552 std::runtime_error::runtime_error 71462 21e04c7b0a0 80 API calls 8 library calls 71415->71462 71417 21e04c7457b wcstoxq collate 71463 21e04c7b0a0 80 API calls 8 library calls 71417->71463 71419 21e04c745ab 71464 21e04c75540 49 API calls 4 library calls 71419->71464 71421 21e04c745bf 71465 21e04c74a40 89 API calls 4 library calls 71421->71465 71423 21e04c745d5 std::runtime_error::runtime_error 71466 21e04c7b0a0 80 API calls 8 library calls 71423->71466 71425 21e04c745fe wcstoxq collate 71467 21e04c7b0a0 80 API calls 8 library calls 71425->71467 71427 21e04c7462e 71468 21e04c75540 49 API calls 4 library calls 71427->71468 71429 21e04c74640 71469 21e04c74a40 89 API calls 4 library calls 71429->71469 71431 21e04c74656 std::runtime_error::runtime_error 71470 21e04c7b0a0 80 API calls 8 library calls 71431->71470 71433 21e04c7467f wcstoxq collate 71471 21e04c7b0a0 80 API calls 8 library calls 71433->71471 71436 21e04c74797 _NMSG_WRITE 71435->71436 71437 21e04c7479b 71436->71437 71438 21e04c747c7 71436->71438 71474 21e04c75540 49 API calls 4 library calls 71437->71474 71475 21e04c75540 49 API calls 4 library calls 71438->71475 71441 21e04ca1440 _LDtento 4 API calls 71442 21e04c74884 71441->71442 71442->71393 71443 21e04c747d6 _DllMainCRTStartup 71445 21e04c747af collate _DllMainCRTStartup 71443->71445 71476 21e04c75670 49 API calls _DllMainCRTStartup 71443->71476 71445->71441 71447 21e04c75710 Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot 71446->71447 71477 21e04c780d0 84 API calls 2 library calls 71447->71477 71449 21e04c7575a 71478 21e04c78550 54 API calls 2 library calls 71449->71478 71451 21e04c757b1 71479 21e04c785e0 118 API calls 3 library calls 71451->71479 71453 21e04c757d4 71454 21e04c75800 71453->71454 71480 21e04c75050 49 API calls 2 library calls 71453->71480 71454->71396 71456->71400 71457->71405 71458->71409 71459->71411 71460->71413 71461->71415 71462->71417 71463->71419 71464->71421 71465->71423 71466->71425 71467->71427 71468->71429 71469->71431 71470->71433 71471->71397 71472->71401 71473->71404 71474->71445 71475->71443 71476->71445 71477->71449 71478->71451 71479->71453 71480->71454 71481 21e04ca9cdc 71482 21e04ca9d07 __crtDownlevelLocaleNameToLCID 71481->71482 71483 21e04ca9d03 GetLocaleInfoEx 71481->71483 71485 21e04ca9d0c GetLocaleInfoW 71482->71485 71484 21e04ca9d1c 71483->71484 71485->71484 71248 21e04c74740 71251 21e04c74af0 VirtualAllocExNuma 71248->71251 71252 21e04c74749 71251->71252 71253 21e016b1600 71255 21e016b162c 71253->71255 71254 21e016b1792 RtlExitUserThread 71255->71254 71262 21e016e3ba0 71255->71262 71257 21e016b1717 71268 21e016c9830 71257->71268 71259 21e016b1735 71260 21e016db4e0 RtlFreeHeap 71259->71260 71261 21e016b173d 71260->71261 71261->71254 71263 21e016e3bd8 71262->71263 71264 21e016e3bc7 71262->71264 71266 21e016e3c87 71263->71266 71273 21e016e3cd0 RtlFreeHeap 71263->71273 71272 21e016e3cd0 RtlFreeHeap 71264->71272 71266->71257 71270 21e016c984d 71268->71270 71269 21e016c9886 71270->71269 71274 21e016cdfc0 71270->71274 71272->71263 71273->71266 71276 21e016cdff1 71274->71276 71275 21e016ce03d 71275->71269 71276->71275 71278 21e016db4e0 71276->71278 71279 21e016db523 71278->71279 71280 21e016db4f0 71278->71280 71279->71275 71280->71279 71281 21e016db511 RtlFreeHeap 71280->71281 71281->71279 71486 21e016b71b0 71487 21e016b71c6 71486->71487 71494 21e016b2950 71487->71494 71489 21e016b71f5 71511 21e016e4360 71489->71511 71493 21e016b732d 71519 21e016c16a0 71494->71519 71496 21e016b2959 71691 21e016c01a0 71496->71691 71498 21e016b2963 71499 21e016c0f99 71498->71499 71895 21e016bcce0 71498->71895 71499->71489 71502 21e016bcce0 LdrGetProcedureAddress 71503 21e016c0f13 71502->71503 71504 21e016bcce0 LdrGetProcedureAddress 71503->71504 71505 21e016c0f3c 71504->71505 71506 21e016bcce0 LdrGetProcedureAddress 71505->71506 71507 21e016c0f5b 71506->71507 71508 21e016bcce0 LdrGetProcedureAddress 71507->71508 71509 21e016c0f7a 71508->71509 71510 21e016bcce0 LdrGetProcedureAddress 71509->71510 71510->71499 71513 21e016e43bd 71511->71513 71512 21e016b730e 71515 21e016e4ff0 71512->71515 71513->71512 71514 21e016e444e NtCreateThreadEx 71513->71514 71514->71512 71517 21e016e5011 71515->71517 71516 21e016e506c 71516->71493 71517->71516 71518 21e016e506a NtQueueApcThread 71517->71518 71518->71516 71520 21e016c16a9 71519->71520 71521 21e016c21e1 71520->71521 71522 21e016bcce0 LdrGetProcedureAddress 71520->71522 71521->71496 71523 21e016c16c8 71522->71523 71524 21e016bcce0 LdrGetProcedureAddress 71523->71524 71525 21e016c16e0 71524->71525 71526 21e016bcce0 LdrGetProcedureAddress 71525->71526 71527 21e016c16f8 71526->71527 71528 21e016bcce0 LdrGetProcedureAddress 71527->71528 71529 21e016c1710 71528->71529 71530 21e016bcce0 LdrGetProcedureAddress 71529->71530 71531 21e016c1728 71530->71531 71532 21e016bcce0 LdrGetProcedureAddress 71531->71532 71533 21e016c1740 71532->71533 71534 21e016bcce0 LdrGetProcedureAddress 71533->71534 71535 21e016c1758 71534->71535 71536 21e016bcce0 LdrGetProcedureAddress 71535->71536 71537 21e016c1770 71536->71537 71538 21e016bcce0 LdrGetProcedureAddress 71537->71538 71539 21e016c1788 71538->71539 71540 21e016bcce0 LdrGetProcedureAddress 71539->71540 71541 21e016c17a0 71540->71541 71542 21e016bcce0 LdrGetProcedureAddress 71541->71542 71543 21e016c17b8 71542->71543 71544 21e016bcce0 LdrGetProcedureAddress 71543->71544 71545 21e016c17d0 71544->71545 71546 21e016bcce0 LdrGetProcedureAddress 71545->71546 71547 21e016c17e8 71546->71547 71548 21e016bcce0 LdrGetProcedureAddress 71547->71548 71549 21e016c1800 71548->71549 71550 21e016bcce0 LdrGetProcedureAddress 71549->71550 71551 21e016c1818 71550->71551 71552 21e016bcce0 LdrGetProcedureAddress 71551->71552 71553 21e016c1830 71552->71553 71554 21e016bcce0 LdrGetProcedureAddress 71553->71554 71555 21e016c1848 71554->71555 71556 21e016bcce0 LdrGetProcedureAddress 71555->71556 71557 21e016c1860 71556->71557 71558 21e016bcce0 LdrGetProcedureAddress 71557->71558 71559 21e016c1878 71558->71559 71560 21e016bcce0 LdrGetProcedureAddress 71559->71560 71561 21e016c1890 71560->71561 71562 21e016bcce0 LdrGetProcedureAddress 71561->71562 71563 21e016c18a8 71562->71563 71564 21e016bcce0 LdrGetProcedureAddress 71563->71564 71565 21e016c18c0 71564->71565 71566 21e016bcce0 LdrGetProcedureAddress 71565->71566 71567 21e016c18d8 71566->71567 71568 21e016bcce0 LdrGetProcedureAddress 71567->71568 71569 21e016c18f0 71568->71569 71570 21e016bcce0 LdrGetProcedureAddress 71569->71570 71571 21e016c1908 71570->71571 71572 21e016bcce0 LdrGetProcedureAddress 71571->71572 71573 21e016c1920 71572->71573 71574 21e016bcce0 LdrGetProcedureAddress 71573->71574 71575 21e016c1938 71574->71575 71576 21e016bcce0 LdrGetProcedureAddress 71575->71576 71577 21e016c1950 71576->71577 71578 21e016bcce0 LdrGetProcedureAddress 71577->71578 71579 21e016c1968 71578->71579 71580 21e016bcce0 LdrGetProcedureAddress 71579->71580 71581 21e016c1980 71580->71581 71582 21e016bcce0 LdrGetProcedureAddress 71581->71582 71583 21e016c1998 71582->71583 71584 21e016bcce0 LdrGetProcedureAddress 71583->71584 71585 21e016c19b0 71584->71585 71586 21e016bcce0 LdrGetProcedureAddress 71585->71586 71587 21e016c19c8 71586->71587 71588 21e016bcce0 LdrGetProcedureAddress 71587->71588 71589 21e016c19e0 71588->71589 71590 21e016bcce0 LdrGetProcedureAddress 71589->71590 71591 21e016c19f8 71590->71591 71592 21e016bcce0 LdrGetProcedureAddress 71591->71592 71593 21e016c1a10 71592->71593 71594 21e016bcce0 LdrGetProcedureAddress 71593->71594 71595 21e016c1a28 71594->71595 71596 21e016bcce0 LdrGetProcedureAddress 71595->71596 71597 21e016c1a40 71596->71597 71598 21e016bcce0 LdrGetProcedureAddress 71597->71598 71599 21e016c1a58 71598->71599 71600 21e016bcce0 LdrGetProcedureAddress 71599->71600 71601 21e016c1a70 71600->71601 71602 21e016bcce0 LdrGetProcedureAddress 71601->71602 71603 21e016c1a88 71602->71603 71604 21e016bcce0 LdrGetProcedureAddress 71603->71604 71605 21e016c1aa0 71604->71605 71606 21e016bcce0 LdrGetProcedureAddress 71605->71606 71607 21e016c1ab8 71606->71607 71608 21e016bcce0 LdrGetProcedureAddress 71607->71608 71609 21e016c1ad0 71608->71609 71610 21e016bcce0 LdrGetProcedureAddress 71609->71610 71611 21e016c1ae8 71610->71611 71612 21e016bcce0 LdrGetProcedureAddress 71611->71612 71613 21e016c1b00 71612->71613 71614 21e016bcce0 LdrGetProcedureAddress 71613->71614 71615 21e016c1b18 71614->71615 71616 21e016bcce0 LdrGetProcedureAddress 71615->71616 71617 21e016c1b30 71616->71617 71618 21e016bcce0 LdrGetProcedureAddress 71617->71618 71619 21e016c1b48 71618->71619 71620 21e016bcce0 LdrGetProcedureAddress 71619->71620 71621 21e016c1b60 71620->71621 71622 21e016bcce0 LdrGetProcedureAddress 71621->71622 71623 21e016c1b78 71622->71623 71624 21e016bcce0 LdrGetProcedureAddress 71623->71624 71625 21e016c1b90 71624->71625 71626 21e016bcce0 LdrGetProcedureAddress 71625->71626 71627 21e016c1bc1 71626->71627 71628 21e016bcce0 LdrGetProcedureAddress 71627->71628 71629 21e016c1bf2 71628->71629 71630 21e016bcce0 LdrGetProcedureAddress 71629->71630 71631 21e016c1c23 71630->71631 71632 21e016bcce0 LdrGetProcedureAddress 71631->71632 71633 21e016c1c54 71632->71633 71634 21e016bcce0 LdrGetProcedureAddress 71633->71634 71635 21e016c1c85 71634->71635 71636 21e016bcce0 LdrGetProcedureAddress 71635->71636 71637 21e016c1cb6 71636->71637 71638 21e016bcce0 LdrGetProcedureAddress 71637->71638 71639 21e016c1ce7 71638->71639 71640 21e016bcce0 LdrGetProcedureAddress 71639->71640 71641 21e016c1d18 71640->71641 71642 21e016bcce0 LdrGetProcedureAddress 71641->71642 71643 21e016c1d49 71642->71643 71644 21e016bcce0 LdrGetProcedureAddress 71643->71644 71645 21e016c1d7a 71644->71645 71646 21e016bcce0 LdrGetProcedureAddress 71645->71646 71647 21e016c1dab 71646->71647 71648 21e016bcce0 LdrGetProcedureAddress 71647->71648 71649 21e016c1ddc 71648->71649 71650 21e016bcce0 LdrGetProcedureAddress 71649->71650 71651 21e016c1e0d 71650->71651 71652 21e016bcce0 LdrGetProcedureAddress 71651->71652 71653 21e016c1e3e 71652->71653 71654 21e016bcce0 LdrGetProcedureAddress 71653->71654 71655 21e016c1e6f 71654->71655 71656 21e016bcce0 LdrGetProcedureAddress 71655->71656 71657 21e016c1ea0 71656->71657 71658 21e016bcce0 LdrGetProcedureAddress 71657->71658 71659 21e016c1ed1 71658->71659 71660 21e016bcce0 LdrGetProcedureAddress 71659->71660 71661 21e016c1f02 71660->71661 71662 21e016bcce0 LdrGetProcedureAddress 71661->71662 71663 21e016c1f33 71662->71663 71664 21e016bcce0 LdrGetProcedureAddress 71663->71664 71665 21e016c1f64 71664->71665 71666 21e016bcce0 LdrGetProcedureAddress 71665->71666 71667 21e016c1f95 71666->71667 71668 21e016bcce0 LdrGetProcedureAddress 71667->71668 71669 21e016c1fc6 71668->71669 71670 21e016bcce0 LdrGetProcedureAddress 71669->71670 71671 21e016c1ff7 71670->71671 71672 21e016bcce0 LdrGetProcedureAddress 71671->71672 71673 21e016c2028 71672->71673 71674 21e016bcce0 LdrGetProcedureAddress 71673->71674 71675 21e016c2059 71674->71675 71676 21e016bcce0 LdrGetProcedureAddress 71675->71676 71677 21e016c208a 71676->71677 71678 21e016bcce0 LdrGetProcedureAddress 71677->71678 71679 21e016c20bb 71678->71679 71680 21e016bcce0 LdrGetProcedureAddress 71679->71680 71681 21e016c20ec 71680->71681 71682 21e016bcce0 LdrGetProcedureAddress 71681->71682 71683 21e016c211d 71682->71683 71684 21e016bcce0 LdrGetProcedureAddress 71683->71684 71685 21e016c214e 71684->71685 71686 21e016bcce0 LdrGetProcedureAddress 71685->71686 71687 21e016c217f 71686->71687 71688 21e016bcce0 LdrGetProcedureAddress 71687->71688 71689 21e016c21b0 71688->71689 71690 21e016bcce0 LdrGetProcedureAddress 71689->71690 71690->71521 71692 21e016c01ce 71691->71692 71693 21e016bcce0 LdrGetProcedureAddress 71692->71693 71894 21e016c0e4a 71692->71894 71694 21e016c0228 71693->71694 71695 21e016bcce0 LdrGetProcedureAddress 71694->71695 71696 21e016c0243 71695->71696 71697 21e016bcce0 LdrGetProcedureAddress 71696->71697 71698 21e016c026c 71697->71698 71699 21e016bcce0 LdrGetProcedureAddress 71698->71699 71700 21e016c028b 71699->71700 71701 21e016bcce0 LdrGetProcedureAddress 71700->71701 71702 21e016c02aa 71701->71702 71703 21e016bcce0 LdrGetProcedureAddress 71702->71703 71704 21e016c02c9 71703->71704 71705 21e016bcce0 LdrGetProcedureAddress 71704->71705 71706 21e016c02e8 71705->71706 71707 21e016bcce0 LdrGetProcedureAddress 71706->71707 71708 21e016c0307 71707->71708 71709 21e016bcce0 LdrGetProcedureAddress 71708->71709 71710 21e016c0326 71709->71710 71711 21e016bcce0 LdrGetProcedureAddress 71710->71711 71712 21e016c0345 71711->71712 71713 21e016bcce0 LdrGetProcedureAddress 71712->71713 71714 21e016c0364 71713->71714 71715 21e016bcce0 LdrGetProcedureAddress 71714->71715 71716 21e016c0383 71715->71716 71717 21e016bcce0 LdrGetProcedureAddress 71716->71717 71718 21e016c03a2 71717->71718 71719 21e016bcce0 LdrGetProcedureAddress 71718->71719 71720 21e016c03c1 71719->71720 71721 21e016bcce0 LdrGetProcedureAddress 71720->71721 71722 21e016c03e0 71721->71722 71723 21e016bcce0 LdrGetProcedureAddress 71722->71723 71724 21e016c03ff 71723->71724 71725 21e016bcce0 LdrGetProcedureAddress 71724->71725 71726 21e016c041e 71725->71726 71727 21e016bcce0 LdrGetProcedureAddress 71726->71727 71728 21e016c043d 71727->71728 71729 21e016bcce0 LdrGetProcedureAddress 71728->71729 71730 21e016c045c 71729->71730 71731 21e016bcce0 LdrGetProcedureAddress 71730->71731 71732 21e016c047b 71731->71732 71733 21e016bcce0 LdrGetProcedureAddress 71732->71733 71734 21e016c049a 71733->71734 71735 21e016bcce0 LdrGetProcedureAddress 71734->71735 71736 21e016c04b9 71735->71736 71737 21e016bcce0 LdrGetProcedureAddress 71736->71737 71738 21e016c04d8 71737->71738 71739 21e016bcce0 LdrGetProcedureAddress 71738->71739 71740 21e016c04f7 71739->71740 71741 21e016bcce0 LdrGetProcedureAddress 71740->71741 71742 21e016c0516 71741->71742 71743 21e016bcce0 LdrGetProcedureAddress 71742->71743 71744 21e016c0535 71743->71744 71745 21e016bcce0 LdrGetProcedureAddress 71744->71745 71746 21e016c0554 71745->71746 71747 21e016bcce0 LdrGetProcedureAddress 71746->71747 71748 21e016c0573 71747->71748 71749 21e016bcce0 LdrGetProcedureAddress 71748->71749 71750 21e016c0592 71749->71750 71751 21e016bcce0 LdrGetProcedureAddress 71750->71751 71752 21e016c05b1 71751->71752 71753 21e016bcce0 LdrGetProcedureAddress 71752->71753 71754 21e016c05d0 71753->71754 71755 21e016bcce0 LdrGetProcedureAddress 71754->71755 71756 21e016c05ef 71755->71756 71757 21e016bcce0 LdrGetProcedureAddress 71756->71757 71758 21e016c060e 71757->71758 71759 21e016bcce0 LdrGetProcedureAddress 71758->71759 71760 21e016c062d 71759->71760 71761 21e016bcce0 