Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1582593
MD5:b3fad209b07f4d66570c24a40f30d5c7
SHA1:0bd9c9aee1eafebdb435593c393392753b879e0f
SHA256:f8840621ccce4e993283ac91d322c35cacd42619856477e057eac1cb1127bd6b
Tags:exeMeduzaMeduzaStealeruser-aachum
Infos:

Detection

Meduza Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Meduza Stealer
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Self deletion via cmd or bat file
Sigma detected: Suspicious Ping/Del Command Combination
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Terminates after testing mutex exists (may check infected machine status)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Loader.exe (PID: 7608 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: B3FAD209B07F4D66570C24A40F30D5C7)
    • Loader.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: B3FAD209B07F4D66570C24A40F30D5C7)
      • cmd.exe (PID: 7816 cmdline: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\Loader.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • PING.EXE (PID: 7860 cmdline: ping 1.1.1.1 -n 1 -w 3000 MD5: 2F46799D79D22AC72C241EC0322B011D)
  • cleanup
{"C2 url": "147.45.44.216", "anti_vm": true, "anti_dbg": true, "port": 15666, "build_name": "37", "self_destruct": true, "extensions": "", "links": "", "grabber_max_size": 1048576}
SourceRuleDescriptionAuthorStrings
00000001.00000002.1829787979.0000029E6C117000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
    00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
      00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmpinfostealer_win_meduzastealerFinds MeduzaStealer samples based on specific stringsSekoia.io
      • 0x11292c:$str01: emoji
      • 0x1154b8:$str02: %d-%m-%Y, %H:%M:%S
      • 0x115528:$str03: [UTC
      • 0x115530:$str04: user_name
      • 0x115578:$str05: computer_name
      • 0x115550:$str06: timezone
      • 0x115488:$str07: current_path()
      • 0x1128f0:$str08: [json.exception.
      • 0x12cf12:$str09: GDI32.dll
      • 0x12d184:$str10: GdipGetImageEncoders
      • 0x12d1fc:$str10: GdipGetImageEncoders
      • 0x12c7b0:$str11: GetGeoInfoA
      Process Memory Space: Loader.exe PID: 7624JoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
        Process Memory Space: Loader.exe PID: 7624JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          SourceRuleDescriptionAuthorStrings
          1.2.Loader.exe.140000000.0.unpackJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
            1.2.Loader.exe.140000000.0.unpackinfostealer_win_meduzastealerFinds MeduzaStealer samples based on specific stringsSekoia.io
            • 0x11152c:$str01: emoji
            • 0x1140b8:$str02: %d-%m-%Y, %H:%M:%S
            • 0x114128:$str03: [UTC
            • 0x114130:$str04: user_name
            • 0x114178:$str05: computer_name
            • 0x114150:$str06: timezone
            • 0x114088:$str07: current_path()
            • 0x1114f0:$str08: [json.exception.
            • 0x12bb12:$str09: GDI32.dll
            • 0x12bd84:$str10: GdipGetImageEncoders
            • 0x12bdfc:$str10: GdipGetImageEncoders
            • 0x12b3b0:$str11: GetGeoInfoA
            1.2.Loader.exe.140000000.0.raw.unpackJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
              1.2.Loader.exe.140000000.0.raw.unpackinfostealer_win_meduzastealerFinds MeduzaStealer samples based on specific stringsSekoia.io
              • 0x11292c:$str01: emoji
              • 0x1154b8:$str02: %d-%m-%Y, %H:%M:%S
              • 0x115528:$str03: [UTC
              • 0x115530:$str04: user_name
              • 0x115578:$str05: computer_name
              • 0x115550:$str06: timezone
              • 0x115488:$str07: current_path()
              • 0x1128f0:$str08: [json.exception.
              • 0x12cf12:$str09: GDI32.dll
              • 0x12d184:$str10: GdipGetImageEncoders
              • 0x12d1fc:$str10: GdipGetImageEncoders
              • 0x12c7b0:$str11: GetGeoInfoA

              System Summary

              barindex
              Source: Process startedAuthor: Ilya Krestinichev: Data: Command: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\Loader.exe", CommandLine: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\Loader.exe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Loader.exe", ParentImage: C:\Users\user\Desktop\Loader.exe, ParentProcessId: 7624, ParentProcessName: Loader.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\Loader.exe", ProcessId: 7816, ProcessName: cmd.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-31T00:52:02.424899+010020463031A Network Trojan was detected192.168.2.449730147.45.44.21615666TCP
              2024-12-31T00:52:02.430129+010020463031A Network Trojan was detected192.168.2.449730147.45.44.21615666TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-31T00:52:02.424899+010020508071A Network Trojan was detected192.168.2.449730147.45.44.21615666TCP
              2024-12-31T00:52:02.430129+010020508071A Network Trojan was detected192.168.2.449730147.45.44.21615666TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 1.2.Loader.exe.140000000.0.raw.unpackMalware Configuration Extractor: Meduza Stealer {"C2 url": "147.45.44.216", "anti_vm": true, "anti_dbg": true, "port": 15666, "build_name": "37", "self_destruct": true, "extensions": "", "links": "", "grabber_max_size": 1048576}
              Source: Loader.exeReversingLabs: Detection: 39%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140076AA0 CryptUnprotectData,LocalFree,1_2_0000000140076AA0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400D3090 CryptUnprotectData,1_2_00000001400D3090
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400772C0 BCryptCloseAlgorithmProvider,1_2_00000001400772C0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140077340 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,Concurrency::cancel_current_task,1_2_0000000140077340
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400D3658 BCryptCloseAlgorithmProvider,1_2_00000001400D3658
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140033A30 BCryptDestroyKey,1_2_0000000140033A30
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140036C90 CryptUnprotectData,LocalFree,1_2_0000000140036C90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140076DC0 CryptProtectData,LocalFree,1_2_0000000140076DC0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140076F20 BCryptDecrypt,BCryptDecrypt,1_2_0000000140076F20
              Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49731 version: TLS 1.2
              Source: Loader.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E3CA90 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF7E4E3CA90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400B9DB8 FindClose,FindFirstFileExW,GetLastError,1_2_00000001400B9DB8
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400D3100 FindFirstFileW,1_2_00000001400D3100
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400B9E68 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,1_2_00000001400B9E68
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00007FF7E4E3CAF1 FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF7E4E3CAF1

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2046303 - Severity 1 - ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M1 : 192.168.2.4:49730 -> 147.45.44.216:15666
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000
              Source: global trafficTCP traffic: 192.168.2.4:49730 -> 147.45.44.216:15666
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
              Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
              Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: Network trafficSuricata IDS: 2050807 - Severity 1 - ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP) : 192.168.2.4:49730 -> 147.45.44.216:15666
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.216
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400840A0 InternetOpenA,InternetOpenUrlA,HttpQueryInfoW,HttpQueryInfoW,InternetQueryDataAvailable,InternetReadFile,InternetQueryDataAvailable,InternetCloseHandle,Concurrency::cancel_current_task,1_2_00000001400840A0
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: api.ipify.org
              Source: Loader.exe, 00000001.00000003.1828750732.0000029E6E9B4000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1828719030.0000029E6E9B0000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1676773188.0000029E6E9A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.microsoft.t/Regi
              Source: Loader.exe, 00000001.00000002.1829787979.0000029E6C117000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
              Source: Loader.exe, 00000001.00000002.1829787979.0000029E6C117000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/B
              Source: Loader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
              Source: Loader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
              Source: Loader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
              Source: Loader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: Loader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
              Source: Loader.exe, 00000001.00000003.1694149732.0000029E6E000000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692144032.0000029E6EDFF000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692025439.0000029E6E008000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692831305.0000029E6EDF7000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692144032.0000029E6ED08000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1694414972.0000029E6EEC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
              Source: Loader.exe, 00000001.00000003.1697408114.0000029E6F80C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: Loader.exe, 00000001.00000003.1697408114.0000029E6F80C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
              Source: Loader.exe, 00000001.00000003.1679960665.0000029E6ED87000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1680614566.0000029E6EC89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
              Source: Loader.exe, 00000001.00000003.1679763052.0000029E6C1AB000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECE6000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECDB000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ED10000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECF7000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1679960665.0000029E6ED62000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1679544542.0000029E6ECA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
              Source: Loader.exe, 00000001.00000003.1679960665.0000029E6ED87000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1680614566.0000029E6EC89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
              Source: Loader.exe, 00000001.00000003.1679763052.0000029E6C1AB000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECE6000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECDB000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ED10000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECF7000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1679960665.0000029E6ED62000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1679544542.0000029E6ECA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
              Source: Loader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
              Source: Loader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
              Source: Loader.exe, 00000001.00000003.1694149732.0000029E6E000000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692144032.0000029E6EDFF000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692025439.0000029E6E008000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692831305.0000029E6EDF7000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692144032.0000029E6ED08000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1694414972.0000029E6EEC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
              Source: Loader.exe, 00000001.00000003.1697408114.0000029E6F80C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
              Source: Loader.exe, 00000001.00000003.1697408114.0000029E6F80C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
              Source: Loader.exe, 00000001.00000003.1692144032.0000029E6EE07000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692025439.0000029E6E00F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1697408114.0000029E6F80C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
              Source: Loader.exe, 00000001.00000003.1697408114.0000029E6F80C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: Loader.exe, 00000001.00000003.1692144032.0000029E6EE07000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692025439.0000029E6E00F000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1697408114.0000029E6F80C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
              Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49731 version: TLS 1.2
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400849D0 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetDC,GetDeviceCaps,GetDeviceCaps,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SHCreateMemStream,SelectObject,DeleteDC,ReleaseDC,DeleteObject,EnterCriticalSection,LeaveCriticalSection,IStream_Size,IStream_Reset,IStream_Read,SelectObject,DeleteDC,ReleaseDC,DeleteObject,1_2_00000001400849D0

              System Summary

              barindex
              Source: 1.2.Loader.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Finds MeduzaStealer samples based on specific strings Author: Sekoia.io
              Source: 1.2.Loader.exe.140000000.0.raw.unpack, type: UNPACKEDPEMatched rule: Finds MeduzaStealer samples based on specific strings Author: Sekoia.io
              Source: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Finds MeduzaStealer samples based on specific strings Author: Sekoia.io
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400D3718 NtQueryObject,1_2_00000001400D3718
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400888E0 GetModuleHandleA,GetProcAddress,OpenProcess,NtQuerySystemInformation,NtQuerySystemInformation,GetCurrentProcess,NtQueryObject,GetFinalPathNameByHandleA,CloseHandle,CloseHandle,1_2_00000001400888E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140088FE0 RtlAcquirePebLock,NtAllocateVirtualMemory,lstrcpyW,lstrcatW,NtAllocateVirtualMemory,lstrcpyW,RtlInitUnicodeString,RtlInitUnicodeString,LdrEnumerateLoadedModules,RtlReleasePebLock,CoInitializeEx,lstrcpyW,lstrcatW,CoGetObject,lstrcpyW,lstrcatW,CoGetObject,CoUninitialize,1_2_0000000140088FE0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E32DD00_2_00007FF7E4E32DD0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E3CA900_2_00007FF7E4E3CA90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E370080_2_00007FF7E4E37008
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400840A01_2_00000001400840A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400320B01_2_00000001400320B0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014008B17B1_2_000000014008B17B
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400862501_2_0000000140086250
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400652501_2_0000000140065250
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400442D01_2_00000001400442D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400304501_2_0000000140030450
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014003C5E01_2_000000014003C5E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014003D6801_2_000000014003D680
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400856C01_2_00000001400856C0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400A16FC1_2_00000001400A16FC
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014002F7301_2_000000014002F730
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014007B7D01_2_000000014007B7D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400648701_2_0000000140064870
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400849D01_2_00000001400849D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140097A4C1_2_0000000140097A4C
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014003BA801_2_000000014003BA80
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140034B701_2_0000000140034B70