LdrGetProcedureAddress 71760->71761 71762 21e016c064c 71761->71762 71763 21e016bcce0 LdrGetProcedureAddress 71762->71763 71764 21e016c066b 71763->71764 71765 21e016bcce0 LdrGetProcedureAddress 71764->71765 71766 21e016c068a 71765->71766 71767 21e016bcce0 LdrGetProcedureAddress 71766->71767 71768 21e016c06a9 71767->71768 71769 21e016bcce0 LdrGetProcedureAddress 71768->71769 71770 21e016c06c8 71769->71770 71771 21e016bcce0 LdrGetProcedureAddress 71770->71771 71772 21e016c06e7 71771->71772 71773 21e016bcce0 LdrGetProcedureAddress 71772->71773 71774 21e016c0706 71773->71774 71775 21e016bcce0 LdrGetProcedureAddress 71774->71775 71776 21e016c0725 71775->71776 71777 21e016bcce0 LdrGetProcedureAddress 71776->71777 71778 21e016c0744 71777->71778 71779 21e016bcce0 LdrGetProcedureAddress 71778->71779 71780 21e016c0763 71779->71780 71781 21e016bcce0 LdrGetProcedureAddress 71780->71781 71782 21e016c0782 71781->71782 71783 21e016bcce0 LdrGetProcedureAddress 71782->71783 71784 21e016c07a1 71783->71784 71785 21e016bcce0 LdrGetProcedureAddress 71784->71785 71786 21e016c07c0 71785->71786 71787 21e016bcce0 LdrGetProcedureAddress 71786->71787 71788 21e016c07df 71787->71788 71789 21e016bcce0 LdrGetProcedureAddress 71788->71789 71790 21e016c07fe 71789->71790 71791 21e016bcce0 LdrGetProcedureAddress 71790->71791 71792 21e016c081d 71791->71792 71793 21e016bcce0 LdrGetProcedureAddress 71792->71793 71794 21e016c083c 71793->71794 71795 21e016bcce0 LdrGetProcedureAddress 71794->71795 71796 21e016c085b 71795->71796 71797 21e016bcce0 LdrGetProcedureAddress 71796->71797 71798 21e016c087a 71797->71798 71799 21e016bcce0 LdrGetProcedureAddress 71798->71799 71800 21e016c0899 71799->71800 71801 21e016bcce0 LdrGetProcedureAddress 71800->71801 71802 21e016c08b8 71801->71802 71803 21e016bcce0 LdrGetProcedureAddress 71802->71803 71804 21e016c08d7 71803->71804 71805 21e016bcce0 LdrGetProcedureAddress 71804->71805 71806 21e016c08f6 71805->71806 71807 21e016bcce0 LdrGetProcedureAddress 71806->71807 71808 21e016c0915 71807->71808 71809 21e016bcce0 LdrGetProcedureAddress 71808->71809 71810 21e016c0934 71809->71810 71811 21e016bcce0 LdrGetProcedureAddress 71810->71811 71812 21e016c0953 71811->71812 71813 21e016bcce0 LdrGetProcedureAddress 71812->71813 71814 21e016c0972 71813->71814 71815 21e016bcce0 LdrGetProcedureAddress 71814->71815 71816 21e016c0991 71815->71816 71817 21e016bcce0 LdrGetProcedureAddress 71816->71817 71818 21e016c09b0 71817->71818 71819 21e016bcce0 LdrGetProcedureAddress 71818->71819 71820 21e016c09cf 71819->71820 71821 21e016bcce0 LdrGetProcedureAddress 71820->71821 71822 21e016c09ee 71821->71822 71823 21e016bcce0 LdrGetProcedureAddress 71822->71823 71824 21e016c0a0d 71823->71824 71825 21e016bcce0 LdrGetProcedureAddress 71824->71825 71826 21e016c0a2c 71825->71826 71827 21e016bcce0 LdrGetProcedureAddress 71826->71827 71828 21e016c0a4b 71827->71828 71829 21e016bcce0 LdrGetProcedureAddress 71828->71829 71830 21e016c0a6a 71829->71830 71831 21e016bcce0 LdrGetProcedureAddress 71830->71831 71832 21e016c0a89 71831->71832 71833 21e016bcce0 LdrGetProcedureAddress 71832->71833 71834 21e016c0aa8 71833->71834 71835 21e016bcce0 LdrGetProcedureAddress 71834->71835 71836 21e016c0ac7 71835->71836 71837 21e016bcce0 LdrGetProcedureAddress 71836->71837 71838 21e016c0ae6 71837->71838 71839 21e016bcce0 LdrGetProcedureAddress 71838->71839 71840 21e016c0b05 71839->71840 71841 21e016bcce0 LdrGetProcedureAddress 71840->71841 71842 21e016c0b24 71841->71842 71843 21e016bcce0 LdrGetProcedureAddress 71842->71843 71844 21e016c0b43 71843->71844 71845 21e016bcce0 LdrGetProcedureAddress 71844->71845 71846 21e016c0b62 71845->71846 71847 21e016bcce0 LdrGetProcedureAddress 71846->71847 71848 21e016c0b81 71847->71848 71849 21e016bcce0 LdrGetProcedureAddress 71848->71849 71850 21e016c0ba0 71849->71850 71851 21e016bcce0 LdrGetProcedureAddress 71850->71851 71852 21e016c0bbf 71851->71852 71853 21e016bcce0 LdrGetProcedureAddress 71852->71853 71854 21e016c0bde 71853->71854 71855 21e016bcce0 LdrGetProcedureAddress 71854->71855 71856 21e016c0bfd 71855->71856 71857 21e016bcce0 LdrGetProcedureAddress 71856->71857 71858 21e016c0c1c 71857->71858 71859 21e016bcce0 LdrGetProcedureAddress 71858->71859 71860 21e016c0c3b 71859->71860 71861 21e016bcce0 LdrGetProcedureAddress 71860->71861 71862 21e016c0c5a 71861->71862 71863 21e016bcce0 LdrGetProcedureAddress 71862->71863 71864 21e016c0c79 71863->71864 71865 21e016bcce0 LdrGetProcedureAddress 71864->71865 71866 21e016c0c98 71865->71866 71867 21e016bcce0 LdrGetProcedureAddress 71866->71867 71868 21e016c0cb7 71867->71868 71869 21e016bcce0 LdrGetProcedureAddress 71868->71869 71870 21e016c0cd6 71869->71870 71871 21e016bcce0 LdrGetProcedureAddress 71870->71871 71872 21e016c0cf5 71871->71872 71873 21e016bcce0 LdrGetProcedureAddress 71872->71873 71874 21e016c0d14 71873->71874 71875 21e016bcce0 LdrGetProcedureAddress 71874->71875 71876 21e016c0d33 71875->71876 71877 21e016bcce0 LdrGetProcedureAddress 71876->71877 71878 21e016c0d52 71877->71878 71879 21e016bcce0 LdrGetProcedureAddress 71878->71879 71880 21e016c0d71 71879->71880 71881 21e016bcce0 LdrGetProcedureAddress 71880->71881 71882 21e016c0d90 71881->71882 71883 21e016bcce0 LdrGetProcedureAddress 71882->71883 71884 21e016c0daf 71883->71884 71885 21e016bcce0 LdrGetProcedureAddress 71884->71885 71886 21e016c0dce 71885->71886 71887 21e016bcce0 LdrGetProcedureAddress 71886->71887 71888 21e016c0ded 71887->71888 71889 21e016bcce0 LdrGetProcedureAddress 71888->71889 71890 21e016c0e0c 71889->71890 71891 21e016bcce0 LdrGetProcedureAddress 71890->71891 71892 21e016c0e2b 71891->71892 71893 21e016bcce0 LdrGetProcedureAddress 71892->71893 71893->71894 71894->71498 71897 21e016bcd1b 71895->71897 71896 21e016bcdbf 71896->71502 71897->71896 71898 21e016bcd9b LdrGetProcedureAddress 71897->71898 71898->71896 71899 21e02f20009 71902 21e02f20024 71899->71902 71903 21e02f2008a 71902->71903 71904 21e02f2015e VirtualAlloc 71903->71904 71906 21e02f2001d 71904->71906 71907 21e02f20194 71904->71907 71905 21e02f20346 LoadLibraryA 71905->71906 71905->71907 71907->71905 71907->71906 71908 21e016b7bf0 71909 21e016b7c06 71908->71909 71924 21e016b2930 71909->71924 71911 21e016b7c24 72063 21e016b8ed0 71911->72063 71913 21e016b7d64 72096 21e016b7f70 71913->72096 71915 21e016b7d8c 72237 21e016d4d00 GetUserNameW GetComputerNameExW 71915->72237 71917 21e016b7f54 71918 21e016b7da4 71918->71917 72269 21e016e4740 71918->72269 71921 21e016c4700 RtlFreeHeap 71923 21e016b7e3b 71921->71923 71923->71917 71923->71921 72273 21e016c3d90 9 API calls 71923->72273 72274 21e016b8bc0 71923->72274 72323 21e016bffe0 71924->72323 71930 21e016b2943 71931 21e016bcce0 LdrGetProcedureAddress 71930->71931 72062 21e016bf5f5 71930->72062 71932 21e016bee10 71931->71932 71933 21e016bcce0 LdrGetProcedureAddress 71932->71933 71934 21e016bee2b 71933->71934 71935 21e016bcce0 LdrGetProcedureAddress 71934->71935 71936 21e016bee54 71935->71936 71937 21e016bcce0 LdrGetProcedureAddress 71936->71937 71938 21e016bee73 71937->71938 71939 21e016bcce0 LdrGetProcedureAddress 71938->71939 71940 21e016bee92 71939->71940 71941 21e016bcce0 LdrGetProcedureAddress 71940->71941 71942 21e016beeb1 71941->71942 71943 21e016bcce0 LdrGetProcedureAddress 71942->71943 71944 21e016beed0 71943->71944 71945 21e016bcce0 LdrGetProcedureAddress 71944->71945 71946 21e016beeef 71945->71946 71947 21e016bcce0 LdrGetProcedureAddress 71946->71947 71948 21e016bef0e 71947->71948 71949 21e016bcce0 LdrGetProcedureAddress 71948->71949 71950 21e016bef2d 71949->71950 71951 21e016bcce0 LdrGetProcedureAddress 71950->71951 71952 21e016bef4c 71951->71952 71953 21e016bcce0 LdrGetProcedureAddress 71952->71953 71954 21e016bef6b 71953->71954 71955 21e016bcce0 LdrGetProcedureAddress 71954->71955 71956 21e016bef8a 71955->71956 71957 21e016bcce0 LdrGetProcedureAddress 71956->71957 71958 21e016befa9 71957->71958 71959 21e016bcce0 LdrGetProcedureAddress 71958->71959 71960 21e016befc8 71959->71960 71961 21e016bcce0 LdrGetProcedureAddress 71960->71961 71962 21e016befe7 71961->71962 71963 21e016bcce0 LdrGetProcedureAddress 71962->71963 71964 21e016bf006 71963->71964 71965 21e016bcce0 LdrGetProcedureAddress 71964->71965 71966 21e016bf025 71965->71966 71967 21e016bcce0 LdrGetProcedureAddress 71966->71967 71968 21e016bf044 71967->71968 71969 21e016bcce0 LdrGetProcedureAddress 71968->71969 71970 21e016bf063 71969->71970 71971 21e016bcce0 LdrGetProcedureAddress 71970->71971 71972 21e016bf082 71971->71972 71973 21e016bcce0 LdrGetProcedureAddress 71972->71973 71974 21e016bf0a1 71973->71974 71975 21e016bcce0 LdrGetProcedureAddress 71974->71975 71976 21e016bf0c0 71975->71976 71977 21e016bcce0 LdrGetProcedureAddress 71976->71977 71978 21e016bf0df 71977->71978 71979 21e016bcce0 LdrGetProcedureAddress 71978->71979 71980 21e016bf0fe 71979->71980 71981 21e016bcce0 LdrGetProcedureAddress 71980->71981 71982 21e016bf11d 71981->71982 71983 21e016bcce0 LdrGetProcedureAddress 71982->71983 71984 21e016bf13c 71983->71984 71985 21e016bcce0 LdrGetProcedureAddress 71984->71985 71986 21e016bf15b 71985->71986 71987 21e016bcce0 LdrGetProcedureAddress 71986->71987 71988 21e016bf17a 71987->71988 71989 21e016bcce0 LdrGetProcedureAddress 71988->71989 71990 21e016bf199 71989->71990 71991 21e016bcce0 LdrGetProcedureAddress 71990->71991 71992 21e016bf1b8 71991->71992 71993 21e016bcce0 LdrGetProcedureAddress 71992->71993 71994 21e016bf1d7 71993->71994 71995 21e016bcce0 LdrGetProcedureAddress 71994->71995 71996 21e016bf1f6 71995->71996 71997 21e016bcce0 LdrGetProcedureAddress 71996->71997 71998 21e016bf215 71997->71998 71999 21e016bcce0 LdrGetProcedureAddress 71998->71999 72000 21e016bf234 71999->72000 72001 21e016bcce0 LdrGetProcedureAddress 72000->72001 72002 21e016bf253 72001->72002 72003 21e016bcce0 LdrGetProcedureAddress 72002->72003 72004 21e016bf272 72003->72004 72005 21e016bcce0 LdrGetProcedureAddress 72004->72005 72006 21e016bf291 72005->72006 72007 21e016bcce0 LdrGetProcedureAddress 72006->72007 72008 21e016bf2b0 72007->72008 72009 21e016bcce0 LdrGetProcedureAddress 72008->72009 72010 21e016bf2cf 72009->72010 72011 21e016bcce0 LdrGetProcedureAddress 72010->72011 72012 21e016bf2ee 72011->72012 72013 21e016bcce0 LdrGetProcedureAddress 72012->72013 72014 21e016bf30d 72013->72014 72015 21e016bcce0 LdrGetProcedureAddress 72014->72015 72016 21e016bf32c 72015->72016 72017 21e016bcce0 LdrGetProcedureAddress 72016->72017 72018 21e016bf34b 72017->72018 72019 21e016bcce0 LdrGetProcedureAddress 72018->72019 72020 21e016bf36a 72019->72020 72021 21e016bcce0 LdrGetProcedureAddress 72020->72021 72022 21e016bf389 72021->72022 72023 21e016bcce0 LdrGetProcedureAddress 72022->72023 72024 21e016bf3a8 72023->72024 72025 21e016bcce0 LdrGetProcedureAddress 72024->72025 72026 21e016bf3c7 72025->72026 72027 21e016bcce0 LdrGetProcedureAddress 72026->72027 72028 21e016bf3e6 72027->72028 72029 21e016bcce0 LdrGetProcedureAddress 72028->72029 72030 21e016bf405 72029->72030 72031 21e016bcce0 LdrGetProcedureAddress 72030->72031 72032 21e016bf424 72031->72032 72033 21e016bcce0 LdrGetProcedureAddress 72032->72033 72034 21e016bf443 72033->72034 72035 21e016bcce0 LdrGetProcedureAddress 72034->72035 72036 21e016bf462 72035->72036 72037 21e016bcce0 LdrGetProcedureAddress 72036->72037 72038 21e016bf481 72037->72038 72039 21e016bcce0 LdrGetProcedureAddress 72038->72039 72040 21e016bf4a0 72039->72040 72041 21e016bcce0 LdrGetProcedureAddress 72040->72041 72042 21e016bf4bf 72041->72042 72043 21e016bcce0 LdrGetProcedureAddress 72042->72043 72044 21e016bf4de 72043->72044 72045 21e016bcce0 LdrGetProcedureAddress 72044->72045 72046 21e016bf4fd 72045->72046 72047 21e016bcce0 LdrGetProcedureAddress 72046->72047 72048 21e016bf51c 72047->72048 72049 21e016bcce0 LdrGetProcedureAddress 72048->72049 72050 21e016bf53b 72049->72050 72051 21e016bcce0 LdrGetProcedureAddress 72050->72051 72052 21e016bf55a 72051->72052 72053 21e016bcce0 LdrGetProcedureAddress 72052->72053 72054 21e016bf579 72053->72054 72055 21e016bcce0 LdrGetProcedureAddress 72054->72055 72056 21e016bf598 72055->72056 72057 21e016bcce0 LdrGetProcedureAddress 72056->72057 72058 21e016bf5b7 72057->72058 72059 21e016bcce0 LdrGetProcedureAddress 72058->72059 72060 21e016bf5d6 72059->72060 72061 21e016bcce0 LdrGetProcedureAddress 72060->72061 72061->72062 72062->71911 72395 21e016d4ce0 72063->72395 72068 21e016e3de0 RtlFreeHeap 72069 21e016b90af 72068->72069 72070 21e016e3de0 RtlFreeHeap 72069->72070 72071 21e016b9110 72070->72071 72072 21e016e3de0 RtlFreeHeap 72071->72072 72073 21e016b916c 72072->72073 72074 21e016e3de0 RtlFreeHeap 72073->72074 72075 21e016b91a1 72074->72075 72076 21e016e3de0 RtlFreeHeap 72075->72076 72077 21e016b91f1 72076->72077 72078 21e016e3de0 RtlFreeHeap 72077->72078 72079 21e016b9222 72078->72079 72080 21e016e3de0 RtlFreeHeap 72079->72080 72081 21e016b925a 72080->72081 72082 21e016e3de0 RtlFreeHeap 72081->72082 72083 21e016b92af 72082->72083 72084 21e016e3de0 RtlFreeHeap 72083->72084 72085 21e016b92f1 72084->72085 72086 21e016e3de0 RtlFreeHeap 72085->72086 72087 21e016b9333 72086->72087 72088 21e016e3de0 RtlFreeHeap 72087->72088 72089 21e016b9347 72088->72089 72090 21e016e3de0 RtlFreeHeap 72089->72090 72091 21e016b9362 72090->72091 72092 21e016e3de0 RtlFreeHeap 72091->72092 72093 21e016b938e 72092->72093 72094 21e016e3de0 RtlFreeHeap 72093->72094 72095 21e016b93c1 72094->72095 72095->71913 72097 21e016b7f99 72096->72097 72098 21e016b7fb8 72096->72098 72099 21e016e3de0 RtlFreeHeap 72097->72099 72100 21e016b7fda 72098->72100 72101 21e016e3de0 RtlFreeHeap 72098->72101 72099->72098 72401 21e016d5560 72100->72401 72101->72100 72104 21e016d5560 RtlFreeHeap 72109 21e016b8066 72104->72109 72106 21e016b802a 72106->72104 72107 21e016b8088 72108 21e016d5560 RtlFreeHeap 72107->72108 72113 21e016b809c 72108->72113 72109->72107 72110 21e016db4e0 RtlFreeHeap 72109->72110 72110->72107 72111 21e016b80be 72112 21e016d5560 RtlFreeHeap 72111->72112 72117 21e016b80d2 72112->72117 72113->72111 72114 21e016db4e0 RtlFreeHeap 72113->72114 72114->72111 72115 21e016b80f4 72116 21e016d5560 RtlFreeHeap 72115->72116 72121 21e016b8108 72116->72121 72117->72115 72118 21e016db4e0 RtlFreeHeap 72117->72118 72118->72115 72119 21e016b812a 72120 21e016d5560 RtlFreeHeap 72119->72120 72125 21e016b813e 72120->72125 72121->72119 72123 21e016db4e0 RtlFreeHeap 72121->72123 72122 21e016b8160 72124 21e016d5560 RtlFreeHeap 72122->72124 72123->72119 72129 21e016b8174 72124->72129 72125->72122 72126 21e016db4e0 RtlFreeHeap 72125->72126 72126->72122 72127 21e016b8197 72128 21e016d5560 RtlFreeHeap 72127->72128 72133 21e016b81ab 72128->72133 72129->72127 72131 21e016db4e0 RtlFreeHeap 72129->72131 72130 21e016b81d4 72132 21e016d5560 RtlFreeHeap 72130->72132 72131->72127 72134 21e016b81e8 72132->72134 72133->72130 72135 21e016db4e0 RtlFreeHeap 72133->72135 72136 21e016b823d 72134->72136 72406 21e016cbe20 RtlFreeHeap 72134->72406 72135->72130 72137 21e016d5560 RtlFreeHeap 72136->72137 72159 21e016b8251 72137->72159 72139 21e016b8214 72143 21e016db4e0 RtlFreeHeap 72139->72143 72140 21e016b838a 72141 21e016d5560 RtlFreeHeap 72140->72141 72142 21e016b839e 72141->72142 72144 21e016d5560 RtlFreeHeap 72142->72144 72145 21e016b8235 72143->72145 72149 21e016b83ba 72144->72149 72146 21e016db4e0 RtlFreeHeap 72145->72146 72146->72136 72147 21e016b8430 72148 21e016d5560 RtlFreeHeap 72147->72148 72150 21e016b8444 72148->72150 72149->72147 72165 21e016db4e0 RtlFreeHeap 72149->72165 72225 21e016b8b86 72149->72225 72151 21e016b846d 72150->72151 72411 21e016cbe20 RtlFreeHeap 72150->72411 72158 21e016d5560 RtlFreeHeap 72151->72158 72152 21e016b835d 72156 21e016db4e0 RtlFreeHeap 72152->72156 72153 21e016b8322 72153->72152 72163 21e016ba050 RtlFreeHeap 72153->72163 72160 21e016b837d 72156->72160 72157 21e016b8460 72162 21e016db4e0 RtlFreeHeap 72157->72162 72164 21e016b848e 72158->72164 72159->72140 72159->72153 72407 21e016ba050 72159->72407 72161 21e016db4e0 RtlFreeHeap 72160->72161 72161->72140 72162->72151 72163->72152 72167 21e016b84b7 72164->72167 72412 21e016cbe20 RtlFreeHeap 72164->72412 72166 21e016b8423 72165->72166 72168 21e016db4e0 RtlFreeHeap 72166->72168 72171 21e016d5560 RtlFreeHeap 72167->72171 72168->72147 72170 21e016b84aa 72172 21e016db4e0 RtlFreeHeap 72170->72172 72173 21e016b84d8 72171->72173 72172->72167 72174 21e016b8501 72173->72174 72413 21e016cbe20 RtlFreeHeap 72173->72413 72177 21e016d5560 RtlFreeHeap 72174->72177 72176 21e016b84f4 72178 21e016db4e0 RtlFreeHeap 72176->72178 72179 21e016b8522 72177->72179 72178->72174 72180 21e016b854b 72179->72180 72414 21e016cbe20 RtlFreeHeap 72179->72414 72183 21e016d5560 RtlFreeHeap 72180->72183 72182 21e016b853e 72184 21e016db4e0 RtlFreeHeap 72182->72184 72185 21e016b856c 72183->72185 72184->72180 72186 21e016b8595 72185->72186 72415 21e016cbe20 RtlFreeHeap 72185->72415 72188 21e016d5560 RtlFreeHeap 72186->72188 72190 21e016b85b6 72188->72190 72189 21e016b8588 72191 21e016db4e0 RtlFreeHeap 72189->72191 72192 21e016d5560 RtlFreeHeap 72190->72192 72191->72186 72193 21e016b85d2 72192->72193 72194 21e016db4e0 RtlFreeHeap 72193->72194 72193->72225 72195 21e016b8625 72194->72195 72196 21e016db4e0 RtlFreeHeap 72195->72196 72197 21e016b865e 72196->72197 72198 21e016d5560 RtlFreeHeap 72197->72198 72199 21e016b8672 72198->72199 72200 21e016db4e0 RtlFreeHeap 72199->72200 72199->72225 72201 21e016b8797 72200->72201 72202 21e016db4e0 RtlFreeHeap 72201->72202 72203 21e016b87a4 72202->72203 72204 21e016d5560 RtlFreeHeap 72203->72204 72205 21e016b87b8 72204->72205 72206 21e016db4e0 RtlFreeHeap 72205->72206 72205->72225 72207 21e016b87ec 72206->72207 72208 21e016d5560 RtlFreeHeap 72207->72208 72209 21e016b8800 72208->72209 72210 21e016db4e0 RtlFreeHeap 72209->72210 72209->72225 72211 21e016b882d 72210->72211 72212 21e016d5560 RtlFreeHeap 72211->72212 72213 21e016b8841 72212->72213 72214 21e016d5560 RtlFreeHeap 72213->72214 72215 21e016b885d 72214->72215 72216 21e016db4e0 RtlFreeHeap 72215->72216 72215->72225 72217 21e016b8897 72216->72217 72218 21e016d5560 RtlFreeHeap 72217->72218 72219 21e016b88ab 72218->72219 72220 21e016db4e0 RtlFreeHeap 72219->72220 72219->72225 72221 21e016b89c8 72220->72221 72222 21e016db4e0 RtlFreeHeap 72221->72222 72223 21e016b89d5 72222->72223 72224 21e016d5560 RtlFreeHeap 72223->72224 72234 21e016b89eb 72224->72234 72225->71915 72226 21e016b8aec 72236 21e016b8b47 72226->72236 72417 21e016cbe20 RtlFreeHeap 72226->72417 72227 21e016db4e0 RtlFreeHeap 72229 21e016b8b79 72227->72229 72230 21e016db4e0 RtlFreeHeap 72229->72230 72230->72225 72232 21e016b8b2a 72235 21e016db4e0 RtlFreeHeap 72232->72235 72233 21e016db4e0 RtlFreeHeap 72233->72234 72234->72225 72234->72226 72234->72233 72416 21e016cbe20 RtlFreeHeap 72234->72416 72235->72236 72236->72227 72238 21e016d4dc7 GetComputerNameExW 72237->72238 72239 21e016d4db1 72237->72239 72240 21e016d4def 72238->72240 72239->72238 72241 21e016d4df3 GetTokenInformation 72240->72241 72246 21e016d4e4e 72240->72246 72242 21e016d4e1c 72241->72242 72241->72246 72243 21e016d4e3e 72242->72243 72244 21e016e3de0 RtlFreeHeap 72242->72244 72245 21e016e3de0 RtlFreeHeap 72243->72245 72244->72243 72245->72246 72247 21e016cdfc0 RtlFreeHeap 72246->72247 72248 21e016d4e90 72247->72248 72249 21e016d4eaa GetNativeSystemInfo 72248->72249 72250 21e016e3de0 RtlFreeHeap 72248->72250 72251 21e016d4ee8 72249->72251 72252 21e016d4ed3 72249->72252 72250->72249 72251->72252 72253 21e016d4f17 72251->72253 72255 21e016e3de0 RtlFreeHeap 72252->72255 72254 21e016e3de0 RtlFreeHeap 72253->72254 72256 21e016d4f15 72254->72256 72255->72256 72258 21e016e3de0 RtlFreeHeap 72256->72258 72262 21e016d4f67 72256->72262 72257 21e016d4f8f GetAdaptersInfo 72259 21e016d4fbb 72257->72259 72260 21e016d4fdd 72257->72260 72258->72262 72261 21e016db4e0 RtlFreeHeap 72259->72261 72260->72259 72265 21e016d4fea GetAdaptersInfo 72260->72265 72263 21e016d4fc5 72261->72263 72262->72257 72264 21e016db4e0 RtlFreeHeap 72263->72264 72266 21e016d4fcd 72264->72266 72265->72259 72267 21e016d4fff 72265->72267 72266->71918 72267->72259 72268 21e016e3de0 RtlFreeHeap 72267->72268 72268->72267 72271 21e016e4759 72269->72271 72270 21e016e47af 72270->71923 72271->72270 72272 21e016e47ad NtFreeVirtualMemory 72271->72272 72272->72270 72273->71923 72275 21e016b8bde 72274->72275 72276 21e016ba050 RtlFreeHeap 72275->72276 72277 21e016b8c5e 72276->72277 72278 21e016ba050 RtlFreeHeap 72277->72278 72279 21e016b8c97 72278->72279 72280 21e016db4e0 RtlFreeHeap 72279->72280 72281 21e016b8cee 72280->72281 72282 21e016b8d5c 72281->72282 72283 21e016b8d5e 72281->72283 72284 21e016b8d44 72281->72284 72285 21e016ba050 RtlFreeHeap 72282->72285 72287 21e016b8d8b 72282->72287 72286 21e016ba050 RtlFreeHeap 72283->72286 72284->72282 72288 21e016ba050 RtlFreeHeap 72284->72288 72285->72287 72286->72282 72289 21e016db4e0 RtlFreeHeap 72287->72289 72288->72282 72290 21e016b8d93 72289->72290 72291 21e016db4e0 RtlFreeHeap 72290->72291 72292 21e016b8d9b 72291->72292 72293 21e016b8de9 72292->72293 72294 21e016b8df0 72292->72294 72453 21e016c6fa0 LdrGetProcedureAddress RtlFreeHeap 72293->72453 72418 21e016b7830 72294->72418 72297 21e016b8dee 72298 21e016b8e8e 72297->72298 72454 21e016cbe20 RtlFreeHeap 72297->72454 72442 21e016b17b0 72298->72442 72301 21e016b8e32 72303 21e016db4e0 RtlFreeHeap 72301->72303 72302 21e016b8e23 72304 21e016b8e2a 72302->72304 72308 21e016b8e34 72302->72308 72306 21e016b8ea4 72303->72306 72305 21e016db4e0 RtlFreeHeap 72304->72305 72305->72301 72307 21e016db4e0 RtlFreeHeap 72306->72307 72309 21e016b8eac 72307->72309 72311 21e016db4e0 RtlFreeHeap 72308->72311 72310 21e016db4e0 RtlFreeHeap 72309->72310 72312 21e016b8eb4 72310->72312 72313 21e016b8e5f 72311->72313 72314 21e016db4e0 RtlFreeHeap 72312->72314 72315 21e016ba050 RtlFreeHeap 72313->72315 72316 21e016b8ebc 72314->72316 72317 21e016b8e71 72315->72317 72316->71923 72318 21e016db4e0 RtlFreeHeap 72317->72318 72319 21e016b8e79 72318->72319 72455 21e016d51d0 RtlFreeHeap 72319->72455 72321 21e016b8e86 72322 21e016db4e0 RtlFreeHeap 72321->72322 72322->72298 72325 21e016bfff9 72323->72325 72324 21e016b2939 72343 21e016bf8a0 72324->72343 72325->72324 72326 21e016bcce0 LdrGetProcedureAddress 72325->72326 72327 21e016c0072 72326->72327 72328 21e016bcce0 LdrGetProcedureAddress 72327->72328 72329 21e016c008d 72328->72329 72330 21e016bcce0 LdrGetProcedureAddress 72329->72330 72331 21e016c00b6 72330->72331 72332 21e016bcce0 LdrGetProcedureAddress 72331->72332 72333 21e016c00d5 72332->72333 72334 21e016bcce0 LdrGetProcedureAddress 72333->72334 72335 21e016c00f4 72334->72335 72336 21e016bcce0 LdrGetProcedureAddress 72335->72336 72337 21e016c0113 72336->72337 72338 21e016bcce0 LdrGetProcedureAddress 72337->72338 72339 21e016c0132 72338->72339 72340 21e016bcce0 LdrGetProcedureAddress 72339->72340 72341 21e016c0151 72340->72341 72342 21e016bcce0 LdrGetProcedureAddress 72341->72342 72342->72324 72344 21e016bf8da 72343->72344 72345 21e016b293e 72344->72345 72346 21e016bcce0 LdrGetProcedureAddress 72344->72346 72351 21e016c3470 72345->72351 72347 21e016bf900 72346->72347 72348 21e016bcce0 LdrGetProcedureAddress 72347->72348 72349 21e016bf91b 72348->72349 72350 21e016bcce0 LdrGetProcedureAddress 72349->72350 72350->72345 72353 21e016c3489 72351->72353 72352 21e016c3493 72352->71930 72353->72352 72354 21e016bcce0 LdrGetProcedureAddress 72353->72354 72355 21e016c3502 72354->72355 72356 21e016bcce0 LdrGetProcedureAddress 72355->72356 72357 21e016c351d 72356->72357 72358 21e016bcce0 LdrGetProcedureAddress 72357->72358 72359 21e016c3546 72358->72359 72360 21e016bcce0 LdrGetProcedureAddress 72359->72360 72361 21e016c3565 72360->72361 72362 21e016bcce0 LdrGetProcedureAddress 72361->72362 72363 21e016c3584 72362->72363 72364 21e016bcce0 LdrGetProcedureAddress 72363->72364 72365 21e016c35a3 72364->72365 72366 21e016bcce0 LdrGetProcedureAddress 72365->72366 72367 21e016c35c2 72366->72367 72368 21e016bcce0 LdrGetProcedureAddress 72367->72368 72369 21e016c35e1 72368->72369 72370 21e016bcce0 LdrGetProcedureAddress 72369->72370 72371 21e016c3600 72370->72371 72372 21e016bcce0 LdrGetProcedureAddress 72371->72372 72373 21e016c361f 72372->72373 72374 21e016bcce0 LdrGetProcedureAddress 72373->72374 72375 21e016c363e 72374->72375 72376 21e016bcce0 LdrGetProcedureAddress 72375->72376 72377 21e016c365d 72376->72377 72378 21e016bcce0 LdrGetProcedureAddress 72377->72378 72379 21e016c367c 72378->72379 72380 21e016bcce0 LdrGetProcedureAddress 72379->72380 72381 21e016c369b 72380->72381 72382 21e016bcce0 LdrGetProcedureAddress 72381->72382 72383 21e016c36ba 72382->72383 72384 21e016bcce0 LdrGetProcedureAddress 72383->72384 72385 21e016c36d9 72384->72385 72386 21e016bcce0 LdrGetProcedureAddress 72385->72386 72387 21e016c36f8 72386->72387 72388 21e016bcce0 LdrGetProcedureAddress 72387->72388 72389 21e016c3717 72388->72389 72390 21e016bcce0 LdrGetProcedureAddress 72389->72390 72391 21e016c3736 72390->72391 72392 21e016bcce0 LdrGetProcedureAddress 72391->72392 72393 21e016c3755 72392->72393 72394 21e016bcce0 LdrGetProcedureAddress 72393->72394 72394->72352 72396 21e016b8eee CreateMutexExA 72395->72396 72397 21e016e3de0 72396->72397 72399 21e016e3e14 72397->72399 72398 21e016b8f71 72398->72068 72399->72398 72400 21e016db4e0 RtlFreeHeap 72399->72400 72400->72399 72402 21e016b8016 72401->72402 72403 21e016d557b 72401->72403 72402->72106 72405 21e016cbe20 RtlFreeHeap 72402->72405 72403->72402 72404 21e016db4e0 RtlFreeHeap 72403->72404 72404->72402 72405->72106 72406->72139 72409 21e016ba084 72407->72409 72408 21e016ba118 72408->72159 72409->72408 72410 21e016db4e0 RtlFreeHeap 72409->72410 72410->72409 72411->72157 72412->72170 72413->72176 72414->72182 72415->72189 72416->72234 72417->72232 72419 21e016b788a InternetOpenW 72418->72419 72420 21e016b7885 72418->72420 72421 21e016b7aed 72419->72421 72422 21e016b7898 InternetConnectW 72419->72422 72420->72419 72424 21e016b7b0e InternetCloseHandle 72421->72424 72427 21e016b7b17 72421->72427 72422->72421 72423 21e016b78dd HttpOpenRequestW 72422->72423 72423->72421 72425 21e016b7931 72423->72425 72424->72427 72425->72421 72426 21e016b79cb HttpSendRequestA 72425->72426 72426->72421 72429 21e016b79e4 72426->72429 72428 21e016b7b56 72427->72428 72430 21e016b7b8c 72427->72430 72433 21e016b7b60 72427->72433 72431 21e016db4e0 RtlFreeHeap 72428->72431 72428->72433 72436 21e016db4e0 RtlFreeHeap 72429->72436 72440 21e016b7a24 72429->72440 72432 21e016ba050 RtlFreeHeap 72430->72432 72431->72433 72434 21e016b7ba4 72432->72434 72433->72297 72435 21e016db4e0 RtlFreeHeap 72434->72435 72435->72433 72436->72440 72437 21e016b7a3f InternetQueryDataAvailable 72438 21e016b7ae3 72437->72438 72437->72440 72439 21e016db4e0 RtlFreeHeap 72438->72439 72439->72421 72440->72437 72440->72438 72441 21e016b7a98 RtlReAllocateHeap 72440->72441 72441->72440 72452 21e016b17f5 72442->72452 72443 21e016b180f 72444 21e016db4e0 RtlFreeHeap 72443->72444 72445 21e016b1820 72444->72445 72446 21e016db4e0 RtlFreeHeap 72445->72446 72448 21e016b1838 72446->72448 72447 21e016db4e0 RtlFreeHeap 72447->72448 72448->72447 72449 21e016b1b61 72448->72449 72450 21e016ba050 RtlFreeHeap 72448->72450 72449->72301 72450->72448 72452->72443 72456 21e016b4cd0 72452->72456 72453->72297 72454->72302 72455->72321 72457 21e016e4360 NtCreateThreadEx 72456->72457 72458 21e016b4d3d 72457->72458 72459 21e016e4ff0 NtQueueApcThread 72458->72459 72460 21e016b4d58 72459->72460 72460->72452 71282 21e016e3f40 71284 21e016e3f69 71282->71284 71283 21e016e3fc9 71284->71283 71285 21e016e3fc7 NtAllocateVirtualMemory 71284->71285 71285->71283 71286 21e016e4be0 71288 21e016e4c02 71286->71288 71287 21e016e4c5e 71288->71287 71289 21e016e4c5c NtProtectVirtualMemory 71288->71289 71289->71287

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 72 21e02f20024-21e02f20088 73 21e02f2008a-21e02f20098 72->73 74 21e02f200a7-21e02f200ac 73->74 75 21e02f2009a-21e02f200a5 73->75 76 21e02f200ae-21e02f200b8 74->76 75->74 75->75 76->76 77 21e02f200ba-21e02f200bd 76->77 78 21e02f20121-21e02f20127 77->78 79 21e02f200bf-21e02f200c7 77->79 78->73 81 21e02f2012d-21e02f2012e 78->81 80 21e02f200c9-21e02f200d5 79->80 82 21e02f20384-21e02f20388 80->82 83 21e02f200db-21e02f200e6 80->83 84 21e02f20130-21e02f2018e call 21e02f20418 * 3 VirtualAlloc 81->84 82->84 83->83 85 21e02f200e8-21e02f200eb 83->85 98 21e02f20404 84->98 99 21e02f20194-21e02f201aa 84->99 85->82 88 21e02f200f1-21e02f200fd 85->88 90 21e02f200ff 88->90 91 21e02f20103-21e02f2010b 88->91 90->91 93 21e02f20112-21e02f20116 91->93 94 21e02f2010d-21e02f2010f 91->94 93->78 96 21e02f20118-21e02f2011f 93->96 94->93 96->80 102 21e02f20406-21e02f20416 98->102 100 21e02f201c8-21e02f201e6 99->100 101 21e02f201ac-21e02f201b3 99->101 100->98 104 21e02f201ec-21e02f201f1 100->104 103 21e02f201b5-21e02f201c6 101->103 103->100 103->103 105 21e02f201f3-21e02f201f9 104->105 106 21e02f2020b-21e02f2020e 105->106 107 21e02f201fb-21e02f20205 105->107 109 21e02f20220-21e02f20237 106->109 110 21e02f20210-21e02f2021a 106->110 107->106 108 21e02f20207-21e02f20208 107->108 108->106 111 21e02f20251-21e02f2025e 109->111 112 21e02f20239-21e02f2023a 109->112 110->109 113 21e02f2021c-21e02f2021d 110->113 111->105 115 21e02f20260-21e02f20265 111->115 114 21e02f2023c-21e02f2024f 112->114 113->109 114->111 114->114 115->98 116 21e02f2026b-21e02f20273 115->116 117 21e02f20279-21e02f2027a 116->117 118 21e02f2032a-21e02f20334 116->118 120 21e02f2027d-21e02f20294 117->120 118->98 119 21e02f2033a-21e02f20340 118->119 121 21e02f203b1-21e02f203be 119->121 122 21e02f20342-21e02f20343 119->122 123 21e02f2031f-21e02f20322 120->123 124 21e02f2029a 120->124 126 21e02f203c0-21e02f203cc 121->126 127 21e02f203e6-21e02f20402 121->127 128 21e02f20346-21e02f20356 LoadLibraryA 122->128 123->120 125 21e02f20328 123->125 129 21e02f2029c-21e02f202b5 124->129 125->118 130 21e02f203de-21e02f203e4 126->130 127->102 128->98 131 21e02f2035c-21e02f20365 128->131 132 21e02f20317-21e02f2031a 129->132 133 21e02f202b7-21e02f202dc 129->133 130->127 134 21e02f203ce-21e02f203db 130->134 135 21e02f203a9-21e02f203af 131->135 136 21e02f20367-21e02f20368 131->136 132->129 139 21e02f2031c 132->139 138 21e02f202de-21e02f202f2 133->138 134->130 135->121 135->128 140 21e02f2036a-21e02f2037d 136->140 138->138 141 21e02f202f4-21e02f20300 138->141 139->123 143 21e02f2037f-21e02f20382 140->143 144 21e02f2038d-21e02f20392 140->144 145 21e02f20302-21e02f20315 141->145 146 21e02f20394-21e02f203a1 143->146 144->146 145->132 145->145 146->140 148 21e02f203a3-21e02f203a7 146->148 148->135