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140031B901_2_0000000140031B90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140086BE01_2_0000000140086BE0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014008BC001_2_000000014008BC00
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140032CA01_2_0000000140032CA0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014003DD201_2_000000014003DD20
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140050D9A1_2_0000000140050D9A
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014002FE201_2_000000014002FE20
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140048E801_2_0000000140048E80
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014007DF101_2_000000014007DF10
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400BEF181_2_00000001400BEF18
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014006BF801_2_000000014006BF80
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014005AFF01_2_000000014005AFF0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014009405C1_2_000000014009405C
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014009E0A61_2_000000014009E0A6
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400070E01_2_00000001400070E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014006F1C01_2_000000014006F1C0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014007D1E01_2_000000014007D1E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400991E41_2_00000001400991E4
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400752A61_2_00000001400752A6
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014007A3201_2_000000014007A320
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014005B3201_2_000000014005B320
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400893301_2_0000000140089330
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400A53281_2_00000001400A5328
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014005A3801_2_000000014005A380
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400853A01_2_00000001400853A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400283D01_2_00000001400283D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400AA4501_2_00000001400AA450
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400265101_2_0000000140026510
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400255201_2_0000000140025520
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014008F5D41_2_000000014008F5D4
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400976101_2_0000000140097610
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400066101_2_0000000140006610
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400536201_2_0000000140053620
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400616501_2_0000000140061650
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014005A6801_2_000000014005A680
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400BE87C1_2_00000001400BE87C
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014003893D1_2_000000014003893D
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400A19781_2_00000001400A1978
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014009D9981_2_000000014009D998
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400749B01_2_00000001400749B0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014005A9B01_2_000000014005A9B0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014005F9C01_2_000000014005F9C0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400509F01_2_00000001400509F0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400AA9E81_2_00000001400AA9E8
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140077A001_2_0000000140077A00
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140091A101_2_0000000140091A10
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140094A241_2_0000000140094A24
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140033A301_2_0000000140033A30
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140030A801_2_0000000140030A80
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400A5A981_2_00000001400A5A98
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014008FAE01_2_000000014008FAE0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140056BEB1_2_0000000140056BEB
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140073C401_2_0000000140073C40
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140093C541_2_0000000140093C54
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400A8C881_2_00000001400A8C88
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014005ACD01_2_000000014005ACD0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014007FCF01_2_000000014007FCF0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400A8D0F1_2_00000001400A8D0F
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140006D201_2_0000000140006D20
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014009FDA41_2_000000014009FDA4
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140005DB01_2_0000000140005DB0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140074DF01_2_0000000140074DF0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140039E401_2_0000000140039E40
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140093E581_2_0000000140093E58
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400B9E681_2_00000001400B9E68
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140030E801_2_0000000140030E80
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140036EE01_2_0000000140036EE0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140094F2C1_2_0000000140094F2C
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400A6F341_2_00000001400A6F34
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400A1F681_2_00000001400A1F68
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400A2FA41_2_00000001400A2FA4
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014003AFB01_2_000000014003AFB0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140088FE01_2_0000000140088FE0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00007FF7E4E32DD01_2_00007FF7E4E32DD0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00007FF7E4E3CAF11_2_00007FF7E4E3CAF1
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 000000014002E1D0 appears 33 times
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 0000000140096B14 appears 35 times
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 000000014002BA80 appears 32 times
              Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 00000001400475F0 appears 60 times
              Source: 1.2.Loader.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_meduzastealer author = Sekoia.io, description = Finds MeduzaStealer samples based on specific strings, creation_date = 2023-06-20, classification = TLP:CLEAR, version = 1.0, id = 1276f485-aa5d-491b-89d8-77f98dc496e1
              Source: 1.2.Loader.exe.140000000.0.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_meduzastealer author = Sekoia.io, description = Finds MeduzaStealer samples based on specific strings, creation_date = 2023-06-20, classification = TLP:CLEAR, version = 1.0, id = 1276f485-aa5d-491b-89d8-77f98dc496e1
              Source: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: infostealer_win_meduzastealer author = Sekoia.io, description = Finds MeduzaStealer samples based on specific strings, creation_date = 2023-06-20, classification = TLP:CLEAR, version = 1.0, id = 1276f485-aa5d-491b-89d8-77f98dc496e1
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/1@1/2
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014008A560 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,1_2_000000014008A560
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400D3008 AdjustTokenPrivileges,CredEnumerateA,1_2_00000001400D3008
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014003D680 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,1_2_000000014003D680
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140073C40 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,SysAllocStringByteLen,SysFreeString,SysAllocStringByteLen,SysFreeString,SysStringByteLen,SysStringByteLen,SysFreeString,SysFreeString,1_2_0000000140073C40
              Source: C:\Users\user\Desktop\Loader.exeMutant created: \Sessions\1\BaseNamedObjects\Mmm-A33C734061CA11EE8C18806E6F6E69635E3D4650
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7824:120:WilError_03
              Source: Loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Loader.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Loader.exeReversingLabs: Detection: 39%
              Source: unknownProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\Loader.exe"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\Loader.exe"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Loader.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: Loader.exeStatic file information: File size 3276800 > 1048576
              Source: Loader.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x309c00
              Source: Loader.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: Loader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014003C5E0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_000000014003C5E0
              Source: Loader.exeStatic PE information: section name: .00cfg
              Source: Loader.exeStatic PE information: section name: .gxfg
              Source: Loader.exeStatic PE information: section name: .retplne
              Source: Loader.exeStatic PE information: section name: _RDATA
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014004CBE2 push rbp; retf 1_2_000000014004CBE5
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014007B500 ExitProcess,OpenMutexA,ExitProcess,CreateMutexA,CreateMutexExA,ExitProcess,ReleaseMutex,CloseHandle,1_2_000000014007B500

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Users\user\Desktop\Loader.exeProcess created: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\Loader.exe"
              Source: C:\Users\user\Desktop\Loader.exeProcess created: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\Loader.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-74130
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E3CA90 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF7E4E3CA90
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400B9DB8 FindClose,FindFirstFileExW,GetLastError,1_2_00000001400B9DB8
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400D3100 FindFirstFileW,1_2_00000001400D3100
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400B9E68 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,1_2_00000001400B9E68
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00007FF7E4E3CAF1 FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF7E4E3CAF1
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400978F8 VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,1_2_00000001400978F8
              Source: Loader.exe, 00000001.00000003.1677304331.0000029E6C194000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1828988568.0000029E6C13D000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000002.1829842240.0000029E6C13E000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1828988568.0000029E6C197000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Loader.exe, 00000001.00000003.1677304331.0000029E6C194000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1828988568.0000029E6C197000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWk;
              Source: C:\Users\user\Desktop\Loader.exeAPI call chain: ExitProcess graph end nodegraph_1-74075
              Source: C:\Users\user\Desktop\Loader.exeAPI call chain: ExitProcess graph end nodegraph_1-74071
              Source: C:\Users\user\Desktop\Loader.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400D3700 LdrEnumerateLoadedModules,1_2_00000001400D3700
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E37760 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7E4E37760
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400BC0C4 GetLastError,IsDebuggerPresent,OutputDebugStringW,1_2_00000001400BC0C4
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014003C5E0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_000000014003C5E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E39E10 GetProcessHeap,0_2_00007FF7E4E39E10
              Source: C:\Users\user\Desktop\Loader.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E37760 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7E4E37760
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E3C0E8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7E4E3C0E8
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E354D4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7E4E354D4
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E354C4 SetUnhandledExceptionFilter,0_2_00007FF7E4E354C4
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400D32D8 SetUnhandledExceptionFilter,1_2_00000001400D32D8
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140096828 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0000000140096828
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400ADB78 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00000001400ADB78
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00000001400ADD58 SetUnhandledExceptionFilter,1_2_00000001400ADD58
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00007FF7E4E37760 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF7E4E37760
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00007FF7E4E354D4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF7E4E354D4
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00007FF7E4E354C4 SetUnhandledExceptionFilter,1_2_00007FF7E4E354C4
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_00007FF7E4E3C0E8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF7E4E3C0E8

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Loader.exeMemory written: C:\Users\user\Desktop\Loader.exe base: 140000000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeThread register set: target process: 7624Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_000000014007A320 ShellExecuteW,1_2_000000014007A320
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\Loader.exe"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E417D0 cpuid 0_2_00007FF7E4E417D0
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,1_2_000000014009C3A0
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,1_2_00000001400D3398
              Source: C:\Users\user\Desktop\Loader.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,1_2_00000001400A74C4
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,1_2_00000001400A7820
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,1_2_000000014009C8E0
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,1_2_00000001400A78F0
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,1_2_00000001400A7988
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoEx,FormatMessageA,1_2_00000001400B9A28
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,1_2_00000001400A7BD0
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_00000001400A7D28
              Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,1_2_00000001400A7DD8
              Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,1_2_00000001400A7F0C
              Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation TimeZoneKeyNameJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_00007FF7E4E35304 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7E4E35304
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140084FB0 GetUserNameW,1_2_0000000140084FB0
              Source: C:\Users\user\Desktop\Loader.exeCode function: 1_2_0000000140086250 GetTimeZoneInformation,1_2_0000000140086250

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 1.2.Loader.exe.140000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Loader.exe.140000000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.1829787979.0000029E6C117000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 7624, type: MEMORYSTR
              Source: Loader.exe, 00000001.00000003.1702611451.0000029E6C1DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Electrum-LTC\walletsntr
              Source: Loader.exe, 00000001.00000003.1702611451.0000029E6C1DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\ElectronCash\configtataa,sz:!