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682959280.0000021E02F20000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E02F20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e02f20000_rundll32.jbxd
                                          Similarity
                                          • API ID: AllocLibraryLoadVirtual
                                          • String ID: .$3$e$k$l$r
                                          • API String ID: 3550616410-427081609
                                          • Opcode ID: 291297bbe044f9a5b47e76894c7116349fbdee25044733f7824d139af3bc4b69
                                          • Instruction ID: a428c31bc572f21cb7bbd5da00477b9635ac3412494f486d043dffcf8dbb1858
                                          • Opcode Fuzzy Hash: 291297bbe044f9a5b47e76894c7116349fbdee25044733f7824d139af3bc4b69
                                          • Instruction Fuzzy Hash: E7D12931218E0E4BDB1DDB18CC886F5B3E2FBBA345F15416ED897E7196DE7098878680

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 222 21e016d4d00-21e016d4daf GetUserNameW GetComputerNameExW 223 21e016d4dc7-21e016d4df1 GetComputerNameExW call 21e016e4ad0 222->223 224 21e016d4db1-21e016d4dc1 call 21e016db4c0 222->224 229 21e016d4e58-21e016d4e92 call 21e016e2750 call 21e016cdfc0 223->229 230 21e016d4df3-21e016d4e1a GetTokenInformation 223->230 224->223 244 21e016d4eaa-21e016d4ed1 GetNativeSystemInfo 229->244 245 21e016d4e94-21e016d4ea5 call 21e016e3de0 229->245 231 21e016d4e1c-21e016d4e28 230->231 232 21e016d4e4e-21e016d4e53 call 21e016e4000 230->232 233 21e016d4e2a-21e016d4e39 call 21e016e3de0 231->233 234 21e016d4e3e-21e016d4e49 call 21e016e3de0 231->234 232->229 233->234 234->232 247 21e016d4ee8-21e016d4eec 244->247 248 21e016d4ed3-21e016d4ee6 244->248 245->244 250 21e016d4f17-21e016d4f2d call 21e016e3de0 247->250 251 21e016d4eee-21e016d4efd 247->251 249 21e016d4f01-21e016d4f15 call 21e016e3de0 248->249 254 21e016d4f32-21e016d4f42 249->254 250->254 251->249 257 21e016d4f89-21e016d4fb9 GetAdaptersInfo 254->257 258 21e016d4f44-21e016d4f84 call 21e016e3b90 call 21e016e3de0 call 21e016e3b90 * 2 254->258 263 21e016d4fbb-21e016d4fdc call 21e016db4e0 * 2 257->263 264 21e016d4fdd-21e016d4fe3 257->264 258->257 264->263 266 21e016d4fe5-21e016d4ffd call 21e016db4c0 GetAdaptersInfo 264->266 266->263 275 21e016d4fff-21e016d500c 266->275 277 21e016d5012-21e016d5015 275->277 277->263 278 21e016d5017-21e016d5018 277->278 279 21e016d501f-21e016d5031 call 21e016b93e0 278->279 282 21e016d5033-21e016d5043 call 21e016e3de0 279->282 283 21e016d5045-21e016d504c 279->283 282->279 283->263 284 21e016d5052-21e016d5062 call 21e016e3de0 283->284 284->277
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID: InfoName$AdaptersComputer$InformationNativeSystemTokenUser
                                          • String ID:
                                          • API String ID: 1596153048-0
                                          • Opcode ID: fc5f4ac56282d7f6b4db6a693f909165f7ae7dee8b8a3528bbb2850199aa6824
                                          • Instruction ID: e3f9a5d4df2ee7f971ea483ea70a60405994f7941375ca19d9ee8567f28a0e38
                                          • Opcode Fuzzy Hash: fc5f4ac56282d7f6b4db6a693f909165f7ae7dee8b8a3528bbb2850199aa6824
                                          • Instruction Fuzzy Hash: 2EA1E531618B084FEF54EB18EC597DAB3E1FBA8300F41452DE88AD7295DEB4D945CB82
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000003.2301569551.00007DF40CCA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 00007DF40CCA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_3_7df40cca0000_rundll32.jbxd
                                          Similarity
                                          • API ID: CreateSnapshotToolhelp32
                                          • String ID: @
                                          • API String ID: 3332741929-2766056989
                                          • Opcode ID: 4dd753c87e2aa29c9c96ae48a87dd40f0169a1ec6aa8ae238ef9ae283b3ca07b
                                          • Instruction ID: fee07c7912eccc77b8bdc9f0c84a49a7d98d8cc655870ecadf8a5a8510b0c4c4
                                          • Opcode Fuzzy Hash: 4dd753c87e2aa29c9c96ae48a87dd40f0169a1ec6aa8ae238ef9ae283b3ca07b
                                          • Instruction Fuzzy Hash: D571D031618A4C8FEF94EF5CC898BE937E1FB98355F104226E91ED72A0DB749954CB80
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000003.2301569551.00007DF40CCA0000.00000020.00001000.00020000.00000000.sdmp, Offset: 00007DF40CCA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_3_7df40cca0000_rundll32.jbxd
                                          Similarity
                                          • API ID: CloseCreateFirstHandleProcess32SnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 1083639309-0
                                          • Opcode ID: 7b76749183c32904e7c867cae929a431087f8f66ce00ca14fd6eade76c102862
                                          • Instruction ID: 28acdb015e6c2751a6e8fcd33746c477b72efbb045d92c3a4bf06edee4853473
                                          • Opcode Fuzzy Hash: 7b76749183c32904e7c867cae929a431087f8f66ce00ca14fd6eade76c102862
                                          • Instruction Fuzzy Hash: 2021FC3061894C8FEBA0EB6CCD58BEA33E1FBA8314F404226D41EDB2D0DE34EA448750

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID: ExitThreadUser
                                          • String ID:
                                          • API String ID: 3424019298-0
                                          • Opcode ID: c7cfbd4c28cfd34a067c4dec962a0dff76d3cfd4b019f48227f7b9b53671fbdc
                                          • Instruction ID: 50a4de6fa52023747b6fd48046cc43fc6bef496c6746f5a05b084bdc71412b7c
                                          • Opcode Fuzzy Hash: c7cfbd4c28cfd34a067c4dec962a0dff76d3cfd4b019f48227f7b9b53671fbdc
                                          • Instruction Fuzzy Hash: A451F574108A085FEB48EF28EC597F577E1FB6A310F11025DE497D72A2CE68E842C745

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID: AddressProcedure
                                          • String ID:
                                          • API String ID: 3653107232-0
                                          • Opcode ID: 64a4c363e66e8fcb324c2d013a85a570e217f1f41a485886b1e3891cf8e103dc
                                          • Instruction ID: 6ef8522ff07b364f0e889efba758058921934fffbcaf5ae6d2aadc7c49a40adb
                                          • Opcode Fuzzy Hash: 64a4c363e66e8fcb324c2d013a85a570e217f1f41a485886b1e3891cf8e103dc
                                          • Instruction Fuzzy Hash: 4331C675118B084BDB649F08EC8A7FAB7E0FB99310F51061EE986C7251D670E98587C7

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 814 21e016b17b0-21e016b17f1 815 21e016b17f5-21e016b1800 814->815 816 21e016b184b-21e016b1879 call 21e016e1270 call 21e016db4c0 * 2 815->816 817 21e016b1802-21e016b180d 815->817 816->817 832 21e016b187b-21e016b187e 816->832 817->815 819 21e016b180f-21e016b1846 call 21e016db4e0 * 2 817->819 828 21e016b1b05-21e016b1b09 819->828 830 21e016b1b0b-21e016b1b0e call 21e016db4e0 828->830 831 21e016b1b13-21e016b1b29 828->831 830->831 837 21e016b1b2b-21e016b1b4a call 21e016e3b80 call 21e016ba050 call 21e016db4e0 831->837 838 21e016b1b4f-21e016b1b5f 831->838 832->817 834 21e016b1880-21e016b189f 832->834 836 21e016b18a1-21e016b18a3 834->836 839 21e016b18a5-21e016b18b9 836->839 840 21e016b18e4-21e016b18f1 call 21e016e1270 836->840 837->838 838->828 848 21e016b1b61-21e016b1b71 838->848 839->836 843 21e016b18bb-21e016b18be 839->843 840->817 849 21e016b18f7-21e016b191c 840->849 847 21e016b18c0-21e016b18c5 843->847 847->840 851 21e016b18c7-21e016b18e2 847->851 852 21e016b1920-21e016b1935 call 21e016ba130 849->852 851->847 857 21e016b1aec-21e016b1afa 852->857 858 21e016b193b-21e016b1940 852->858 857->852 859 21e016b1b00 857->859 860 21e016b1946-21e016b1955 858->860 861 21e016b1a3c-21e016b1a88 call 21e016e4070 call 21e016b4cd0 858->861 859->817 862 21e016b1957 860->862 863 21e016b195d-21e016b196d 860->863 861->857 870 21e016b1a8a-21e016b1a9e 861->870 862->863 869 21e016b1973-21e016b1976 863->869 871 21e016b1988-21e016b1a17 call 21e016e4070 call 21e016e4000 869->871 872 21e016b1978-21e016b1986 869->872 876 21e016b1ab0-21e016b1ac5 870->876 877 21e016b1aa0-21e016b1aa7 call 21e016e4000 870->877 889 21e016b1a1c-21e016b1a37 871->889 872->869 872->871 876->870 883 21e016b1ac7-21e016b1ae4 call 21e016e4000 * 2 876->883 880 21e016b1aac-21e016b1aae 877->880 880->857 883->857 889->857
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 81d85227a09238635517778710c27d9bdfaca49e187fecf1b6975c65beea9fa4
                                          • Instruction ID: df90a6825115a671331ff9687ce5083c1e68962bd54515441fa897accab84705
                                          • Opcode Fuzzy Hash: 81d85227a09238635517778710c27d9bdfaca49e187fecf1b6975c65beea9fa4
                                          • Instruction Fuzzy Hash: 51C10A3011CA494FEB55EF28EC987E9B7E1FB6A300F510269D88AC7296DBB4D981C741

                                          Control-flow Graph

                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 62d6cbcc5dfeb1084a9cc122a67364a682b6f2504e530092aaea3ef2afdda240
                                          • Instruction ID: 49821f5c49afd0bafdb4036cdbfbc91ac84b4f2929794a48ea0b6e8b4c5fbbc1
                                          • Opcode Fuzzy Hash: 62d6cbcc5dfeb1084a9cc122a67364a682b6f2504e530092aaea3ef2afdda240
                                          • Instruction Fuzzy Hash: 4A4193701286088FF748DF28EC897A6B7E1FB58304F50466DE45AD72D6CBB8C881CB41

                                          Control-flow Graph

                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 246b04183441d9db0d4c236240df2ca26f18e78107733016fa740d2a375581b5
                                          • Instruction ID: 36a4dfa0785bd0ca6c407cba225719eaaa0b7d96f427306193e08b7f73eab423
                                          • Opcode Fuzzy Hash: 246b04183441d9db0d4c236240df2ca26f18e78107733016fa740d2a375581b5
                                          • Instruction Fuzzy Hash: 19412C7151CB488FE6749F18AC467EAB7E0FB99720F004A1FD5C9C2255DA75A4428BC2
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 38f81910f3a60e41c97a405c41efcb50c28e990bd7599c8c7593531c701bee66
                                          • Instruction ID: f3416f578c883371e23f660dc529b61e00f8a5d26d24cb978623efb3f8456456
                                          • Opcode Fuzzy Hash: 38f81910f3a60e41c97a405c41efcb50c28e990bd7599c8c7593531c701bee66
                                          • Instruction Fuzzy Hash: D311723061D7449FEB549B1CAC8A7E6B7E0FBA9321F00491FE889C7350D675D4908783
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4459b4d784854b5074084b1eb2e58009c50c2c7bf0fd286647bf740f6eacac18
                                          • Instruction ID: 4d10deee2f6f40aa7f32dd345bbdd44a1183788cd5dce03191e2e19f8c0f56d7
                                          • Opcode Fuzzy Hash: 4459b4d784854b5074084b1eb2e58009c50c2c7bf0fd286647bf740f6eacac18
                                          • Instruction Fuzzy Hash: 8511823065CB498FEA549F58AC4A7A973D4E75D715F40051EE849C3290DAB5D880CB83
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5bb11d53fe8240a521e5f77f5ce288efeffd0a38eebd87c38d9030f26bb6a810
                                          • Instruction ID: 3504363d14e0d86cd57cf48e2b2d8e485dddc6870a1b89a05d794b233c42d65e
                                          • Opcode Fuzzy Hash: 5bb11d53fe8240a521e5f77f5ce288efeffd0a38eebd87c38d9030f26bb6a810
                                          • Instruction Fuzzy Hash: A9110430118B484FFB609B9CAC4A3FA72C0F79C314F50051DEC89D61C1DBF695488A43
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a3b493b046dda1831e3ac93b31f1d57d2ffdedc147415695421c0937c946fff3
                                          • Instruction ID: 1af61b9a99bf48e5c0f917a102c59e3be5ba49bb7a588362efc237331adc4596
                                          • Opcode Fuzzy Hash: a3b493b046dda1831e3ac93b31f1d57d2ffdedc147415695421c0937c946fff3
                                          • Instruction Fuzzy Hash: 4211A73062CB458FEB549F08AC4ABE977E0F75C715F40051EE84AC7690D6B5D480CAC3
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c6c2dce99591ed636752d02e92fb4e83679b8b4534c19c070d62bd12e62a70ad
                                          • Instruction ID: 848c44afa03e5f47afb37d6ce14d3e3f4185a1ebd4b5492712658fc04d316fae
                                          • Opcode Fuzzy Hash: c6c2dce99591ed636752d02e92fb4e83679b8b4534c19c070d62bd12e62a70ad
                                          • Instruction Fuzzy Hash: F101C43066CB054FEF48AB28AC4B3F673E1F79D710F10461EE84AD3291DA65D9808AC3
                                          Memory Dump Source
                                          • Source File: 00000003.00000003.2141899261.0000021E06BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E06BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_3_21e06bc0000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f8c2193cd15d56b920b71f0a62798233d7bc621eaf68b72cfb2e802f18a24de
                                          • Instruction ID: 59bbd28852dbbbc8e160da1686dce8536bcb31dfd4461d8114c33bf6552d11ab
                                          • Opcode Fuzzy Hash: 4f8c2193cd15d56b920b71f0a62798233d7bc621eaf68b72cfb2e802f18a24de
                                          • Instruction Fuzzy Hash: 6EF081B0A28B408BE7449F1884C967577E1FBDC655F24452EE88A97371CB319842CA83
                                          Memory Dump Source
                                          • Source File: 00000003.00000003.2141899261.0000021E06BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E06BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_3_21e06bc0000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 744c819c75b2bbda755093bb73dffba834d27d1bf64d68f532f853bd1298e79c
                                          • Instruction ID: 184f734ccd17575b3610ff01874b90a98128593bedad8d86fb7f07e6a9330900
                                          • Opcode Fuzzy Hash: 744c819c75b2bbda755093bb73dffba834d27d1bf64d68f532f853bd1298e79c
                                          • Instruction Fuzzy Hash: 99F0B4B0A24F044BCB04AF2C884A67533D1FBAC605F54052EE848D3361DB35E4428B83
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3a87759f1dbb7da0b31a2215c550786eb7d616866bd4ea5bb0906d9c5e547a0c
                                          • Instruction ID: 9df20a4c0140fa38e8bab9ec7d0402f95e383c5740966ed0a16b506c1ebaba14
                                          • Opcode Fuzzy Hash: 3a87759f1dbb7da0b31a2215c550786eb7d616866bd4ea5bb0906d9c5e547a0c
                                          • Instruction Fuzzy Hash: 33D0A97248DB188EEB209BA8FC873E8B3D0F790328F50882EC18DC2043D67E80468706

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: lstrcat$char_traits$FileModuleNameProcessorVirtual$Concurrency::FolderListPathRootRoot::SafeSpecialctypeshared_ptrstd::ios_base::getlocstd::ios_base::width
                                          • String ID: DLLMain$\NTUSER.DAT.Not
                                          • API String ID: 3304544195-2041910327
                                          • Opcode ID: d30e8e5b88aad5fa04ee92c3bd5113da6591793adca71e7613593e8e8900fb11
                                          • Instruction ID: 54042deff46ebc8a10c5d3b5386f0826ef7fbcd5f9cae5f71c19aad0ab155aa0
                                          • Opcode Fuzzy Hash: d30e8e5b88aad5fa04ee92c3bd5113da6591793adca71e7613593e8e8900fb11
                                          • Instruction Fuzzy Hash: 959139712159C5A2FE24DB14FDD93DE63A1FBD8340F814122DA9D97AAAEF68C604CB40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 149 21e016b7830-21e016b7883 150 21e016b788a-21e016b7892 InternetOpenW 149->150 151 21e016b7885-21e016b7888 149->151 152 21e016b7af9-21e016b7afd 150->152 153 21e016b7898-21e016b78d7 InternetConnectW 150->153 151->150 155 21e016b7aff-21e016b7b0c 152->155 153->152 154 21e016b78dd-21e016b792b HttpOpenRequestW 153->154 154->155 156 21e016b7931-21e016b793b 154->156 157 21e016b7b17-21e016b7b1a 155->157 158 21e016b7b0e-21e016b7b11 InternetCloseHandle 155->158 161 21e016b793d-21e016b7945 156->161 162 21e016b7990-21e016b79ab 156->162 159 21e016b7b1c-21e016b7b1d 157->159 160 21e016b7b25-21e016b7b28 157->160 158->157 159->160 164 21e016b7b2a-21e016b7b2b 160->164 165 21e016b7b33-21e016b7b3b 160->165 161->162 163 21e016b7947-21e016b798b call 21e016e2750 * 2 161->163 162->155 173 21e016b79b1-21e016b79ba 162->173 163->162 164->165 167 21e016b7b41-21e016b7b4b 165->167 168 21e016b7bd0-21e016b7be3 165->168 171 21e016b7b4d-21e016b7b54 call 21e016e1230 167->171 172 21e016b7b62-21e016b7b73 167->172 171->172 187 21e016b7b56-21e016b7b60 call 21e016db4e0 171->187 175 21e016b7b7a-21e016b7b8a call 21e016bcb60 172->175 176 21e016b7b75-21e016b7b78 172->176 177 21e016b79e6-21e016b7a0a 173->177 178 21e016b79bc-21e016b79de call 21e016e1270 HttpSendRequestA 173->178 189 21e016b7b8c-21e016b7bb8 call 21e016ba050 call 21e016db4e0 175->189 190 21e016b7bba-21e016b7bce call 21e016e1410 175->190 176->168 176->175 191 21e016b7a0c 177->191 178->155 188 21e016b79e4-21e016b7a16 178->188 187->168 199 21e016b7a18-21e016b7a1f call 21e016db4e0 188->199 200 21e016b7a24-21e016b7a3b call 21e016db4c0 188->200 189->168 190->168 190->187 191->178 199->200 207 21e016b7a3f-21e016b7a5b InternetQueryDataAvailable 200->207 208 21e016b7a61-21e016b7a69 207->208 209 21e016b7ae3-21e016b7af7 call 21e016db4e0 207->209 208->209 211 21e016b7a6b-21e016b7a7e 208->211 209->158 211->209 214 21e016b7a80-21e016b7a86 211->214 214->209 215 21e016b7a88-21e016b7a96 214->215 216 21e016b7a98-21e016b7aaa RtlReAllocateHeap 215->216 217 21e016b7aac-21e016b7aaf call 21e016db4c0 215->217 218 21e016b7ab4-21e016b7ade call 21e016d44a0 216->218 217->218 218->207
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID: Internet$HeapHttpOpenRequest$AllocateAvailableCloseConnectDataFreeHandleQuerySend
                                          • String ID:
                                          • API String ID: 3737532752-0
                                          • Opcode ID: bbb038b860022ece9c615c8651eb51f5b0c4a447bc3b9e1814cb5cd5c2ae45f2
                                          • Instruction ID: 9c547be6be6c3dc1a469a2c8d130403eeb7a7c00952ef6f0c617e0ffcf5931a7
                                          • Opcode Fuzzy Hash: bbb038b860022ece9c615c8651eb51f5b0c4a447bc3b9e1814cb5cd5c2ae45f2
                                          • Instruction Fuzzy Hash: BFB19630218A088FEB54EF58EC997AAB7D5FBA8300F05456DEC46DB2D5DFB4D8418782

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 289 21e04c74af0-21e04c74b52 VirtualAllocExNuma 290 21e04c74b61-21e04c74b6a 289->290 291 21e04c74b93-21e04c74b9b 290->291 292 21e04c74b6c-21e04c74b91 290->292 292->290
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: AllocNumaVirtual
                                          • String ID: @
                                          • API String ID: 4233825816-2766056989
                                          • Opcode ID: 3ad4501b3b3753825116e2f3eb18c4c8e9e85a26242c0a199b5a9ca851232d8f
                                          • Instruction ID: 139f036806e609bbdc3d2f6bde52d0f0705d01c07c83c5222b2aaf46ea7901aa
                                          • Opcode Fuzzy Hash: 3ad4501b3b3753825116e2f3eb18c4c8e9e85a26242c0a199b5a9ca851232d8f
                                          • Instruction Fuzzy Hash: 50112172219A8087DB54CB15F89431ABBA1F789794F101214FB9F43B98DB7DC5448B04

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID: CreateMutex
                                          • String ID:
                                          • API String ID: 1964310414-0
                                          • Opcode ID: 6f5cb151aadba70b4aa6e5bafaf7101ce807ceecab62b3beafb4f2b699b4b3ec
                                          • Instruction ID: 30598eb97c4120d198205c251d2f528d0124d32f0a60218240781c502664ff3c
                                          • Opcode Fuzzy Hash: 6f5cb151aadba70b4aa6e5bafaf7101ce807ceecab62b3beafb4f2b699b4b3ec
                                          • Instruction Fuzzy Hash: 3CE12A71408A0D8FE751EF14EC94BE6BBF4F768340F20027BE84AC6265DB799245CB86

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 438 21e016db4e0-21e016db4ee 439 21e016db523-21e016db52f 438->439 440 21e016db4f0-21e016db505 438->440 440->439 442 21e016db507-21e016db51d call 21e016d4ce0 RtlFreeHeap 440->442 442->439
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4682272693.0000021E016B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021E016B1000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e016b1000_rundll32.jbxd
                                          Similarity
                                          • API ID: FreeHeap
                                          • String ID:
                                          • API String ID: 3298025750-0
                                          • Opcode ID: d9c8acccb119fdf6d5691a0567f94fa179966e421fbccb122f962e3160943c6c
                                          • Instruction ID: acf4b7ee660b28af038955c53abf7a5f5f19f5e222855cd56b4d7866fefe53ec
                                          • Opcode Fuzzy Hash: d9c8acccb119fdf6d5691a0567f94fa179966e421fbccb122f962e3160943c6c
                                          • Instruction Fuzzy Hash: 1AF01C30710A088BFF58EBBAACC97A137E2FB9D341B868054E845CA194DB78D841C701
                                          Memory Dump Source
                                          • Source File: 00000003.00000003.2141899261.0000021E06BC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E06BC0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_3_21e06bc0000_rundll32.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6258ad962565a3180bb006997aefc3c2d41d9dd5a2811c72a17a211375779bb6
                                          • Instruction ID: c38f77ae54f7af5afcf6fec8464ea512bff1abd1fb266e775fbea39fd5d97e0c
                                          • Opcode Fuzzy Hash: 6258ad962565a3180bb006997aefc3c2d41d9dd5a2811c72a17a211375779bb6
                                          • Instruction Fuzzy Hash: 32014970209D2E0BEBD9E7686CC47E37AC2F7EC300F595055DC0AE729ACA66C98146C0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                                          • String ID:
                                          • API String ID: 1584724053-0
                                          • Opcode ID: bb9541adda1de7d3445963b5d25e419d471c8ff25f1e67a4739099756cf48ec5
                                          • Instruction ID: 17f3d9ac44a5c3c2535c7f20e23367e84e313769d50176eef51f33f68e6f2fb3
                                          • Opcode Fuzzy Hash: bb9541adda1de7d3445963b5d25e419d471c8ff25f1e67a4739099756cf48ec5
                                          • Instruction Fuzzy Hash: 8331073232068445FF199B269E5D3DD76D1FBA9BC8F0A4125DF4E5BB9ACE78C0128700
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
                                          • String ID:
                                          • API String ID: 4099253644-0
                                          • Opcode ID: b4bc968d3c6e0ca3411d4d7c887ffc2f2a0207fe4ca6a95d778c9ae964d27bd5
                                          • Instruction ID: ddd60f417b7c39a2725dfbbbbb643f26302bddbee4904a28a99e3796cae6ac4a
                                          • Opcode Fuzzy Hash: b4bc968d3c6e0ca3411d4d7c887ffc2f2a0207fe4ca6a95d778c9ae964d27bd5
                                          • Instruction Fuzzy Hash: 3231BE75201A4065FF589B11FFED3E422E0AFBD758F4A1226DE19262E5EFFCD8508241
                                          APIs
                                          • std::ios_base::getloc.LIBCPMTD ref: 0000021E04C934A8
                                            • Part of subcall function 0000021E04C73F40: std::locale::locale.LIBCPMTD ref: 0000021E04C73F64
                                            • Part of subcall function 0000021E04C7ABE0: std::_Lockit::_Lockit.LIBCPMT ref: 0000021E04C7ABF9
                                            • Part of subcall function 0000021E04C7ABE0: __int64.LIBCPMTD ref: 0000021E04C7AC12
                                            • Part of subcall function 0000021E04C7ABE0: std::locale::_Getfacet.LIBCPMTD ref: 0000021E04C7AC29
                                            • Part of subcall function 0000021E04C7ABE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0000021E04C7ACDA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$GetfacetLockit::_Lockit::~___int64std::ios_base::getlocstd::locale::_std::locale::locale
                                          • String ID: %H : %M$%H : %M : S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm$c
                                          • API String ID: 4021809434-3998755201
                                          • Opcode ID: 8e1deff4405f140ca104af93d567ca82f55d7d783d531e69af03a14ea99d4600
                                          • Instruction ID: 7498ae447e8c7143f74b1d93f3cac1e513b591931d0b433d80b0b6425546df75
                                          • Opcode Fuzzy Hash: 8e1deff4405f140ca104af93d567ca82f55d7d783d531e69af03a14ea99d4600
                                          • Instruction Fuzzy Hash: 37E17032508BC496FB688F24E98C7ED77E0FB9C788F154209DE8927A69DB78C645C704
                                          APIs
                                          • std::ios_base::getloc.LIBCPMTD ref: 0000021E04C92F48
                                            • Part of subcall function 0000021E04C73F40: std::locale::locale.LIBCPMTD ref: 0000021E04C73F64
                                            • Part of subcall function 0000021E04C82EB4: std::_Lockit::_Lockit.LIBCPMT ref: 0000021E04C82ED5
                                            • Part of subcall function 0000021E04C82EB4: std::_Lockit::_Lockit.LIBCPMT ref: 0000021E04C82EFA
                                            • Part of subcall function 0000021E04C82EB4: std::_Lockit::~_Lockit.LIBCPMT ref: 0000021E04C82F24
                                            • Part of subcall function 0000021E04C82EB4: std::_Lockit::~_Lockit.LIBCPMT ref: 0000021E04C82FCE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$std::ios_base::getlocstd::locale::locale
                                          • String ID: %H : %M$%H : %M : S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm$c
                                          • API String ID: 824625536-3998755201
                                          • Opcode ID: 9ea7233a1195fdad9958adce2f8bb786a2981300ba8746fa4110a12b4cbdb550
                                          • Instruction ID: 2bf0ba75c2d9394cdd38bcf3e108d53e14d50b79c07f76e22b3a897ec2c8597a
                                          • Opcode Fuzzy Hash: 9ea7233a1195fdad9958adce2f8bb786a2981300ba8746fa4110a12b4cbdb550
                                          • Instruction Fuzzy Hash: CEE1A332504BC496FF688F24DA887ED77E0FBAC788F554205DE8927A69DB78CA45C700
                                          APIs
                                          • std::ios_base::getloc.LIBCPMTD ref: 0000021E04C9BC74
                                            • Part of subcall function 0000021E04C73F40: std::locale::locale.LIBCPMTD ref: 0000021E04C73F64
                                            • Part of subcall function 0000021E04C7C674: std::_Lockit::_Lockit.LIBCPMT ref: 0000021E04C7C695
                                            • Part of subcall function 0000021E04C7C674: std::_Lockit::_Lockit.LIBCPMT ref: 0000021E04C7C6BA