              Source: Loader.exe, 00000001.00000003.1691732772.0000029E6C1DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 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
              Source: Loader.exe, 00000001.00000003.1702611451.0000029E6C1DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet7-Ziplr:;
              Source: Loader.exe, 00000001.00000003.1702611451.0000029E6C1DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystoreofilesDrB;
              Source: Loader.exe, 00000001.00000003.1702611451.0000029E6C1DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet7-Ziplr:;
              Source: Loader.exe, 00000001.00000003.1702611451.0000029E6C1DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Binance\simple-storage.jsonbjsonM~i;
              Source: Loader.exe, 00000001.00000003.1702611451.0000029E6C1DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystoreofilesDrB;
              Source: Loader.exe, 00000001.00000003.1702611451.0000029E6C1DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystoreofilesDrB;
              Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-coreJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.oldJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOCKJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 7624, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 1.2.Loader.exe.140000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Loader.exe.140000000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.1829787979.0000029E6C117000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Loader.exe PID: 7624, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              12
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              2
              Obfuscated Files or Information
              LSASS Memory1
              Account Discovery
              Remote Desktop Protocol2
              Data from Local System
              21
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              Access Token Manipulation
              1
              DLL Side-Loading
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Screen Capture
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook211
              Process Injection
              1
              File Deletion
              NTDS34
              System Information Discovery
              Distributed Component Object Model1
              Email Collection
              2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Access Token Manipulation
              LSA Secrets31
              Security Software Discovery
              SSHKeylogging3
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts211
              Process Injection
              Cached Domain Credentials2
              Process Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
              System Owner/User Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
              Remote System Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow11
              System Network Configuration Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Loader.exe39%ReversingLabsWin32.Ransomware.MeduzaStealer
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://ns.microsoft.t/Regi0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              api.ipify.org
              104.26.13.205
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://api.ipify.org/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/BLoader.exe, 00000001.00000002.1829787979.0000029E6C117000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDFLoader.exe, 00000001.00000003.1697408114.0000029E6F80C000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgLoader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgLoader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiLoader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallLoader.exe, 00000001.00000003.1679763052.0000029E6C1AB000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECE6000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECDB000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ED10000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECF7000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1679960665.0000029E6ED62000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1679544542.0000029E6ECA2000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.Loader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaLoader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://support.mozilla.orgLoader.exe, 00000001.00000003.1694149732.0000029E6E000000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692144032.0000029E6EDFF000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692025439.0000029E6E008000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692831305.0000029E6EDF7000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1692144032.0000029E6ED08000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1694414972.0000029E6EEC2000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Loader.exe, 00000001.00000003.1679960665.0000029E6ED87000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1680614566.0000029E6EC89000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesLoader.exe, 00000001.00000003.1679763052.0000029E6C1AB000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECE6000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECDB000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ED10000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1678045974.0000029E6ECF7000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1679960665.0000029E6ED62000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1679544542.0000029E6ECA2000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Loader.exe, 00000001.00000003.1679960665.0000029E6ED87000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1680614566.0000029E6EC89000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://ns.microsoft.t/RegiLoader.exe, 00000001.00000003.1828750732.0000029E6E9B4000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1828719030.0000029E6E9B0000.00000004.00000020.00020000.00000000.sdmp, Loader.exe, 00000001.00000003.1676773188.0000029E6E9A1000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brLoader.exe, 00000001.00000003.1697408114.0000029E6F80C000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94Loader.exe, 00000001.00000003.1698453906.0000029E6C1AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              104.26.13.205
                                              api.ipify.orgUnited States
                                              13335CLOUDFLARENETUSfalse
                                              147.45.44.216
                                              unknownRussian Federation
                                              2895FREE-NET-ASFREEnetEUtrue
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1582593
                                              Start date and time:2024-12-31 00:51:06 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 4m 2s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:8
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:Loader.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@8/1@1/2
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 99%
                                              • Number of executed functions: 85
                                              • Number of non-executed functions: 133
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Stop behavior analysis, all processes terminated
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                              • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size exceeded maximum capacity and may have missing network information.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • VT rate limit hit for: Loader.exe
                                              No simulations
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              104.26.13.205BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                                              • api.ipify.org/
                                              lEUy79aLAW.exeGet hashmaliciousTrojanRansomBrowse
                                              • api.ipify.org/
                                              Simple1.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousRDPWrap ToolBrowse
                                              • api.ipify.org/
                                              Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                              • api.ipify.org/
                                              147.45.44.216soft 1.14.exeGet hashmaliciousMeduza StealerBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                api.ipify.orgJx6bD8nM4qW9sL3v.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.12.205
                                                dsoft.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
                                                • 104.26.13.205
                                                soft 1.14.exeGet hashmaliciousMeduza StealerBrowse
                                                • 104.26.13.205
                                                markiz.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                • 104.26.13.205
                                                utkin.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                • 172.67.74.152
                                                https://www.canva.com/design/DAGaHpv1g1M/bVE7B2sT8b8T3P-e2xb64w/view?utm_content=DAGaHpv1g1M&utm_campaign=designshare&utm_medium=link2&utm_source=uniquelinks&utlId=h1ee3678e45Get hashmaliciousHTMLPhisherBrowse
                                                • 104.26.12.205
                                                https://mandrillapp.com/track/click/30363981/app.salesforceiq.com?p=eyJzIjoiQ21jNldfVTIxTkdJZi1NQzQ1SGE3SXJFTW1RIiwidiI6MSwicCI6IntcInVcIjozMDM2Mzk4MSxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2FwcC5zYWxlc2ZvcmNlaXEuY29tXFxcL3I_dD1BRndoWmYwNjV0QlFRSnRiMVFmd1A1dC0tMHZnQkowaF9lYklFcTVLRlhTWHFVWmFpNUo4RlFTd1dycTkzR1FPbEFuczlLREd2VzRJQ2Z2eGo4WjVDSkQxUTlXdDVvME5XNWMwY0tIaXpVQWJ1YnBhT2dtS2pjVkxkaDFZWE8ybklsdFRlb2VQZ2dVTCZ0YXJnZXQ9NjMxZjQyMGVlZDEzY2EzYmNmNzdjMzI0JnVybD1odHRwczpcXFwvXFxcL21haW4uZDNxczBuMG9xdjNnN28uYW1wbGlmeWFwcC5jb21cIixcImlkXCI6XCI5ZTdkODJiNWQ0NzA0YWVhYTQ1ZjkxY2Y0ZTFmNGRiMFwiLFwidXJsX2lkc1wiOltcImY5ODQ5NWVhMjMyYTgzNjg1ODUxN2Y4ZTRiOTVjZjg4MWZlODExNmJcIl19In0Get hashmaliciousUnknownBrowse
                                                • 104.26.12.205
                                                Ref#20203216.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.13.205
                                                tg.exeGet hashmaliciousBabadedaBrowse
                                                • 172.67.74.152
                                                tg.exeGet hashmaliciousBabadedaBrowse
                                                • 104.26.12.205
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CLOUDFLARENETUShttps://bs32c.golfercaps.com/vfd23ced/#sean@virtualintelligencebriefing.comGet hashmaliciousHTMLPhisherBrowse
                                                • 104.17.25.14
                                                Set-up.exeGet hashmaliciousLummaC, GO Backdoor, LummaC StealerBrowse
                                                • 188.114.97.3
                                                Setup.exeGet hashmaliciousLummaCBrowse
                                                • 172.67.177.88
                                                X-mas_2.3.2.exeGet hashmaliciousLummaCBrowse
                                                • 172.67.190.223
                                                ReploidReplic.exeGet hashmaliciousLummaCBrowse
                                                • 104.21.48.1
                                                https://compliance-central.com/route/ed5305641af2fd214861ba268e4a42aa2938b075/Get hashmaliciousUnknownBrowse
                                                • 1.1.1.1
                                                Launcher.exeGet hashmaliciousLummaCBrowse
                                                • 104.21.96.1
                                                GTA-5-Mod-Menu-2025.exeGet hashmaliciousLummaCBrowse
                                                • 104.21.96.1
                                                AquaDiscord-2.0.exeGet hashmaliciousLummaCBrowse
                                                • 104.21.16.1
                                                web44.mp4.htaGet hashmaliciousLummaCBrowse
                                                • 172.67.154.95
                                                FREE-NET-ASFREEnetEUtzA45NGAW4.lnkGet hashmaliciousUnknownBrowse
                                                • 147.45.49.155
                                                soft 1.14.exeGet hashmaliciousMeduza StealerBrowse
                                                • 147.45.44.216
                                                iviewers.dllGet hashmaliciousLummaCBrowse
                                                • 147.45.44.131
                                                search.htaGet hashmaliciousUnknownBrowse
                                                • 147.45.112.248
                                                e9aa0b4540115b3dcec3af70b6de27e54e4a0fa96d1d3.exeGet hashmaliciousRedLineBrowse
                                                • 147.45.44.224
                                                TCKxnQ5CPn.exeGet hashmaliciousUnknownBrowse
                                                • 147.45.49.155
                                                good.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                • 147.45.44.151
                                                n5Szx8qsFB.lnkGet hashmaliciousUnknownBrowse
                                                • 147.45.49.155
                                                7ZAg3nl9Fu.exeGet hashmaliciousUnknownBrowse
                                                • 147.45.44.166
                                                7ZAg3nl9Fu.exeGet hashmaliciousUnknownBrowse
                                                • 147.45.44.166
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                37f463bf4616ecd445d4a1937da06e19setup.msiGet hashmaliciousUnknownBrowse
                                                • 104.26.13.205
                                                BHgwhz3lGN.exeGet hashmaliciousVidarBrowse
                                                • 104.26.13.205
                                                Open Purchase Order Summary Details-16-12-2024.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                                • 104.26.13.205
                                                Open Purchase Order Summary Sheet.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                                • 104.26.13.205
                                                Purchase Order Summary Details.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                                • 104.26.13.205
                                                Purchase Order Summary Details.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                                • 104.26.13.205
                                                xyxmml.msiGet hashmaliciousXRedBrowse
                                                • 104.26.13.205
                                                valyzt.msiGet hashmaliciousXRedBrowse
                                                • 104.26.13.205
                                                VKKDXE.exeGet hashmaliciousLodaRAT, XRedBrowse
                                                • 104.26.13.205
                                                New PO - Supplier 16-12-2024-Pdf.exeGet hashmaliciousXRedBrowse
                                                • 104.26.13.205
                                                No context
                                                Process:C:\Windows\System32\PING.EXE
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):275
                                                Entropy (8bit):4.825671547285939
                                                Encrypted:false
                                                SSDEEP:6:PzXULmWxHLTpUrraGbsW3CNcwAFeMmvVOIHJFxMVlmJHaVFtIk3:P+pTpcraGbsTDAFSkIrxMVlmJHaVPN
                                                MD5:048DC6B94735C4768D20ED5E3F14F565
                                                SHA1:6B92CCD1E038396F675090384C6E8DFC742614ED
                                                SHA-256:6D0C347234F09E710D6B842ED14CD27792E71E5B906E9E806E77AFE8FF08E1BE
                                                SHA-512:88DF2342FFD4D303BEF828A12F7BEB505DC06E0BE6E91FF7FDA74DE31FAA289089557C036293EE3B0EE55A62D62CC804953C0D89591E662A0B513525AA40093E
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:..Pinging 1.1.1.1 with 32 bytes of data:..Reply from 1.1.1.1: bytes=32 time=6ms TTL=51....Ping statistics for 1.1.1.1:.. Packets: Sent = 1, Received = 1, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 6ms, Maximum = 6ms, Average = 6ms..