                                            • Part of subcall function 0000021E04C7C674: std::_Lockit::~_Lockit.LIBCPMT ref: 0000021E04C7C6E4
                                            • Part of subcall function 0000021E04C7C674: std::_Lockit::~_Lockit.LIBCPMT ref: 0000021E04C7C78E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$std::ios_base::getlocstd::locale::locale
                                          • String ID: %H : %M$%H : %M : S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm$c
                                          • API String ID: 824625536-3998755201
                                          • Opcode ID: c37271404475d0014721bef1fed1c0e1cecc04706b38c11d20b1fc59747c924a
                                          • Instruction ID: a7115a9d9c1b7edfb23793490436534ea8bc453d3fe2891e397b65fd3a4370b0
                                          • Opcode Fuzzy Hash: c37271404475d0014721bef1fed1c0e1cecc04706b38c11d20b1fc59747c924a
                                          • Instruction Fuzzy Hash: A9E1B532504B85A6FF688F24EA887ED77E0FB59788F054105EF8917B59DB78CA45C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: 5a55c19257780c8c169a156cca45b48a9cb7959a6ebe7d38ac67adaa113ab4e8
                                          • Instruction ID: f4c06e53fb8c699b8fd9ebc80c52528c6a60a460ad48f0ecbeffcc13cf4504e5
                                          • Opcode Fuzzy Hash: 5a55c19257780c8c169a156cca45b48a9cb7959a6ebe7d38ac67adaa113ab4e8
                                          • Instruction Fuzzy Hash: F531CA31210A00A1FE18EB15FEDC2D963A0FFB97A0F164222DE69272F5DAB8C841C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: c69e9b5502f2b5cb16499cf93693c14af8bc71d40f19607121fcaa26e48801a2
                                          • Instruction ID: 2a639dac41e3da5a61e92f97d360d38481a5247775257dad4ad3d11e7df1c78c
                                          • Opcode Fuzzy Hash: c69e9b5502f2b5cb16499cf93693c14af8bc71d40f19607121fcaa26e48801a2
                                          • Instruction Fuzzy Hash: 6E31B131204A4091FF19DB55EE982D967A0FBE8BA0F871226DE59636F5DFB9C842C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: ce52fca3fe3199b9ca64d09fb7b68cda433c6417c830918da4d940205a12b32f
                                          • Instruction ID: eeb2f35b08498b5d7d3a7ec227b7e120294e9bc54afe64f66f17cf94ef3de251
                                          • Opcode Fuzzy Hash: ce52fca3fe3199b9ca64d09fb7b68cda433c6417c830918da4d940205a12b32f
                                          • Instruction Fuzzy Hash: CC318372204B41A2FE18DB15FED82D967A0FBAC7A0F564222DE59636F5DEB8C542C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: e92ebb4505384e37149a9af64b0ed7b997fd3b62a18224f75f4565cc40b02c60
                                          • Instruction ID: 15a06edaeb40bfb2c4ae53a5eb8b5d599480c9b8e15547224c9d45a74b6dcfaa
                                          • Opcode Fuzzy Hash: e92ebb4505384e37149a9af64b0ed7b997fd3b62a18224f75f4565cc40b02c60
                                          • Instruction Fuzzy Hash: 0431A471204B81A1FF18DB15EE982D963A0FBA8BA0F571226DE69236F5DFB9C445C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: bb88f8af8f6ad0f94797e91181e4a5fede4ca1b0857083484043c23cb2229bcb
                                          • Instruction ID: f19a5d45a07fba35dd6407bb71f22cba98924b7d368f86e4cd9d2e0e931bdb7d
                                          • Opcode Fuzzy Hash: bb88f8af8f6ad0f94797e91181e4a5fede4ca1b0857083484043c23cb2229bcb
                                          • Instruction Fuzzy Hash: 5F31C471210A00A1FE59EF15EE9C2D963A1FFA97A0F564321DE59636F9DFB8C845C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 560648410-3145022300
                                          • Opcode ID: 29cb517ef353edaf7fe96a55ad9e16f417422b8bc592340c9ae3e73a311cc7df
                                          • Instruction ID: 4f10359d048627d89fcec22182a6a1f052a60d8cf04fae9e555dc9f6c361c1a6
                                          • Opcode Fuzzy Hash: 29cb517ef353edaf7fe96a55ad9e16f417422b8bc592340c9ae3e73a311cc7df
                                          • Instruction Fuzzy Hash: 5031E671210B00A2FE18EB15EE9C3D927A1FBB9B90F460621DE69676F5DBB8C941C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: 536d951579794d9ac5848435dcda0d8056ecb28f286086e041b4dee6b5989298
                                          • Instruction ID: 4cc6556bde175b3826ccc35589ab7fdbd4f6a769af74d9c8c8eb0d4a1d664780
                                          • Opcode Fuzzy Hash: 536d951579794d9ac5848435dcda0d8056ecb28f286086e041b4dee6b5989298
                                          • Instruction Fuzzy Hash: EB31A271204B40A1FF189B19EE982D963E0FFA8BA4F5B1226DE59633F5DEB9C445C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: e44b50d4e94eb0d1351846dbd8529780eaeaffd3bd116e536ad6d8b979878f95
                                          • Instruction ID: f7c685aecbefdfe2b3c7e69de6dfbd9ac5a0ee35be3806d11224f7258815b7b0
                                          • Opcode Fuzzy Hash: e44b50d4e94eb0d1351846dbd8529780eaeaffd3bd116e536ad6d8b979878f95
                                          • Instruction Fuzzy Hash: 20319171204B4191FF18DB15EE982DA63A0EBA8BA4F574226DE59276F6DFB8C841C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockctypestd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 757613215-3145022300
                                          • Opcode ID: 27ff36a41daa2afd465fce565ffe5753e683ad286d1df17b1f83c21b9b33a9ce
                                          • Instruction ID: 359a31679262560487b5c02c3a45ae31c6b7d91a3a73ee7e3b008a5fa00fde44
                                          • Opcode Fuzzy Hash: 27ff36a41daa2afd465fce565ffe5753e683ad286d1df17b1f83c21b9b33a9ce
                                          • Instruction Fuzzy Hash: 89319271204B5091FF199B55EE9C2D963E0FBACBA4F474226DE5D236FADAB8C841C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: b569cdc1653f4c7f6180cbb6e0faa1c39ac808a66fab2fc048e17dcba9d08f51
                                          • Instruction ID: fb4dc5c0484d00056a182ab722e2bf3b0633e4bb861c7e72a4cd4a972a2a9c1e
                                          • Opcode Fuzzy Hash: b569cdc1653f4c7f6180cbb6e0faa1c39ac808a66fab2fc048e17dcba9d08f51
                                          • Instruction Fuzzy Hash: 72319071204B4091FF18DB15EE982D967E0EBA8BA4F575226DE59232F5DFB9C841C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 4217240666-3145022300
                                          • Opcode ID: 4b7540098f8ea2fd8cb3a6c4dc7befb07f8a31645b2c4940871eb245c6e3b5b3
                                          • Instruction ID: 0269e624da69ebceb8614017e485def6846ed320c3a818ec9a0448cdf06ee5c1
                                          • Opcode Fuzzy Hash: 4b7540098f8ea2fd8cb3a6c4dc7befb07f8a31645b2c4940871eb245c6e3b5b3
                                          • Instruction Fuzzy Hash: 8631A671210B00A1FE19EB15EE9C2D963E1EFA9BA0F564221DE59237F5DEB8C941C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: ad4db0a7af812267d7f8cad6930e3dc199e4210e7b6ad20d02838aa8ea755007
                                          • Instruction ID: a768204ef49e43425e0ffc805ace8eae393176569d1b6d78ab1631a15bb4bed0
                                          • Opcode Fuzzy Hash: ad4db0a7af812267d7f8cad6930e3dc199e4210e7b6ad20d02838aa8ea755007
                                          • Instruction Fuzzy Hash: 76319F72204B4091FF19DB15EE982D967A0FBE8FA0F5B1226DE59232F5DEB9C442C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 4059195664-3145022300
                                          • Opcode ID: d94e50aa53ccc9d6944cd3aed90cdf3e84a64a3bd5255cb9728456337b3ddaed
                                          • Instruction ID: cbf0b9081897e53d16ae8631c3de8b8bcb4b1d6aa63a7fa4a14ecb3f0e6e4979
                                          • Opcode Fuzzy Hash: d94e50aa53ccc9d6944cd3aed90cdf3e84a64a3bd5255cb9728456337b3ddaed
                                          • Instruction Fuzzy Hash: 22318175204B0191FF18DB15EE982D967A1EBB8BA4F574226DE5D233E5EBB8C441C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: f6e975c9ed1fc811ddeed3bf09c1872f6a5632ab065b9bea6ee0b1db81a6e053
                                          • Instruction ID: ec065f56cc3ea391e80672e1c853649002f72e233a557602864f0f0132bf02ed
                                          • Opcode Fuzzy Hash: f6e975c9ed1fc811ddeed3bf09c1872f6a5632ab065b9bea6ee0b1db81a6e053
                                          • Instruction Fuzzy Hash: 08319671214F01A1FE18AB19EE9C2E967A0FBB9794F564212DE5E636F5DAB8C841C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: d82304bf4a96c8aa3365fbec0ce9b6afb946fba8665589bd6e4ea4bbafcdc822
                                          • Instruction ID: d8c1682fcd12efc7f437927e36dc46fb0e6878ffe1e8bbea2792015ef24911df
                                          • Opcode Fuzzy Hash: d82304bf4a96c8aa3365fbec0ce9b6afb946fba8665589bd6e4ea4bbafcdc822
                                          • Instruction Fuzzy Hash: 1D31C831204A4191FF18DB15EE982E963A0FBA8BA0F4B5226DE59636F5DFB9C442C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 4059195664-3145022300
                                          • Opcode ID: 1fe0c26a9036abef5ee95c4ac4b3fdedf737f9338d7163a728943c57dc64d707
                                          • Instruction ID: 071c06da19ba80f1764aa241438b3a926bd7cffcf39003d2e3b4a3380dda79d7
                                          • Opcode Fuzzy Hash: 1fe0c26a9036abef5ee95c4ac4b3fdedf737f9338d7163a728943c57dc64d707
                                          • Instruction Fuzzy Hash: 2A31A671208B0192FF1CDB15EE882E967A0FBB87A4F574225DE59636F5EEB4C441C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockcodecvtstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 2760077954-3145022300
                                          • Opcode ID: dc53cec89c99da22bcd306d525d4bf72450f34741b04eaec344622fce76dc459
                                          • Instruction ID: 0f351e83068318956508a3e40f223ea892675a372086301f8adc48da81818fe6
                                          • Opcode Fuzzy Hash: dc53cec89c99da22bcd306d525d4bf72450f34741b04eaec344622fce76dc459
                                          • Instruction Fuzzy Hash: 22319271205B00A1FF199F15EE9C2E967E0FBBC7A4F570266DE59232E5DAB8C481C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 560648410-3145022300
                                          • Opcode ID: cf3a473d4a2924b6d3a61fecd1b2eafc96592f01937f7426af8f1c781fe91554
                                          • Instruction ID: 5c43b2dd988a13b84ce7390f7f119c4131c976ad078df70ce7d11ee456e48bf8
                                          • Opcode Fuzzy Hash: cf3a473d4a2924b6d3a61fecd1b2eafc96592f01937f7426af8f1c781fe91554
                                          • Instruction Fuzzy Hash: 46318371204A8091FF18DB15EE982E963A0FBE8BA4F575226DE59232F5DBB9C441C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 4217240666-3145022300
                                          • Opcode ID: 0aac932d3e7c268931cf707a4d93752f56fee1ca9c031bf76c3d673b10170def
                                          • Instruction ID: 76f7863f544f35a29b041285e781d887ff50f26dcd0c70356e7c9b64c0565869
                                          • Opcode Fuzzy Hash: 0aac932d3e7c268931cf707a4d93752f56fee1ca9c031bf76c3d673b10170def
                                          • Instruction Fuzzy Hash: 1B318171204A4091FF18DB15EE9C2D967E0FBBC7A0F574226DE59236F5DAB8C841C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: 2127f81a5437bb88b075241f3d29aaf0cf321937bbea42743d9c4b13c04cc0b3
                                          • Instruction ID: 2929b8afbad2cbb317daf8da86e3c03f93241f48af02d8928d8a4d56965088dd
                                          • Opcode Fuzzy Hash: 2127f81a5437bb88b075241f3d29aaf0cf321937bbea42743d9c4b13c04cc0b3
                                          • Instruction Fuzzy Hash: C531CE72204B40A1FF189B15EE982D973A0FBB8BA0F4B5326DE59232F5DBB9C451C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: 783429eb793c2f2f50d0740cc6b0d3dbcf1faffe9df41ccb9df6b9a803999d4c
                                          • Instruction ID: 2873de9f1ed39deefdeca74eac1660b120447a4516e882c4cbbac1e0305b22fb
                                          • Opcode Fuzzy Hash: 783429eb793c2f2f50d0740cc6b0d3dbcf1faffe9df41ccb9df6b9a803999d4c
                                          • Instruction Fuzzy Hash: B331B172204B4091FF18DB15EE982D967A0FBACBA0F575226EE59632F5DEB8C841C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 662288457-3145022300
                                          • Opcode ID: 48616abfac1a981897439173c93a6e5aaf7991275bd66df3e03a16717abd7810
                                          • Instruction ID: d6599b8346b26e1536f0db14468457997ff595ba00b29eb8cb7a0e6e36d703b7
                                          • Opcode Fuzzy Hash: 48616abfac1a981897439173c93a6e5aaf7991275bd66df3e03a16717abd7810
                                          • Instruction Fuzzy Hash: F531B371204A8091FF19DB15FE982D963A0FBA8BA0F975225EE59272F5DEB9C841C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 4217240666-3145022300
                                          • Opcode ID: 1ff498fc3fba5fdf49fdedaaaf28a20aa44f259ac781903afc3c6c16cf0d7928
                                          • Instruction ID: cf20141ce3a34c2f870fde248da74980dc3a829e72f0087d2cbf3168db13513f
                                          • Opcode Fuzzy Hash: 1ff498fc3fba5fdf49fdedaaaf28a20aa44f259ac781903afc3c6c16cf0d7928
                                          • Instruction Fuzzy Hash: 08317071204A0091FF28DB15EE9C2D967A0FBA8BA5F474226DE59276E5DBB8C842C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 560648410-3145022300
                                          • Opcode ID: 7e8749b240ba5670e75988a1d08956d1c9e00ca2f6b9f8a9a670e6f4b17f3c11
                                          • Instruction ID: 50fbb8fbfbee27f14a0ac6a313127ada4b271025dca01a20add21c0f715cf4f0
                                          • Opcode Fuzzy Hash: 7e8749b240ba5670e75988a1d08956d1c9e00ca2f6b9f8a9a670e6f4b17f3c11
                                          • Instruction Fuzzy Hash: 4C31A871210B00A1FE18EF15EEDC2D963E1EBA9BA0F564311DE59636F9DAB8C941C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacet__int64_lockstd::locale::_
                                          • String ID: bad cast
                                          • API String ID: 1666373992-3145022300
                                          • Opcode ID: 93a5699e027cb8ef89e0de3b46b91101183ef16d26cf5389666435c13f441cb5