                                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                Entropy (8bit):4.438107918678631
                                                TrID:
                                                • Win64 Executable GUI (202006/5) 92.65%
                                                • Win64 Executable (generic) (12005/4) 5.51%
                                                • Generic Win/DOS Executable (2004/3) 0.92%
                                                • DOS Executable Generic (2002/1) 0.92%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:Loader.exe
                                                File size:3'276'800 bytes
                                                MD5:b3fad209b07f4d66570c24a40f30d5c7
                                                SHA1:0bd9c9aee1eafebdb435593c393392753b879e0f
                                                SHA256:f8840621ccce4e993283ac91d322c35cacd42619856477e057eac1cb1127bd6b
                                                SHA512:6188bde615cc58ee74ab37146ba4b4db26e33d8a74adbd17efb4b43282ddf014f67cb68ab44f47ae91eeedecad4a1ac5f56141b72e1193c94881997f713eefd1
                                                SSDEEP:24576:qiiadv30/H2HYi9PnBivY2w66eCIuZLBQZh+Bt5THuO1GJYS6O0/shnaoN4DmAOs:UM0f2HpCrwTeYBNqO1GJYSISsMQ
                                                TLSH:1EE522016FE875F9C4398334A0976E05BEA278504B609EEF43D416872F66AD09E3EF35
                                                File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....lg.........."...........0......P.........@.............................p2...........`........................................
                                                Icon Hash:90cececece8e8eb0
                                                Entrypoint:0x1400050b0
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x140000000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x676C189D [Wed Dec 25 14:37:17 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:6
                                                OS Version Minor:0
                                                File Version Major:6
                                                File Version Minor:0
                                                Subsystem Version Major:6
                                                Subsystem Version Minor:0
                                                Import Hash:25224432afaf13c692f24efcb620c38b
                                                Instruction
                                                dec eax
                                                sub esp, 28h
                                                call 00007F6684E04A00h
                                                dec eax
                                                add esp, 28h
                                                jmp 00007F6684E0462Fh
                                                int3
                                                int3
                                                dec eax
                                                sub esp, 28h
                                                call 00007F6684E047C4h
                                                dec eax
                                                neg eax
                                                sbb eax, eax
                                                neg eax
                                                dec eax
                                                dec eax
                                                add esp, 28h
                                                ret
                                                int3
                                                inc eax
                                                push ebx
                                                dec eax
                                                sub esp, 20h
                                                dec eax
                                                cmp dword ptr [00318ABEh], FFFFFFFFh
                                                dec eax
                                                mov ebx, ecx
                                                jne 00007F6684E047B9h
                                                call 00007F6684E066B9h
                                                jmp 00007F6684E047C1h
                                                dec eax
                                                mov edx, ebx
                                                dec eax
                                                lea ecx, dword ptr [00318AA8h]
                                                call 00007F6684E0661Ch
                                                xor edx, edx
                                                test eax, eax
                                                dec eax
                                                cmove edx, ebx
                                                dec eax
                                                mov eax, edx
                                                dec eax
                                                add esp, 20h
                                                pop ebx
                                                ret
                                                int3
                                                int3
                                                dec eax
                                                sub esp, 18h
                                                dec esp
                                                mov eax, ecx
                                                mov eax, 00005A4Dh
                                                cmp word ptr [FFFFAED5h], ax
                                                jne 00007F6684E0482Ah
                                                dec eax
                                                arpl word ptr [FFFFAF08h], cx
                                                dec eax
                                                lea edx, dword ptr [FFFFAEC5h]
                                                dec eax
                                                add ecx, edx
                                                cmp dword ptr [ecx], 00004550h
                                                jne 00007F6684E04811h
                                                mov eax, 0000020Bh
                                                cmp word ptr [ecx+18h], ax
                                                jne 00007F6684E04806h
                                                dec esp
                                                sub eax, edx
                                                movzx edx, word ptr [ecx+14h]
                                                dec eax
                                                add edx, 18h
                                                dec eax
                                                add edx, ecx
                                                movzx eax, word ptr [ecx+06h]
                                                dec eax
                                                lea ecx, dword ptr [eax+eax*4]
                                                dec esp
                                                lea ecx, dword ptr [edx+ecx*8]
                                                dec eax
                                                mov dword ptr [esp], edx
                                                dec ecx
                                                cmp edx, ecx
                                                je 00007F6684E047CAh
                                                mov ecx, dword ptr [edx+0Ch]
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x31ad900x28.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3250000x1a8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x31f0000x15a8.pdata
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3260000x680.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x130400x140.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x31b0380x280.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x11c800x11e000d92c650fbbfcda227074d695da6f26fFalse0.5210063374125874data6.374503128582078IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x130000x309b1c0x309c00183b28ad00a84574c0d187d7f38cfd6cunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x31d0000x1e700xc00b04cb412c442d91003948daef4dbac9bFalse0.15234375DOS executable (block device driver)2.184963466978745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .pdata0x31f0000x15a80x160056e480cd444c6dbe71d072aaf68fc92dFalse0.46732954545454547data4.964764994621124IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .00cfg0x3210000x380x2005d344f072ffe90545ae42e007d19a6b2False0.072265625data0.4473268792999391IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .gxfg0x3220000xf600x1000935a6a7d4fef213de176a26de65d5b15False0.418212890625PGP symmetric key encrypted data - Plaintext or unencrypted data4.923789045505213IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .retplne0x3230000x8c0x2008c950f651287cbc1296bcb4e8cd7e990False0.126953125data1.050583247971927
                                                _RDATA0x3240000x1f40x200e263646b1cb66aae2718bfe9d251bd12False0.5234375data3.7577827584492653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0x3250000x1a80x200fc0936b2f8c7ff2ad90016c364cae0a2False0.482421875data4.178189311747683IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x3260000x6800x800210679776348707cee9b93231a7eb5ccFalse0.51171875data4.9546245438601IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_MANIFEST0x3250600x143XML 1.0 document, ASCII textEnglishUnited States0.628482972136223
                                                DLLImport
                                                KERNEL32.dllCloseHandle, CreateFileW, CreateProcessA, DeleteCriticalSection, EncodePointer, EnterCriticalSection, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileType, GetLastError, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetThreadContext, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadProcessMemory, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwindEx, RtlVirtualUnwind, SetFilePointerEx, SetLastError, SetStdHandle, SetThreadContext, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, VirtualAllocEx, WideCharToMultiByte, WriteConsoleW, WriteFile, WriteProcessMemory
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-12-31T00:52:02.424899+01002046303ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M11192.168.2.449730147.45.44.21615666TCP
                                                2024-12-31T00:52:02.424899+01002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.449730147.45.44.21615666TCP
                                                2024-12-31T00:52:02.430129+01002046303ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M11192.168.2.449730147.45.44.21615666TCP
                                                2024-12-31T00:52:02.430129+01002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.449730147.45.44.21615666TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 31, 2024 00:51:57.587785959 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:51:57.592809916 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:51:57.592885971 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:51:57.704158068 CET49731443192.168.2.4104.26.13.205
                                                Dec 31, 2024 00:51:57.704215050 CET44349731104.26.13.205192.168.2.4
                                                Dec 31, 2024 00:51:57.704309940 CET49731443192.168.2.4104.26.13.205
                                                Dec 31, 2024 00:51:57.715070963 CET49731443192.168.2.4104.26.13.205
                                                Dec 31, 2024 00:51:57.715090990 CET44349731104.26.13.205192.168.2.4
                                                Dec 31, 2024 00:51:58.175426960 CET44349731104.26.13.205192.168.2.4
                                                Dec 31, 2024 00:51:58.175610065 CET49731443192.168.2.4104.26.13.205
                                                Dec 31, 2024 00:51:58.224138021 CET49731443192.168.2.4104.26.13.205
                                                Dec 31, 2024 00:51:58.224168062 CET44349731104.26.13.205192.168.2.4
                                                Dec 31, 2024 00:51:58.224549055 CET44349731104.26.13.205192.168.2.4
                                                Dec 31, 2024 00:51:58.228180885 CET49731443192.168.2.4104.26.13.205
                                                Dec 31, 2024 00:51:58.229296923 CET49731443192.168.2.4104.26.13.205
                                                Dec 31, 2024 00:51:58.271332026 CET44349731104.26.13.205192.168.2.4
                                                Dec 31, 2024 00:51:58.347666025 CET44349731104.26.13.205192.168.2.4
                                                Dec 31, 2024 00:51:58.347758055 CET44349731104.26.13.205192.168.2.4
                                                Dec 31, 2024 00:51:58.347982883 CET49731443192.168.2.4104.26.13.205
                                                Dec 31, 2024 00:51:58.358448982 CET49731443192.168.2.4104.26.13.205
                                                Dec 31, 2024 00:51:58.358480930 CET44349731104.26.13.205192.168.2.4
                                                Dec 31, 2024 00:52:02.424899101 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.429986954 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.430027008 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.430075884 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.430119991 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.430129051 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.430152893 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.430185080 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.430214882 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.430224895 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.430255890 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.430304050 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.430324078 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.430330992 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.430363894 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.430365086 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.430404902 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.430416107 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.436043024 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436072111 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436141968 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436146975 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.436168909 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436197042 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436199903 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.436222076 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.436223984 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436244965 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.436269045 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.436275005 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436304092 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436378002 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.436642885 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436729908 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436760902 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436794043 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.436815023 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.436829090 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436856985 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.436877966 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.436903954 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.441987991 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.442043066 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.442074060 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.442126989 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.442634106 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.442687035 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.442739010 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.442755938 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.442796946 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.442820072 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.442852974 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.442907095 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.442931890 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.442962885 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443017006 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443061113 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443089008 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443114996 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443135977 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443151951 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443156958 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443180084 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443201065 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443207026 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443224907 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443248987 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443253994 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443300962 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443344116 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443346024 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443375111 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443401098 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443424940 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443439007 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443449020 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443476915 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443502903 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443526030 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443527937 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443546057 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443564892 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443588018 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443592072 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443598032 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443624973 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.443634033 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.443888903 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.448059082 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448087931 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448113918 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448158026 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.448182106 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.448561907 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448630095 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448646069 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.448657036 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448700905 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.448704958 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448733091 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448779106 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448781967 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.448807001 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448833942 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448856115 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.448867083 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.448874950 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.448915958 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.449246883 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.449275017 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.449321985 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.449328899 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.449350119 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.449397087 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.449404001 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.449424028 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.449471951 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.449810982 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.449839115 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.449889898 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.449915886 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.449944973 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.449992895 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450002909 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450020075 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450064898 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450071096 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450099945 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450149059 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450150013 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450179100 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450217962 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450229883 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450248957 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450269938 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450293064 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450304031 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450331926 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450354099 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450357914 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450381041 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450387001 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450406075 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450434923 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450464964 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450488091 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450490952 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450520039 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450520992 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450531960 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450548887 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450568914 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450577021 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450625896 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450633049 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450654030 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450680971 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450701952 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450707912 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450720072 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450736046 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450754881 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450762987 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450778008 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450812101 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450839043 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450865984 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450865984 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450880051 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450897932 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450923920 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450925112 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450939894 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450953007 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.450962067 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.450994968 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451014042 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451020956 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451039076 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451049089 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451052904 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451092005 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451376915 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451404095 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451452971 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451453924 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451481104 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451527119 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451529026 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451555014 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451606989 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451617956 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451644897 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451670885 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451698065 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451704025 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451725006 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451738119 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451746941 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451773882 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451801062 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451818943 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451827049 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.451853037 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.451872110 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.453722000 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.454298973 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.454366922 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.454385042 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.454412937 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.454441071 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.454462051 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.454463959 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.454490900 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.454539061 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.454953909 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.454982042 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455032110 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455077887 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455106020 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455154896 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455157042 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455183029 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455214024 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455236912 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455240011 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455290079 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455290079 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455333948 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455359936 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455384016 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455385923 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455396891 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455424070 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455434084 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455461979 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455482006 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455488920 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455514908 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455538988 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455563068 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455566883 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455590963 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455641031 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455662012 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455689907 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455739021 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455739975 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455787897 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455815077 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455841064 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455841064 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455866098 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455899954 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455902100 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455929995 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455956936 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.455977917 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.455984116 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456003904 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456028938 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456032991 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456063032 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456078053 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456449032 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456476927 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456504107 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456517935 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456526041 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456552982 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456584930 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456599951 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456634045 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456654072 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456681967 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456707954 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456737041 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456749916 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456754923 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456783056 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456799030 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456829071 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456856012 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456882954 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456883907 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456893921 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456912041 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456934929 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456939936 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456954956 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.456965923 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.456984043 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457004070 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457015991 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457043886 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457070112 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457097054 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457103014 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457113981 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457123995 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457139015 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457150936 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457170010 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457201004 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457230091 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457252026 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457257032 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457266092 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457285881 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457302094 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457313061 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457341909 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457367897 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457379103 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457390070 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457417965 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457437992 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457444906 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457472086 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457487106 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457499027 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457521915 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457530022 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457537889 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457559109 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457586050 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457622051 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457633018 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457660913 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457678080 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457688093 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457715034 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457732916 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457742929 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457767963 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457771063 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457778931 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457799911 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457827091 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457848072 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457854033 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457869053 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457885981 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457911968 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457931042 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457937002 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457966089 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.457983971 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.457993031 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458007097 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458020926 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458048105 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458071947 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458075047 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458095074 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458103895 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458127975 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458131075 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458138943 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458158970 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458185911 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458210945 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458213091 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458225012 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458241940 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458268881 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458268881 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458296061 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458300114 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458319902 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458340883 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458353043 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458384991 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458410025 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458436012 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458442926 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458455086 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458456993 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458470106 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458473921 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458482027 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458494902 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458501101 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458507061 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458511114 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458520889 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458530903 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458544016 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458549023 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458560944 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458571911 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458583117 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458595037 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458595991 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458606005 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458607912 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458626986 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458635092 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458647966 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458674908 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458720922 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458765984 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458779097 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458796978 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458808899 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458823919 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458834887 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458851099 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458856106 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458864927 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458893061 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458905935 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458908081 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458936930 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458947897 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.458950043 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458981991 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.458993912 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459002972 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459026098 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459027052 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459041119 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459049940 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459063053 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459069014 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459076881 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459093094 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459106922 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459213018 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459225893 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459238052 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459249973 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459260941 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459273100 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459279060 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459295988 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459310055 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459310055 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459328890 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459328890 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459352016 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459364891 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459367990 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459407091 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459707022 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459722042 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459762096 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459774017 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459786892 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459815025 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459825993 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459832907 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459860086 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459872961 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459873915 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459902048 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459924936 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.459940910 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459953070 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.459966898 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.460000038 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.460340023 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.460541010 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.460799932 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.460906029 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.460917950 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.460941076 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.460952997 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.460956097 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.460983992 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461009979 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461014032 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461029053 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461050987 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461057901 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461066008 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461070061 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461085081 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461091042 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461101055 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461106062 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461148024 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461150885 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461186886 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461216927 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461229086 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461236000 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461255074 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461262941 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461275101 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461276054 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461303949 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461311102 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461313963 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461324930 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461358070 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461369991 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461378098 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461391926 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461395025 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.461420059 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.461438894 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.463368893 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463448048 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463479042 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463502884 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.463527918 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.463547945 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463577032 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463593006 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.463627100 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463670969 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463673115 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.463725090 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463737965 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463767052 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463778973 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463778973 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.463802099 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.463823080 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463824034 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.463838100 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463886023 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.463908911 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463922977 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.463968992 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464008093 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464020967 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464056015 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464067936 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464075089 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464102030 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464102983 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464113951 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464127064 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464143991 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464158058 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464169979 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464170933 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464199066 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464210033 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464220047 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464232922 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464268923 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464281082 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464293003 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464324951 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464343071 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464345932 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464358091 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464396954 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464406013 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464418888 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464461088 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464498043 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464512110 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464554071 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464562893 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464576960 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464612961 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464624882 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464626074 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464660883 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464678049 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464689970 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464703083 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464729071 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464736938 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464742899 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464827061 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464843035 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464885950 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464889050 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464903116 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464932919 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464941978 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.464958906 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.464973927 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465003967 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465013981 