                                          • Instruction ID: 0e203d4bb6cdd5eecb94d26d0595394c8edcf9aaf2d3888e3e546ff655183fc2
                                          • Opcode Fuzzy Hash: 93a5699e027cb8ef89e0de3b46b91101183ef16d26cf5389666435c13f441cb5
                                          • Instruction Fuzzy Hash: DC312C32119E8482EE64DB14E9C839AB7A0FB987A4F550211EEDD537A9DF78C654CB00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getfacet__int64_lockstd::locale::_
                                          • String ID: bad cast
                                          • API String ID: 1666373992-3145022300
                                          • Opcode ID: d78c58cc6dc32a45fa35aa0ea62847462abab04b09d4575ad04a92c308c6451f
                                          • Instruction ID: d9dcf29c395782fb6d05e6e9d2d968b0b25c9a9593855663970458252f08a661
                                          • Opcode Fuzzy Hash: d78c58cc6dc32a45fa35aa0ea62847462abab04b09d4575ad04a92c308c6451f
                                          • Instruction Fuzzy Hash: 3031FA32118A8492EE649B15E98839EB7A0FBD87A4F510211EEDE537A9DF79C244CB00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 885392049-3145022300
                                          • Opcode ID: 9ba023ed03df909f6066c7b5c14fd05801aa9986d2c2f223f424258040ee7ccc
                                          • Instruction ID: dc535fd1ab7b686b7279b34ac6bd70b4770575e9a22d622f209aacf1a57028bb
                                          • Opcode Fuzzy Hash: 9ba023ed03df909f6066c7b5c14fd05801aa9986d2c2f223f424258040ee7ccc
                                          • Instruction Fuzzy Hash: D2319071204B0192FF18DB15EE982D967A0FBA87A4F4B4226DE69632F5EAB8C441C300
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 885392049-3145022300
                                          • Opcode ID: 4ee676152d8a6d3fc2897e1a750d37abcf8e05a29651dc9c84745b4ac20e915c
                                          • Instruction ID: 67a5e8cb822a087ca7210aaa04c2a819fc8f4cf21c3dc9ed4ea7c2b8211a905c
                                          • Opcode Fuzzy Hash: 4ee676152d8a6d3fc2897e1a750d37abcf8e05a29651dc9c84745b4ac20e915c
                                          • Instruction Fuzzy Hash: 1E316F72204B4191FF18DB15FE982D967A0FBA87A4F4B4226DE59632F5EAB8C4428700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                          • String ID: bad cast
                                          • API String ID: 885392049-3145022300
                                          • Opcode ID: 61d228dc35f4783f95f4f267f4efbd83b46e62b23daaabd50ddf3d7b4201f6b8
                                          • Instruction ID: 678e7a917330b0ff60048b9697d77cda5bfa93de7beea0eaec39c8b581aecd59
                                          • Opcode Fuzzy Hash: 61d228dc35f4783f95f4f267f4efbd83b46e62b23daaabd50ddf3d7b4201f6b8
                                          • Instruction Fuzzy Hash: D9319371204A4191FF18DB15EED82D963A0EBB87A4F5B4226DE59232E5EEB8C445C700
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: free$Sleep_malloc_crtmalloc
                                          • String ID:
                                          • API String ID: 2523592665-0
                                          • Opcode ID: caada0040375c754c365269c74eac08a2c7c6ecaf5709b2b132bd05a7a63ca1e
                                          • Instruction ID: fed4e2a26c53fb897ddbc2f3ae2e0420f99ef3847fb558fa13997109fd096ea6
                                          • Opcode Fuzzy Hash: caada0040375c754c365269c74eac08a2c7c6ecaf5709b2b132bd05a7a63ca1e
                                          • Instruction Fuzzy Hash: EA617132301B4092FF28EB16EE9879A73E0FB58798F5A4125DE4D17B51DFB8C4658780
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: codecvtshared_ptr
                                          • String ID: bad conversion
                                          • API String ID: 864914841-2629740042
                                          • Opcode ID: f686c19bb21e7c99195cfd856166b89ac244ed319bd7e827f4bfb7f3c19f572a
                                          • Instruction ID: 711973c32c7423069f81b50ff20dfcd9e1f7e334c96268e03272493047297479
                                          • Opcode Fuzzy Hash: f686c19bb21e7c99195cfd856166b89ac244ed319bd7e827f4bfb7f3c19f572a
                                          • Instruction Fuzzy Hash: 8F912372219AC496FE78DB15E9853DEA3A0FBE9780F510112DACD53BA9DFB8C544CB00
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: _errno_invalid_parameter_noinfo$_getptd_noexit
                                          • String ID:
                                          • API String ID: 1573762532-0
                                          • Opcode ID: e6115aaee9bd6988ad82c43c6dd58144aeb0dd506a0ad067c6414fbe19083d80
                                          • Instruction ID: 73edfe043e39a0ef7c57a236c037b2fd2ae72b4917a723f5a0d091964a556de6
                                          • Opcode Fuzzy Hash: e6115aaee9bd6988ad82c43c6dd58144aeb0dd506a0ad067c6414fbe19083d80
                                          • Instruction Fuzzy Hash: 4D4115F26002A181FF6C9B11AAC83F976E0EF68B94FA64111EF84276D5D7B8C951C750
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Locale_errno_invalid_parameter_noinfo$UpdateUpdate::__getptd_noexit
                                          • String ID:
                                          • API String ID: 781512312-0
                                          • Opcode ID: dfee2ec86327835073bb60d14cfa61aec5f3f40ef22b560a8e2aa4c0f90f1485
                                          • Instruction ID: 4342de4fbd4844649b6e7624534b2f91bb384828f7f7f836dc25dfb052eac83f
                                          • Opcode Fuzzy Hash: dfee2ec86327835073bb60d14cfa61aec5f3f40ef22b560a8e2aa4c0f90f1485
                                          • Instruction Fuzzy Hash: D2413A726102E041FF6C6B129EDC3F933E0EB78BA5FA64026EE94276C4D7A8C851D740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                          • String ID:
                                          • API String ID: 3191669884-0
                                          • Opcode ID: ec2a6dd435b50d5e993b3328a406cbf0fc12b9938289ae1a38fd3c4af6446b14
                                          • Instruction ID: 9f651e50367f1261f9d8d78e6e368b3066b7e8d8ff2f046c6dd2b236f61a6eab
                                          • Opcode Fuzzy Hash: ec2a6dd435b50d5e993b3328a406cbf0fc12b9938289ae1a38fd3c4af6446b14
                                          • Instruction Fuzzy Hash: 0131A27160478085FF249B11AAC87DD77E4EBACBE0F264125EE5427B95DBB4C841CB80
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: _getptd
                                          • String ID: MOC$RCC$csm
                                          • API String ID: 3186804695-2671469338
                                          • Opcode ID: 79c6bdfdf6facc246eee842b2de7a644aa034f1ac0e2309a20206dc5bd345c8d
                                          • Instruction ID: f6381a537bde3cc05dcb3aaea48f669003612e7541ca17c78bc43cab69cc7a07
                                          • Opcode Fuzzy Hash: 79c6bdfdf6facc246eee842b2de7a644aa034f1ac0e2309a20206dc5bd345c8d
                                          • Instruction Fuzzy Hash: 5EF0F835610104DAFE692B549A893E821D1ABBCB0EF87C561DA052268297FC49A5CB12
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getlocstrcspn$Mpunctlocaleconv
                                          • String ID:
                                          • API String ID: 897058063-0
                                          • Opcode ID: e6d4c13a13f37a2c0e240a87e1a0af4942c429ab79be8636b1550a59db188ce2
                                          • Instruction ID: f355cf0e2c9783e46565b2eba670e54e53272f8a30d331a443df5e3a3512bf11
                                          • Opcode Fuzzy Hash: e6d4c13a13f37a2c0e240a87e1a0af4942c429ab79be8636b1550a59db188ce2
                                          • Instruction Fuzzy Hash: 21E1D032704A8099FF188F65C9892EC73F1EB6CB88F564119DE4967B88EFB8C546C344
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getlocstrcspn$Mpunctlocaleconv
                                          • String ID:
                                          • API String ID: 897058063-0
                                          • Opcode ID: 519f33cb95e0d99ee0d4355dc84f9f0201176b2b605b694342907c18314ab85a
                                          • Instruction ID: b5eb2b49eae42b311d221d4dc139a673a80938b26429afc6e1957ffa8a49916b
                                          • Opcode Fuzzy Hash: 519f33cb95e0d99ee0d4355dc84f9f0201176b2b605b694342907c18314ab85a
                                          • Instruction Fuzzy Hash: BBE1D232704A8099FF188FA5C9893EC63F1FB68B88F564119DE4967B89EFB8C545C344
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getlocstrcspn$Mpunctlocaleconv
                                          • String ID:
                                          • API String ID: 897058063-0
                                          • Opcode ID: 249c8184b0c50b0624f1531bd89af645a8e4f17256f81473f5670aed722e2b0a
                                          • Instruction ID: d1de79735f78e1b40d12cb3ecccb95e22e0cce8ef8e68c3606b3158ee562e0af
                                          • Opcode Fuzzy Hash: 249c8184b0c50b0624f1531bd89af645a8e4f17256f81473f5670aed722e2b0a
                                          • Instruction Fuzzy Hash: 72D19E32B04A858AFF148FB5D9942DC27B1FB6DB88F955115DE8A27B8ACF78C146C340
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: char_traits$Lockitstd::_$GetfacetLockit::_Lockit::~___int64ctypestd::ios_base::getlocstd::ios_base::widthstd::locale::_std::locale::locale
                                          • String ID:
                                          • API String ID: 2740546168-0
                                          • Opcode ID: a07e37d6cc49bf2a2ce72d55d671cce5715a6d797d1835dc9c2bdc10f607b4b5
                                          • Instruction ID: 2f3addf84ea29b484498d632f135c20348e552cd6f30660a28a718464e8d2d66
                                          • Opcode Fuzzy Hash: a07e37d6cc49bf2a2ce72d55d671cce5715a6d797d1835dc9c2bdc10f607b4b5
                                          • Instruction Fuzzy Hash: ECC1EC36208BC486EE74DB15E5953AEB7A0FBD8784F418516EE8E53B69DF7CC5408B00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                                          • String ID: :
                                          • API String ID: 1584724053-336475711
                                          • Opcode ID: f6eab2cf8d0451a383fcd1094c8bc586515c01fa06371aa533fca521f759249e
                                          • Instruction ID: 213073ed2545693c53a590898a5a734a02024ffd9cd2056aa9dddb9828cc72d4
                                          • Opcode Fuzzy Hash: f6eab2cf8d0451a383fcd1094c8bc586515c01fa06371aa533fca521f759249e
                                          • Instruction Fuzzy Hash: DB41BD32721B4482FE08AB26AA897DD63E5FB58BC8F4A9425DF5D27745DE74D422C300
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Fgetc
                                          • String ID:
                                          • API String ID: 1720979605-0
                                          • Opcode ID: af233356ab44033a1af5434a4fe9d0445c43cbdf01476d6f5b86da92ac9fc8ae
                                          • Instruction ID: cbf4492061977f0743162293471f451a54141dd81655eb69b24b0602207f5e04
                                          • Opcode Fuzzy Hash: af233356ab44033a1af5434a4fe9d0445c43cbdf01476d6f5b86da92ac9fc8ae
                                          • Instruction Fuzzy Hash: 9CA16B31209A8086FE64DB11ED993EFB3E0FBE8790F514121EA8D5369ADFB8C545CB00
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_Mpunctstd::ios_base::getloc$Stoulxstd::locale::locale
                                          • String ID:
                                          • API String ID: 3293814644-0
                                          • Opcode ID: 1b6468ebf12914b2f0fe8338e001e18fabad8228a10c305a24cbb031952596d2
                                          • Instruction ID: ea41c785ae6342edc8bd5a49e65bd879c244b1cac69db417a7680f9749b4a433
                                          • Opcode Fuzzy Hash: 1b6468ebf12914b2f0fe8338e001e18fabad8228a10c305a24cbb031952596d2
                                          • Instruction Fuzzy Hash: 9B51F132701A80A6FF18DBA5E9886DE73B0FB99B98F020516EE4927B98DE74C405C740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Lockitstd::_$Lockit::_Lockit::~_Mpunctstd::ios_base::getloc$Stoulxstd::locale::locale
                                          • String ID:
                                          • API String ID: 3293814644-0
                                          • Opcode ID: ba231bb55e8ad13bb8c84fadf00820e2b831a140557f64e95a63da8dc5e447dc
                                          • Instruction ID: 7a4d8ed864b14cd8cb0c5ad9da132b0b79717bd26bb6438af9328590b8c1d360
                                          • Opcode Fuzzy Hash: ba231bb55e8ad13bb8c84fadf00820e2b831a140557f64e95a63da8dc5e447dc
                                          • Instruction Fuzzy Hash: A651CC36710A40A6FF18DFA6D9886DE73F0FB99B98F020516EE4927B98DE74C405C740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
                                          • String ID:
                                          • API String ID: 2998201375-0
                                          • Opcode ID: 1d846ac782697e1626f60741b10654be5d980ecfef08fe52ee6ab297ca0a43db
                                          • Instruction ID: cc932a5d8f087ad41b0ffa36bbe1af79002c7cd2181a816ba9519a02606114ba
                                          • Opcode Fuzzy Hash: 1d846ac782697e1626f60741b10654be5d980ecfef08fe52ee6ab297ca0a43db
                                          • Instruction Fuzzy Hash: CA41C57121478086FF648F15EAC83A977E6FFA8B88F154115EF4A67FA5CB74C4618700
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: char_traits
                                          • String ID:
                                          • API String ID: 1158913984-0
                                          • Opcode ID: efd17d778424b9709a2ebecd350b9a00f791cf1ba8a6ebccbfb2f640782f2fd7
                                          • Instruction ID: e735e58ac5b20e5a4becc451439917a5948736ee6def139c5859b7de95fe4ffd
                                          • Opcode Fuzzy Hash: efd17d778424b9709a2ebecd350b9a00f791cf1ba8a6ebccbfb2f640782f2fd7