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465023994 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465037107 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465080023 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465084076 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465092897 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465147018 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465148926 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465159893 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465183020 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465194941 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465210915 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465229988 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465250969 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465265036 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465292931 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465311050 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465311050 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465326071 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465358973 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465370893 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465375900 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465400934 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465426922 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465441942 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465454102 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465476036 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465481997 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465488911 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465522051 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465538979 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465557098 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465569973 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465590954 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465603113 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465641022 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465642929 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465656042 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465668917 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465692997 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465701103 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465708017 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465742111 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465753078 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465761900 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465775967 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465787888 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465801001 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465804100 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465822935 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465831041 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465843916 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465845108 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465872049 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465888977 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465892076 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465905905 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465934038 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465944052 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.465967894 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.465981960 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466001034 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466012001 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466013908 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466026068 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466037035 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466048956 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466108084 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466120958 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466142893 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466154099 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466155052 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466187000 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466195107 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466207981 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466221094 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466249943 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466258049 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466259956 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466270924 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466317892 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466327906 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466341972 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466394901 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466407061 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466408014 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466439962 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466454029 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466454029 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466485023 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466496944 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466496944 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466527939 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.466533899 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.466537952 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.467935085 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.507386923 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.508748055 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.508825064 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.508882046 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.508948088 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.509002924 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.509066105 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.509116888 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.509174109 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.509227991 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.509280920 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.509325981 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.509390116 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.509433985 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.518040895 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.518074036 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.518107891 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.518496990 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.518567085 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.518615007 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.518673897 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.518719912 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.518774986 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.518812895 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.563409090 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.564131975 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.614419937 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.615734100 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.616033077 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.616082907 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.616127968 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.616182089 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.616235971 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.616295099 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.616343975 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.616399050 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.616446972 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.616503954 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.620691061 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.621361017 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.621431112 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.621464014 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.667427063 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.667957067 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.672903061 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.672985077 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.673132896 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.673192024 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.673237085 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.673299074 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.673342943 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.673428059 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.675039053 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.715413094 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.715953112 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.746715069 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.746758938 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.746908903 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.747117996 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.747173071 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.747220993 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.747267008 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.747323036 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.747380972 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.747406006 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.751904964 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.752058983 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.795440912 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.795505047 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.809864044 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.809885979 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.810066938 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.810122967 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.810164928 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.810220003 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.810260057 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.810312033 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.810364962 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.810419083 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.810441017 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.815052986 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.815253019 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.815320969 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.815372944 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.815424919 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.815470934 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.815529108 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.815546989 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.859606028 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.859689951 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.868055105 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.868187904 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.868246078 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.868623972 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.868668079 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.868709087 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.868753910 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.868793964 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.868849993 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.868894100 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.868947983 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.868988037 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.869050026 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.869102001 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.869163036 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.869208097 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.869256973 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873016119 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873069048 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873121023 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873152018 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873172045 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873184919 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873193979 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873226881 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873239040 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873287916 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873298883 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873316050 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873332977 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873359919 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873366117 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873394966 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873411894 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873421907 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873445034 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873450994 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873466015 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873478889 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873502970 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873526096 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873529911 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873558998 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873579025 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873585939 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873605967 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873614073 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873630047 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873657942 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873668909 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873696089 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873716116 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873727083 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873747110 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873755932 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873778105 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873785973 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873807907 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873815060 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873831987 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873845100 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873858929 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873873949 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873891115 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873900890 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873915911 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873945951 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.873955011 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873982906 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.873999119 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874012947 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874041080 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874068975 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874099016 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874126911 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874155998 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874156952 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874172926 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874183893 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874205112 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874212980 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874233961 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874242067 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874264002 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874272108 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874295950 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874300957 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874320030 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874330044 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874361038 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874372005 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874387980 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874416113 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874435902 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874444008 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874459028 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874471903 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874488115 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874500036 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874514103 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874528885 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874557018 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874569893 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874587059 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874612093 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874615908 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874639034 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874644995 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874655962 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874672890 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874690056 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874701023 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874720097 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874728918 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874737024 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874757051 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874773979 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874787092 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874810934 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874816895 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874845028 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874857903 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874867916 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874875069 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874891043 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874902010 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874921083 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874929905 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874938965 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874958992 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.874977112 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.874985933 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875003099 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875014067 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875030041 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875041962 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875063896 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875082970 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875092983 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875134945 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875138998 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875161886 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875176907 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875190973 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875212908 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875219107 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875246048 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875272989 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875291109 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875300884 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875346899 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875346899 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875375986 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875389099 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875402927 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875422955 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875431061 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875448942 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875458002 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875463009 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875485897 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875495911 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875514984 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875529051 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875545025 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875555992 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875574112 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875587940 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875602007 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875622034 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875632048 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875643969 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875659943 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875682116 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875689030 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875714064 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875725031 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875735044 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875752926 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875772953 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875780106 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875803947 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875808954 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875825882 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875849009 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875858068 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875900030 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875902891 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875929117 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875937939 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875957966 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.875969887 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.875988007 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876003027 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876014948 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876029015 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876044035 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876053095 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876071930 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876082897 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876100063 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876111984 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876127005 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876140118 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876156092 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876172066 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876183033 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876193047 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876210928 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876224041 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876239061 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876251936 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876266956 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876279116 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876295090 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876308918 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876322031 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876338959 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876348972 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876358986 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876377106 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876386881 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876405001 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876415968 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876435995 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876446009 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876463890 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876476049 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876492023 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876506090 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876521111 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876535892 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876549006 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876559019 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876581907 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876595020 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876620054 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876621962 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876648903 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876661062 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876677036 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876691103 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876704931 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876715899 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876733065 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876746893 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876760960 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876771927 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876789093 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876801968 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876816034 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876831055 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876843929 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876857042 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876873016 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876893997 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876902103 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876912117 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876929998 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876948118 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876957893 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876969099 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.876986027 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.876993895 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.877012968 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.877026081 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.877041101 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.877057076 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.877068996 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.877079964 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.877096891 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.877106905 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.877125025 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.877137899 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.877162933 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.919595957 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.919920921 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920025110 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920089960 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920142889 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920209885 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920268059 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920329094 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920397997 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920464993 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920516014 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920559883 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920607090 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920649052 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920696974 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920738935 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920787096 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920829058 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920877934 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.920902014 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925064087 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925086975 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925123930 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925143003 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925177097 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925194025 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925195932 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925232887 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925237894 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925252914 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925276995 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925287962 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925288916 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925307035 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925327063 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925339937 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925340891 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925359964 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925383091 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925394058 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925395966 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925412893 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925435066 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925446033 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925456047 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925466061 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925489902 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925498009 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925501108 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925517082 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925539017 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925554037 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925565958 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925584078 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925604105 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925606966 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925622940 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925622940 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925647020 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925658941 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925662041 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925681114 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925700903 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925714016 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925744057 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925762892 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925787926 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925796032 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925801992 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925816059 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925837994 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925848961 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925852060 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925868988 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925889969 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925908089 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.925965071 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.925983906 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926012993 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926017046 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926024914 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926035881 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926062107 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926069975 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926074028 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926089048 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926111937 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926120996 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926126957 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926140070 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926163912 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926173925 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926178932 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926192999 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926211119 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926219940 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926229954 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926233053 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926250935 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926265001 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926265955 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926285028 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926302910 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926306963 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926317930 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926322937 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926340103 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926357985 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926357985 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926378012 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926397085 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926398039 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926417112 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926418066 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926436901 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926450968 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926459074 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926471949 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926490068 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926493883 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926506042 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926508904 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926526070 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926544905 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926546097 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926565886 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926589012 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926599026 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926605940 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926618099 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926636934 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926639080 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926659107 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926659107 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926671028 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926695108 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926717043 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926736116 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926757097 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926759958 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926774025 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926775932 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926795959 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926810980 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926814079 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926830053 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926856995 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926876068 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926876068 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926894903 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926913023 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926913977 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926928997 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926947117 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926959038 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.926970959 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926989079 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.926991940 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927005053 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927009106 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927022934 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927027941 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927048922 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927072048 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927077055 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927092075 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927109957 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927114010 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927125931 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927129030 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927145958 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927149057 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927169085 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927185059 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927185059 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927206039 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927225113 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927228928 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927242994 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927243948 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927263021 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927263021 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927282095 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927284956 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927304029 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927304983 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927325964 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927337885 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927350998 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927370071 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927388906 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927395105 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927407026 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927407980 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927426100 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927427053 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927447081 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927448034 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927468061 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927478075 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927483082 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927500963 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927519083 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927521944 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927534103 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927539110 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927551985 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927557945 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927576065 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927578926 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927591085 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927608967 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927612066 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927632093 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927649975 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927659035 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927669048 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927671909 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927690029 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927691936 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927700996 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927711964 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927731991 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927743912 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927747011 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927767038 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927788973 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927800894 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927802086 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927820921 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927839041 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927845001 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927862883 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927875042 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927895069 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927908897 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927913904 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927925110 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927933931 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927936077 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927952051 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927964926 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.927968025 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.927988052 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928005934 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928010941 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928025961 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928025961 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928044081 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928046942 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928069115 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928081036 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928082943 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928102970 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928121090 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928124905 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928141117 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928141117 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928162098 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928174973 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928179026 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928198099 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928216934 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928220987 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928236008 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928236961 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928251028 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928271055 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928272009 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928291082 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928308964 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928313971 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928325891 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928328991 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928349018 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928360939 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928366899 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928385973 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928404093 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928410053 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928416967 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928426027 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928441048 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928443909 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928452969 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928457022 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928469896 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928482056 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928484917 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928498983 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928503990 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928518057 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928518057 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928529978 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928541899 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928541899 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928566933 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928571939 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928579092 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928586006 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928594112 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928606033 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928613901 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928630114 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928632975 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928642988 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928654909 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928683043 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928736925 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928750038 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928760052 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928771973 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928790092 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928792953 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928802013 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928807020 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928817034 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928817987 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928828955 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928833961 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928853989 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928858995 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928865910 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928872108 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928881884 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928895950 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928896904 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928909063 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928911924 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928921938 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928932905 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928932905 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928946018 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928957939 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928961039 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928971052 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.928975105 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928993940 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.928996086 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929007053 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929009914 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929032087 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929044962 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929045916 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929059029 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929080963 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929090023 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929092884 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929119110 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929131985 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929135084 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929148912 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929162979 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929181099 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929194927 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929220915 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929234028 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929254055 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929265976 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929275036 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929287910 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929313898 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929327011 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929347992 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929359913 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929369926 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929382086 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929399014 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929399014 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929411888 CET1566649730147.45.44.216192.168.2.4