                                          • Instruction Fuzzy Hash: F441533211454492FE18EB15E9993EA63F0FFE9784F550012FB8D97AEADFA8CA04C740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: _getptd$_inconsistency$DecodePointer_amsg_exit_getptd_noexit
                                          • String ID:
                                          • API String ID: 3669027769-0
                                          • Opcode ID: d84545b744132abf258f2739307021ab7867776e2950de2c885c0764620f8872
                                          • Instruction ID: 302e82750eadd484d11e154dcda343012944853f7781bc4d32bf9748f46fa5b3
                                          • Opcode Fuzzy Hash: d84545b744132abf258f2739307021ab7867776e2950de2c885c0764620f8872
                                          • Instruction Fuzzy Hash: CBF0543120058080FE6CAB51E7C92EC52D19F7CB4CF0E4521EE45276879EF0C871C354
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: _getptd$_inconsistency$DestructExceptionObject
                                          • String ID: csm
                                          • API String ID: 2821275340-1018135373
                                          • Opcode ID: 242ad1541a1665e7e88aaf19789ec1deda19dbf05a08f0dcd3087e0f0a85a81f
                                          • Instruction ID: 76b754e320b09a59e6074dfb8de8a5323a43c42b20e290a4e162413a7e31635f
                                          • Opcode Fuzzy Hash: 242ad1541a1665e7e88aaf19789ec1deda19dbf05a08f0dcd3087e0f0a85a81f
                                          • Instruction Fuzzy Hash: B1014F3210164189FF289F31ADC93ED33E4EB68B5DF1A6521ED0A5A645EEB0D895C390
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: _wfsopen$fclosefseek
                                          • String ID:
                                          • API String ID: 1261181034-0
                                          • Opcode ID: 66608ed3d9a3b7f166453832a9f1b2a902d53ff026ec2d0a3286f5d598873d35
                                          • Instruction ID: e76c0561fcf1a5bdcae2eae08a4dd340ed30c57f18b5fcdf034f937ff3985cf3
                                          • Opcode Fuzzy Hash: 66608ed3d9a3b7f166453832a9f1b2a902d53ff026ec2d0a3286f5d598873d35
                                          • Instruction Fuzzy Hash: 1E21E13172065084FF6CCB069AC97EA23D1AFACB84F1F4128CE4BA3791DEB9C4028740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                          • String ID:
                                          • API String ID: 4151157258-0
                                          • Opcode ID: eb64e8c74a50022202f8ee626fe7dbe8f97126340f84a3ce38f6fe5f0cae3986
                                          • Instruction ID: fb5789cb64487bd73aa304beb16634342626ddc9766856ecfbceed18c9b2fdf6
                                          • Opcode Fuzzy Hash: eb64e8c74a50022202f8ee626fe7dbe8f97126340f84a3ce38f6fe5f0cae3986
                                          • Instruction Fuzzy Hash: EF212B721082B440FF6816159AD83FDB7D0EB6CBD4F3A4169EE86676C5C9ACC4418750
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: _errno_invalid_parameter_noinfofpos$_fseeki64fgetpos
                                          • String ID:
                                          • API String ID: 1989672365-0
                                          • Opcode ID: e02842f5a42da3625d84d50036dede68edc7dbfdcb998bdce8beb25ad7a6383a
                                          • Instruction ID: 16380b2a70ff03ba3a4d236e92eba8c210a008efff6bae3a6b71b9df082a8eaf
                                          • Opcode Fuzzy Hash: e02842f5a42da3625d84d50036dede68edc7dbfdcb998bdce8beb25ad7a6383a
                                          • Instruction Fuzzy Hash: 3631FF76204A8082EE14DB16E9C839A67F0FBD97D4F554025EF8C57B6ACFB9C610CB40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$LocinfoLocinfo::_$GettnamesLocinfo::~_freemalloc
                                          • String ID:
                                          • API String ID: 409281135-0
                                          • Opcode ID: d8e69efa26ad0008533831846f76d24351a0b3f39eb347073c5dfcd3e47a997e
                                          • Instruction ID: af617c822b44380bb9c0f10be5d5a5182f0b2eb652a74e7e7add4228a24d5b68
                                          • Opcode Fuzzy Hash: d8e69efa26ad0008533831846f76d24351a0b3f39eb347073c5dfcd3e47a997e
                                          • Instruction Fuzzy Hash: 4C216872201F4091FF28CF11EA983A973E4FBA8BA4F864225CE5857794DFB8C911C380
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$LocinfoLocinfo::_$GettnamesLocinfo::~_freemalloc
                                          • String ID:
                                          • API String ID: 409281135-0
                                          • Opcode ID: ee97dc229c5cd99bb1ca05c9355866ee283a5751f5faa2f00eedab80158d67f4
                                          • Instruction ID: 0c0eb3bb659011b88cd4c0e76447a23f09a4c1fef0be779599cee38a55cac23b
                                          • Opcode Fuzzy Hash: ee97dc229c5cd99bb1ca05c9355866ee283a5751f5faa2f00eedab80158d67f4
                                          • Instruction Fuzzy Hash: BB215A72301B4481FF28CF11DA983E963E4FBA8B98F864269CE5857395DFB8C915C780
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$LocinfoLocinfo::_$GettnamesLocinfo::~_freemalloc
                                          • String ID:
                                          • API String ID: 409281135-0
                                          • Opcode ID: 1c985824af1acae9496c5e71a96abd0544d665edfd3f96118f34935afdf6e220
                                          • Instruction ID: dddbcc8d82365a4bfdb9a4681ebfc64875a8a0246a635004a3f727f1fa51b0d8
                                          • Opcode Fuzzy Hash: 1c985824af1acae9496c5e71a96abd0544d665edfd3f96118f34935afdf6e220
                                          • Instruction Fuzzy Hash: 4C216972301B4481FF28CF15DA9839963E4FBA8BA4F874229CE6857395DFB8C955C740
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: fpos$_fseeki64fgetpos
                                          • String ID:
                                          • API String ID: 1811617113-0
                                          • Opcode ID: 4dd5a6bf44b4f08af2fe84d530f4457cc968653dd13fc1324dcdb608c86c5414
                                          • Instruction ID: 6ce51f498b8cd1f4d07879dcba5afbcd844e500cd73fd0587b1798890fdd7086
                                          • Opcode Fuzzy Hash: 4dd5a6bf44b4f08af2fe84d530f4457cc968653dd13fc1324dcdb608c86c5414
                                          • Instruction Fuzzy Hash: 31312172204A8486FE54DB15E98839AA7F0FBE9794F114011EF8C53BAACFB9C944CB40
                                          APIs
                                          • std::locale::_Locimp::_New_Locimp.LIBCPMT ref: 0000021E04C7B6FB
                                            • Part of subcall function 0000021E04C7BE18: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0000021E04C7BE46
                                          • __int64.LIBCPMTD ref: 0000021E04C7B717
                                            • Part of subcall function 0000021E04C71AF0: std::_Lockit::_Lockit.LIBCPMT ref: 0000021E04C71B0B
                                            • Part of subcall function 0000021E04C71AF0: std::_Lockit::~_Lockit.LIBCPMT ref: 0000021E04C71B3D
                                          • _aligned_msize.LIBCMTD ref: 0000021E04C7B72C
                                            • Part of subcall function 0000021E04C71C30: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0000021E04C71C52
                                          • codecvt.LIBCPMTD ref: 0000021E04C7B735
                                            • Part of subcall function 0000021E04C72270: std::locale::c_str.LIBCPMTD ref: 0000021E04C722D2
                                            • Part of subcall function 0000021E04C72270: std::_Locinfo::_Locinfo.LIBCPMTD ref: 0000021E04C722DF
                                            • Part of subcall function 0000021E04C72270: collate.LIBCPMTD ref: 0000021E04C7230B
                                            • Part of subcall function 0000021E04C72270: std::_Locinfo::~_Locinfo.LIBCPMTD ref: 0000021E04C7234F
                                            • Part of subcall function 0000021E04C74ED0: Concurrency::cancellation_token::_Clear.LIBCPMTD ref: 0000021E04C74EF8
                                            • Part of subcall function 0000021E04C74ED0: malloc.LIBCMT ref: 0000021E04C74F51
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Locimp::_std::locale::_$LocimpLocinfoLockit$AddfacClearConcurrency::cancellation_token::_Locimp_Locinfo::_Locinfo::~_Lockit::_Lockit::~_New___int64_aligned_msizecodecvtcollatemallocstd::locale::c_str
                                          • String ID:
                                          • API String ID: 1811419688-0
                                          • Opcode ID: 7af322f36f17e67862f741fc24bfc0139ff588b013d2130c712c45a990bd171e
                                          • Instruction ID: 5e67eaffbaccd1017c4181b8bbb842b917a46f76dc74a666a0001e287d54ffa4
                                          • Opcode Fuzzy Hash: 7af322f36f17e67862f741fc24bfc0139ff588b013d2130c712c45a990bd171e
                                          • Instruction Fuzzy Hash: 5A018032215B4482EE48DB2AE9D938A73A0FBD8BE4F414211EE9E137A5CF78C5548700
                                          APIs
                                          • std::bad_exception::bad_exception.LIBCMTD ref: 0000021E04C721AA
                                            • Part of subcall function 0000021E04C71F60: std::locale::facet::facet.LIBCPMTD ref: 0000021E04C71F78
                                          • std::_Locinfo::_Locinfo.LIBCPMTD ref: 0000021E04C721CE
                                            • Part of subcall function 0000021E04C717E0: std::_Lockit::_Lockit.LIBCPMT ref: 0000021E04C71801
                                            • Part of subcall function 0000021E04C717E0: _Yarn.LIBCPMTD ref: 0000021E04C71813
                                            • Part of subcall function 0000021E04C717E0: _Yarn.LIBCPMTD ref: 0000021E04C71825
                                            • Part of subcall function 0000021E04C717E0: _Yarn.LIBCPMTD ref: 0000021E04C71837
                                            • Part of subcall function 0000021E04C717E0: _Yarn.LIBCPMTD ref: 0000021E04C71849
                                            • Part of subcall function 0000021E04C717E0: _Yarn.LIBCPMTD ref: 0000021E04C7185B
                                            • Part of subcall function 0000021E04C717E0: _Yarn.LIBCPMTD ref: 0000021E04C7186D
                                            • Part of subcall function 0000021E04C717E0: std::bad_exception::bad_exception.LIBCMTD ref: 0000021E04C71887
                                            • Part of subcall function 0000021E04C717E0: _CxxThrowException.LIBCMT ref: 0000021E04C71898
                                            • Part of subcall function 0000021E04C717E0: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0000021E04C718A7
                                          • codecvt.LIBCPMTD ref: 0000021E04C721E1
                                            • Part of subcall function 0000021E04C723A0: std::_Locinfo::_Getcvt.LIBCPMTD ref: 0000021E04C723CC
                                          • std::_Locinfo::~_Locinfo.LIBCPMTD ref: 0000021E04C721EC
                                            • Part of subcall function 0000021E04C718C0: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0000021E04C718CE
                                            • Part of subcall function 0000021E04C718C0: std::_Lockit::~_Lockit.LIBCPMT ref: 0000021E04C71941
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::_$Yarn$Locinfo::_$LocinfoLockitstd::bad_exception::bad_exception$ExceptionGetcvtLocinfo::~_Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_Throwcodecvtstd::locale::facet::facet
                                          • String ID:
                                          • API String ID: 2580637281-0
                                          • Opcode ID: adcdcac3d387f150fc2c396cd21c3c6a73979b2da0c270e4eb99f33f457a8872
                                          • Instruction ID: 593049bd70d016f61c31e625f00b8cdb191f9f7d1cb48db898dd6fe46b6b753d
                                          • Opcode Fuzzy Hash: adcdcac3d387f150fc2c396cd21c3c6a73979b2da0c270e4eb99f33f457a8872
                                          • Instruction Fuzzy Hash: 08F04932225BC092EE60DB24E8853DA7361FBD57A0F415211EAED53BE9CF6CC208CB01
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getlocswprintf
                                          • String ID: %.0Lf
                                          • API String ID: 2734600178-1402515088
                                          • Opcode ID: 0b52692e544fc50670088c299cef916147423b381afed6a016f19d8ad1928563
                                          • Instruction ID: a2e3283749ed12073c435030a0ba7c6d747c35d896ac06a0e7d85ce050d83213
                                          • Opcode Fuzzy Hash: 0b52692e544fc50670088c299cef916147423b381afed6a016f19d8ad1928563
                                          • Instruction Fuzzy Hash: 35519B33714B8096FB01CBA6E9883DD63B0EB98798F114216EE5D67B98DF78C44AC700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000003.00000002.4684051974.0000021E04C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021E04C70000, based on PE: true
                                          • Associated: 00000003.00000002.4684051974.0000021E04D18000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_3_2_21e04c70000_rundll32.jbxd
                                          Similarity
                                          • API ID: std::ios_base::getlocswprintf
                                          • String ID: %.0Lf
                                          • API String ID: 2734600178-1402515088
                                          • Opcode ID: 4ecb6063488c6e6240f3922736982e1e2cd0c6d48fa5f7eaa1debd812ab1ff6c
                                          • Instruction ID: 9ab9041f503ddbcff8c23c98e0fac9fc4f9dda570b37eba108142905b82c4fa8
                                          • Opcode Fuzzy Hash: 4ecb6063488c6e6240f3922736982e1e2cd0c6d48fa5f7eaa1debd812ab1ff6c
                                          • Instruction Fuzzy Hash: 3651FF32704B8096FB11CB75E9883DD67B0EBA9798F510212EE5A37B99DF78C04AC700