                                                Dec 31, 2024 00:52:02.929418087 CET4973015666192.168.2.4147.45.44.216
                                                Dec 31, 2024 00:52:02.929429054 CET4973015666192.168.2.4147.45.44.216
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Dec 31, 2024 00:51:57.691831112 CET192.168.2.41.1.1.10x57afStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Dec 31, 2024 00:51:57.698724031 CET1.1.1.1192.168.2.40x57afNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                Dec 31, 2024 00:51:57.698724031 CET1.1.1.1192.168.2.40x57afNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                Dec 31, 2024 00:51:57.698724031 CET1.1.1.1192.168.2.40x57afNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.449731104.26.13.2054437624C:\Users\user\Desktop\Loader.exe
                                                TimestampBytes transferredDirectionData
                                                2024-12-30 23:51:58 UTC100OUTGET / HTTP/1.1
                                                Accept: text/html; text/plain; */*
                                                Host: api.ipify.org
                                                Cache-Control: no-cache
                                                2024-12-30 23:51:58 UTC424INHTTP/1.1 200 OK
                                                Date: Mon, 30 Dec 2024 23:51:58 GMT
                                                Content-Type: text/plain
                                                Content-Length: 12
                                                Connection: close
                                                Vary: Origin
                                                CF-Cache-Status: DYNAMIC
                                                Server: cloudflare
                                                CF-RAY: 8fa5f0dd496c4321-EWR
                                                server-timing: cfL4;desc="?proto=TCP&rtt=1593&min_rtt=1586&rtt_var=609&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2821&recv_bytes=738&delivery_rate=1773997&cwnd=249&unsent_bytes=0&cid=5eb80c97e9e6b000&ts=182&x=0"
                                                2024-12-30 23:51:58 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                Data Ascii: 8.46.123.189


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:18:51:56
                                                Start date:30/12/2024
                                                Path:C:\Users\user\Desktop\Loader.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                Imagebase:0x7ff7e4e30000
                                                File size:3'276'800 bytes
                                                MD5 hash:B3FAD209B07F4D66570C24A40F30D5C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:18:51:56
                                                Start date:30/12/2024
                                                Path:C:\Users\user\Desktop\Loader.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\Loader.exe"
                                                Imagebase:0x7ff7e4e30000
                                                File size:3'276'800 bytes
                                                MD5 hash:B3FAD209B07F4D66570C24A40F30D5C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_MeduzaStealer, Description: Yara detected Meduza Stealer, Source: 00000001.00000002.1829787979.0000029E6C117000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_MeduzaStealer, Description: Yara detected Meduza Stealer, Source: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: infostealer_win_meduzastealer, Description: Finds MeduzaStealer samples based on specific strings, Source: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Author: Sekoia.io
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:18:52:12
                                                Start date:30/12/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\Loader.exe"
                                                Imagebase:0x7ff76f6c0000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:18:52:12
                                                Start date:30/12/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7699e0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:18:52:12
                                                Start date:30/12/2024
                                                Path:C:\Windows\System32\PING.EXE
                                                Wow64 process (32bit):false
                                                Commandline:ping 1.1.1.1 -n 1 -w 3000
                                                Imagebase:0x7ff76dd50000
                                                File size:22'528 bytes
                                                MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:18.6%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:3.8%
                                                  Total number of Nodes:1332
                                                  Total number of Limit Nodes:6
                                                  execution_graph 7517 7ff7e4e3df88 7518 7ff7e4e3a7cc 64 API calls 7517->7518 7519 7ff7e4e3df91 7518->7519 7666 7ff7e4e3bb0c 7667 7ff7e4e3bb36 7666->7667 7668 7ff7e4e3c1c8 _set_fmode 11 API calls 7667->7668 7669 7ff7e4e3bb55 7668->7669 7670 7ff7e4e3b380 __free_lconv_mon 11 API calls 7669->7670 7671 7ff7e4e3bb63 7670->7671 7672 7ff7e4e3c1c8 _set_fmode 11 API calls 7671->7672 7676 7ff7e4e3bb8d 7671->7676 7674 7ff7e4e3bb7f 7672->7674 7673 7ff7e4e39988 6 API calls 7673->7676 7675 7ff7e4e3b380 __free_lconv_mon 11 API calls 7674->7675 7675->7676 7676->7673 7677 7ff7e4e3bb96 7676->7677 7678 7ff7e4e42b11 7679 7ff7e4e38090 _CallSETranslator 68 API calls 7678->7679 7680 7ff7e4e42b1f 7679->7680 7681 7ff7e4e42b2a 7680->7681 7682 7ff7e4e38090 _CallSETranslator 68 API calls 7680->7682 7682->7681 7039 7ff7e4e40610 7040 7ff7e4e40648 __GSHandlerCheckCommon 7039->7040 7041 7ff7e4e40674 7040->7041 7043 7ff7e4e36184 7040->7043 7052 7ff7e4e38090 7043->7052 7046 7ff7e4e38090 _CallSETranslator 68 API calls 7047 7ff7e4e361bb 7046->7047 7048 7ff7e4e38090 _CallSETranslator 68 API calls 7047->7048 7049 7ff7e4e361c4 7048->7049 7058 7ff7e4e3891c 7049->7058 7081 7ff7e4e380ac 7052->7081 7054 7ff7e4e361ae 7054->7046 7056 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7057 7ff7e4e380a8 7056->7057 7059 7ff7e4e38d24 __except_validate_context_record 7058->7059 7060 7ff7e4e38090 _CallSETranslator 68 API calls 7059->7060 7061 7ff7e4e38d56 7060->7061 7063 7ff7e4e38e3e 7061->7063 7064 7ff7e4e38db0 7061->7064 7079 7ff7e4e361f5 7061->7079 7071 7ff7e4e38e5d 7063->7071 7129 7ff7e4e3609c 7063->7129 7065 7ff7e4e38e2b 7064->7065 7068 7ff7e4e38e09 7064->7068 7069 7ff7e4e38dd2 7064->7069 7064->7079 7120 7ff7e4e35d30 7065->7120 7068->7065 7070 7ff7e4e38de1 7068->7070 7097 7ff7e4e38194 7069->7097 7073 7ff7e4e38f55 7070->7073 7076 7ff7e4e38df3 7070->7076 7077 7ff7e4e38eac 7071->7077 7071->7079 7132 7ff7e4e360c8 7071->7132 7075 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7073->7075 7078 7ff7e4e38f5a 7075->7078 7103 7ff7e4e38298 7076->7103 7077->7079 7135 7ff7e4e38f5c 7077->7135 7079->7041 7082 7ff7e4e380cb GetLastError 7081->7082 7083 7ff7e4e38099 7081->7083 7093 7ff7e4e3d65c 7082->7093 7083->7054 7083->7056 7094 7ff7e4e3d75c __vcrt_FlsAlloc 5 API calls 7093->7094 7095 7ff7e4e3d683 TlsGetValue 7094->7095 7098 7ff7e4e381f4 7097->7098 7099 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7098->7099 7100 7ff7e4e381f9 7099->7100 7101 7ff7e4e3821e 7100->7101 7102 7ff7e4e38194 __GSHandlerCheck_EH 59 API calls 7100->7102 7101->7070 7102->7101 7104 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7103->7104 7105 7ff7e4e382c7 __GetCurrentState 7104->7105 7106 7ff7e4e38090 _CallSETranslator 68 API calls 7105->7106 7115 7ff7e4e382e4 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 7106->7115 7107 7ff7e4e383db 7108 7ff7e4e38090 _CallSETranslator 68 API calls 7107->7108 7109 7ff7e4e383e0 7108->7109 7113 7ff7e4e383eb 7109->7113 7114 7ff7e4e38090 _CallSETranslator 68 API calls 7109->7114 7110 7ff7e4e38416 7111 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7110->7111 7111->7113 7112 7ff7e4e383f8 __FrameHandler3::GetHandlerSearchState 7112->7079 7113->7112 7117 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7113->7117 7114->7113 7115->7107 7115->7110 7116 7ff7e4e3609c 68 API calls Is_bad_exception_allowed 7115->7116 7197 7ff7e4e360b0 7115->7197 7116->7115 7118 7ff7e4e38421 7117->7118 7200 7ff7e4e35d94 7120->7200 7127 7ff7e4e38298 __FrameHandler3::FrameUnwindToEmptyState 69 API calls 7128 7ff7e4e35d84 7127->7128 7128->7079 7130 7ff7e4e38090 _CallSETranslator 68 API calls 7129->7130 7131 7ff7e4e360a5 7130->7131 7131->7071 7133 7ff7e4e38090 _CallSETranslator 68 API calls 7132->7133 7134 7ff7e4e360d1 7133->7134 7134->7077 7215 7ff7e4e38424 7135->7215 7137 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7138 7ff7e4e3942a 7137->7138 7139 7ff7e4e39375 7176 7ff7e4e39424 7139->7176 7183 7ff7e4e39373 7139->7183 7280 7ff7e4e39500 7139->7280 7140 7ff7e4e390a3 7140->7139 7142 7ff7e4e390db 7140->7142 7141 7ff7e4e38090 _CallSETranslator 68 API calls 7145 7ff7e4e393b7 7141->7145 7146 7ff7e4e392a5 7142->7146 7243 7ff7e4e35f68 7142->7243 7148 7ff7e4e393be 7145->7148 7145->7176 7152 7ff7e4e392c2 7146->7152 7156 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7146->7156 7146->7183 7147 7ff7e4e38090 _CallSETranslator 68 API calls 7150 7ff7e4e3900a 7147->7150 7151 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 7148->7151 7150->7148 7154 7ff7e4e38090 _CallSETranslator 68 API calls 7150->7154 7155 7ff7e4e393ca 7151->7155 7159 7ff7e4e392e4 7152->7159 7152->7183 7272 7ff7e4e35d04 7152->7272 7153 7ff7e4e39107 7153->7146 7180 7ff7e4e360c8 68 API calls __GSHandlerCheck_EH 7153->7180 7249 7ff7e4e38924 7153->7249 7263 7ff7e4e3942c 7153->7263 7157 7ff7e4e3901a 7154->7157 7155->7079 7156->7152 7160 7ff7e4e38090 _CallSETranslator 68 API calls 7157->7160 7161 7ff7e4e392fa 7159->7161 7159->7183 7194 7ff7e4e39407 7159->7194 7162 7ff7e4e39023 7160->7162 7163 7ff7e4e39305 7161->7163 7166 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7161->7166 7227 7ff7e4e360dc 7162->7227 7169 7ff7e4e387a4 __GSHandlerCheck_EH 68 API calls 7163->7169 7164 7ff7e4e38090 _CallSETranslator 68 API calls 7167 7ff7e4e3940d 7164->7167 7166->7163 7168 7ff7e4e38090 _CallSETranslator 68 API calls 7167->7168 7170 7ff7e4e39416 7168->7170 7171 7ff7e4e3931b 7169->7171 7173 7ff7e4e37e28 __GSHandlerCheck_EH 59 API calls 7170->7173 7177 7ff7e4e35d94 __FrameHandler3::GetHandlerSearchState 60 API calls 7171->7177 7171->7183 7172 7ff7e4e38090 _CallSETranslator 68 API calls 7175 7ff7e4e39065 7172->7175 7173->7176 7175->7140 7179 7ff7e4e38090 _CallSETranslator 68 API calls 7175->7179 7176->7137 7178 7ff7e4e39335 7177->7178 7277 7ff7e4e35e64 RtlUnwindEx 7178->7277 7182 7ff7e4e39071 7179->7182 7180->7153 7184 7ff7e4e38090 _CallSETranslator 68 API calls 7182->7184 7183->7141 7185 7ff7e4e3907a 7184->7185 7230 7ff7e4e387a4 7185->7230 7190 7ff7e4e3908e 7239 7ff7e4e38894 7190->7239 7192 7ff7e4e39401 7193 7ff7e4e37e28 __GSHandlerCheck_EH 59 API calls 7192->7193 7193->7194 7194->7164 7195 7ff7e4e39096 __CxxCallCatchBlock std::bad_alloc::bad_alloc 7195->7192 7196 7ff7e4e359e0 Concurrency::cancel_current_task 2 API calls 7195->7196 7196->7192 7198 7ff7e4e38090 _CallSETranslator 68 API calls 7197->7198 7199 7ff7e4e360be 7198->7199 7199->7115 7201 7ff7e4e3818c __FrameHandler3::GetHandlerSearchState 59 API calls 7200->7201 7203 7ff7e4e35dc2 7201->7203 7202 7ff7e4e35dec RtlLookupFunctionEntry 7202->7203 7203->7202 7204 7ff7e4e35d4f 7203->7204 7205 7ff7e4e3818c 7204->7205 7206 7ff7e4e38194 7205->7206 7207 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7206->7207 7208 7ff7e4e381f9 7207->7208 7209 7ff7e4e35d5d 7208->7209 7210 7ff7e4e38194 __GSHandlerCheck_EH 59 API calls 7208->7210 7211 7ff7e4e35ca0 7209->7211 7210->7209 7212 7ff7e4e35ceb 7211->7212 7213 7ff7e4e35cc0 7211->7213 7212->7127 7213->7212 7214 7ff7e4e38090 _CallSETranslator 68 API calls 7213->7214 7214->7213 7216 7ff7e4e3818c __FrameHandler3::GetHandlerSearchState 59 API calls 7215->7216 7217 7ff7e4e38449 7216->7217 7218 7ff7e4e35d94 __FrameHandler3::GetHandlerSearchState 60 API calls 7217->7218 7219 7ff7e4e3845e 7218->7219 7298 7ff7e4e3826c 7219->7298 7222 7ff7e4e38470 __FrameHandler3::GetHandlerSearchState 7301 7ff7e4e38230 7222->7301 7223 7ff7e4e38493 7224 7ff7e4e3826c __GetUnwindTryBlock 60 API calls 7223->7224 7225 7ff7e4e38491 7224->7225 7225->7140 7225->7147 7225->7176 7228 7ff7e4e38090 _CallSETranslator 68 API calls 7227->7228 7229 7ff7e4e360ea 7228->7229 7229->7172 7229->7176 7231 7ff7e4e3888b 7230->7231 7238 7ff7e4e387cf 7230->7238 7233 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7231->7233 7232 7ff7e4e3886b 7232->7140 7232->7190 7234 7ff7e4e38890 7233->7234 7235 7ff7e4e360c8 68 API calls __GSHandlerCheck_EH 7235->7238 7236 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7236->7238 7237 7ff7e4e38924 __GSHandlerCheck_EH 68 API calls 7237->7238 7238->7232 7238->7235 7238->7236 7238->7237 7240 7ff7e4e388b1 Is_bad_exception_allowed 7239->7240 7242 7ff7e4e38901 7239->7242 7241 7ff7e4e3609c 68 API calls Is_bad_exception_allowed 7240->7241 7240->7242 7241->7240 7242->7195 7244 7ff7e4e3818c __FrameHandler3::GetHandlerSearchState 59 API calls 7243->7244 7245 7ff7e4e35fa6 7244->7245 7246 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7245->7246 7248 7ff7e4e35fb4 7245->7248 7247 7ff7e4e36098 7246->7247 7248->7153 7250 7ff7e4e38951 7249->7250 7262 7ff7e4e389e0 7249->7262 7251 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7250->7251 7252 7ff7e4e3895a 7251->7252 7253 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7252->7253 7254 7ff7e4e38973 7252->7254 7252->7262 7253->7254 7255 7ff7e4e3899f 7254->7255 7256 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7254->7256 7254->7262 7257 7ff7e4e360c8 __GSHandlerCheck_EH 68 API calls 7255->7257 7256->7255 7259 7ff7e4e389b3 7257->7259 7258 7ff7e4e389cc 7261 7ff7e4e360c8 __GSHandlerCheck_EH 68 API calls 7258->7261 7259->7258 7260 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7259->7260 7259->7262 7260->7258 7261->7262 7262->7153 7264 7ff7e4e35d94 __FrameHandler3::GetHandlerSearchState 60 API calls 7263->7264 7265 7ff7e4e39469 7264->7265 7266 7ff7e4e3948f 7265->7266 7304 7ff7e4e38c64 7265->7304 7267 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7266->7267 7269 7ff7e4e394a1 7267->7269 7270 7ff7e4e35e64 __GSHandlerCheck_EH 9 API calls 7269->7270 7271 7ff7e4e394e5 7270->7271 7271->7153 7273 7ff7e4e3818c __FrameHandler3::GetHandlerSearchState 59 API calls 7272->7273 7274 7ff7e4e35d18 7273->7274 7275 7ff7e4e35ca0 __FrameHandler3::ExecutionInCatch 68 API calls 7274->7275 7276 7ff7e4e35d22 7275->7276 7276->7159 7278 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 7277->7278 7279 7ff7e4e35f5e 7278->7279 7279->7183 7281 7ff7e4e39539 7280->7281 7282 7ff7e4e3974c 7280->7282 7283 7ff7e4e38090 _CallSETranslator 68 API calls 7281->7283 7282->7183 7284 7ff7e4e3953e 7283->7284 7285 7ff7e4e395b0 7284->7285 7286 7ff7e4e3955d EncodePointer 7284->7286 7285->7282 7288 7ff7e4e39767 7285->7288 7289 7ff7e4e395d0 7285->7289 7287 7ff7e4e38090 _CallSETranslator 68 API calls 7286->7287 7293 7ff7e4e3956d 7287->7293 7290 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7288->7290 7291 7ff7e4e35f68 __GSHandlerCheck_EH 59 API calls 7289->7291 7292 7ff7e4e3976c 7290->7292 7296 7ff7e4e395f2 7291->7296 7293->7285 7336 7ff7e4e3620c 7293->7336 7295 7ff7e4e3942c __GSHandlerCheck_EH 70 API calls 7295->7296 7296->7282 7296->7295 7297 7ff7e4e3609c 68 API calls Is_bad_exception_allowed 7296->7297 7297->7296 7299 7ff7e4e35d94 __FrameHandler3::GetHandlerSearchState 60 API calls 7298->7299 7300 7ff7e4e3827f 7299->7300 7300->7222 7300->7223 7302 7ff7e4e35d94 __FrameHandler3::GetHandlerSearchState 60 API calls 7301->7302 7303 7ff7e4e3824a 7302->7303 7303->7225 7305 7ff7e4e38c86 7304->7305 7313 7ff7e4e38a64 7305->7313 7307 7ff7e4e38c97 7308 7ff7e4e38cd8 __AdjustPointer 7307->7308 7309 7ff7e4e38c9c __AdjustPointer 7307->7309 7310 7ff7e4e38cbb __GSHandlerCheck_EH 7308->7310 7311 7ff7e4e360c8 __GSHandlerCheck_EH 68 API calls 7308->7311 7309->7310 7312 7ff7e4e360c8 __GSHandlerCheck_EH 68 API calls 7309->7312 7310->7266 7311->7310 7312->7310 7314 7ff7e4e38a91 7313->7314 7316 7ff7e4e38a9a 7313->7316 7315 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7314->7315 7315->7316 7317 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7316->7317 7318 7ff7e4e38ab9 7316->7318 7324 7ff7e4e38b1c __AdjustPointer __GSHandlerCheck_EH 7316->7324 7317->7318 7319 7ff7e4e38b04 7318->7319 7320 7ff7e4e38b24 7318->7320 7318->7324 7322 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7319->7322 7319->7324 7321 7ff7e4e360c8 __GSHandlerCheck_EH 68 API calls 7320->7321 7323 7ff7e4e38ba3 7320->7323 7320->7324 7321->7323 7325 7ff7e4e38c5b 7322->7325 7323->7324 7327 7ff7e4e360c8 __GSHandlerCheck_EH 68 API calls 7323->7327 7324->7307 7326 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7325->7326 7328 7ff7e4e38c61 7326->7328 7327->7324 7329 7ff7e4e38a64 __GSHandlerCheck_EH 68 API calls 7328->7329 7330 7ff7e4e38c97 7329->7330 7331 7ff7e4e38c9c __AdjustPointer 7330->7331 7332 7ff7e4e38cd8 __AdjustPointer 7330->7332 7334 7ff7e4e360c8 __GSHandlerCheck_EH 68 API calls 7331->7334 7335 7ff7e4e38cbb __GSHandlerCheck_EH 7331->7335 7333 7ff7e4e360c8 __GSHandlerCheck_EH 68 API calls 7332->7333 7332->7335 7333->7335 7334->7335 7335->7307 7337 7ff7e4e38090 _CallSETranslator 68 API calls 7336->7337 7338 7ff7e4e36238 7337->7338 7338->7285 7339 7ff7e4e39e10 GetProcessHeap 7520 7ff7e4e36590 7521 7ff7e4e365a9 7520->7521 7522 7ff7e4e365c1 7520->7522 7521->7522 7523 7ff7e4e3b380 __free_lconv_mon 11 API calls 7521->7523 7523->7522 7524 7ff7e4e3d578 7534 7ff7e4e35a88 7524->7534 7526 7ff7e4e3d5a0 7528 7ff7e4e38090 _CallSETranslator 68 API calls 7529 7ff7e4e3d5b0 7528->7529 7530 7ff7e4e38090 _CallSETranslator 68 API calls 7529->7530 7531 7ff7e4e3d5b9 7530->7531 7532 7ff7e4e37e28 __GSHandlerCheck_EH 59 API calls 7531->7532 7533 7ff7e4e3d5c2 7532->7533 7536 7ff7e4e35ab8 __CxxCallCatchBlock _IsNonwritableInCurrentImage __except_validate_context_record 7534->7536 7535 7ff7e4e35bb9 7535->7526 7535->7528 7536->7535 7537 7ff7e4e35b7c RtlUnwindEx 7536->7537 7537->7536 7686 7ff7e4e42afb 7689 7ff7e4e3635c 7686->7689 7690 7ff7e4e36386 7689->7690 7691 7ff7e4e36374 7689->7691 7692 7ff7e4e38090 _CallSETranslator 68 API calls 7690->7692 7691->7690 7693 7ff7e4e3637c 7691->7693 7695 7ff7e4e3638b 7692->7695 7694 7ff7e4e36384 7693->7694 7696 7ff7e4e38090 _CallSETranslator 68 API calls 7693->7696 7695->7694 7697 7ff7e4e38090 _CallSETranslator 68 API calls 7695->7697 7698 7ff7e4e363ab 7696->7698 7697->7694 7699 7ff7e4e38090 _CallSETranslator 68 API calls 7698->7699 7700 7ff7e4e363b8 7699->7700 7701 7ff7e4e37e28 __GSHandlerCheck_EH 59 API calls 7700->7701 7702 7ff7e4e363c1 7701->7702 7538 7ff7e4e42b80 7539 7ff7e4e42b99 7538->7539 7540 7ff7e4e42b8f 7538->7540 7542 7ff7e4e39df4 LeaveCriticalSection 7540->7542 7546 7ff7e4e3a784 GetCommandLineA GetCommandLineW 7792 7ff7e4e42876 7793 7ff7e4e38090 _CallSETranslator 68 API calls 7792->7793 7794 7ff7e4e4288e 7793->7794 7795 7ff7e4e38090 _CallSETranslator 68 API calls 7794->7795 7796 7ff7e4e428a9 7795->7796 7797 7ff7e4e38090 _CallSETranslator 68 API calls 7796->7797 7798 7ff7e4e428bd 7797->7798 7799 7ff7e4e3891c __GSHandlerCheck_EH 74 API calls 7798->7799 7800 7ff7e4e428fa 7799->7800 7801 7ff7e4e38090 _CallSETranslator 68 API calls 7800->7801 7802 7ff7e4e428ff 7801->7802 7803 7ff7e4e42a75 7804 7ff7e4e36130 __CxxCallCatchBlock 68 API calls 7803->7804 7807 7ff7e4e42a88 7804->7807 7805 7ff7e4e38090 _CallSETranslator 68 API calls 7806 7ff7e4e42adb 7805->7806 7808 7ff7e4e38090 _CallSETranslator 68 API calls 7806->7808 7810 7ff7e4e362e0 __CxxCallCatchBlock 68 API calls 7807->7810 7811 7ff7e4e42ac7 __CxxCallCatchBlock 7807->7811 7809 7ff7e4e42aeb 7808->7809 7810->7811 7811->7805 7340 7ff7e4e409f3 7343 7ff7e4e40a78 7340->7343 7341 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 7342 7ff7e4e40c3a 7341->7342 7343->7341 7547 7ff7e4e39d58 7548 7ff7e4e39d60 7547->7548 7550 7ff7e4e39d91 7548->7550 7551 7ff7e4e39d8d 7548->7551 7553 7ff7e4e39988 7548->7553 7558 7ff7e4e39da0 7550->7558 7554 7ff7e4e39b9c __CxxCallCatchBlock 5 API calls 7553->7554 7555 7ff7e4e399be 7554->7555 7556 7ff7e4e399dd InitializeCriticalSectionAndSpinCount 7555->7556 7557 7ff7e4e399c3 7555->7557 7556->7557 7557->7548 7559 7ff7e4e39dcb 7558->7559 7560 7ff7e4e39dae DeleteCriticalSection 7559->7560 7561 7ff7e4e39dcf 7559->7561 7560->7559 7561->7551 7562 7ff7e4e40d60 7563 7ff7e4e40d77 7562->7563 7564 7ff7e4e40d71 CloseHandle 7562->7564 7564->7563 7812 7ff7e4e35064 7813 7ff7e4e35468 GetModuleHandleW 7812->7813 7814 7ff7e4e3506b 7813->7814 7815 7ff7e4e350a5 7814->7815 7817 7ff7e4e3506f 7814->7817 7818 7ff7e4e3671c __CxxCallCatchBlock 23 API calls 7815->7818 7816 7ff7e4e3507b 7817->7816 7821 7ff7e4e36738 7817->7821 7819 7ff7e4e350ac 7818->7819 7822 7ff7e4e36858 7821->7822 7823 7ff7e4e368c7 7822->7823 7824 7ff7e4e3687d GetModuleHandleW 7822->7824 7825 7ff7e4e369ec __CxxCallCatchBlock 11 API calls 7823->7825 7824->7823 7829 7ff7e4e3688a 7824->7829 7826 7ff7e4e36903 7825->7826 7827 7ff7e4e3690a 7826->7827 7828 7ff7e4e36824 __CxxCallCatchBlock 11 API calls 7826->7828 7827->7816 7830 7ff7e4e3691c 7828->7830 7829->7823 7831 7ff7e4e36790 __CxxCallCatchBlock 3 API calls 7829->7831 7831->7823 5955 7ff7e4e3a8c8 5966 7ff7e4e3ab88 5955->5966 5958 7ff7e4e3aa4b 5984 7ff7e4e39800 5958->5984 5959 7ff7e4e3a932 IsValidCodePage 5959->5958 5961 7ff7e4e3a943 5959->5961 5963 7ff7e4e3a972 GetCPInfo 5961->5963 5965 7ff7e4e3a94c __scrt_get_show_window_mode 5961->5965 5963->5958 5963->5965 5973 7ff7e4e3afc8 5965->5973 5993 7ff7e4e3a82c 5966->5993 5969 7ff7e4e3abba 5971 7ff7e4e3a8f5 5969->5971 5972 7ff7e4e3abbf GetACP 5969->5972 5970 7ff7e4e3aba8 GetOEMCP 5970->5971 5971->5958 5971->5959 5971->5965 5972->5971 5974 7ff7e4e3b0fb 5973->5974 5975 7ff7e4e3b005 GetCPInfo 5973->5975 5976 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 5974->5976 5975->5974 5979 7ff7e4e3b018 5975->5979 5978 7ff7e4e3b19a 5976->5978 5978->5958 6274 7ff7e4e3c464 5979->6274 5983 7ff7e4e3dae4 64 API calls 5983->5974 5985 7ff7e4e39809 5984->5985 5986 7ff7e4e39814 5985->5986 5987 7ff7e4e3bfa0 IsProcessorFeaturePresent 5985->5987 5988 7ff7e4e3bfb8 5987->5988 6349 7ff7e4e3c074 RtlCaptureContext 5988->6349 5994 7ff7e4e3a850 5993->5994 6000 7ff7e4e3a84b 5993->6000 5994->6000 6001 7ff7e4e39e98 GetLastError 5994->6001 6000->5969 6000->5970 6002 7ff7e4e39ed9 FlsSetValue 6001->6002 6003 7ff7e4e39ebc FlsGetValue 6001->6003 6004 7ff7e4e39eeb 6002->6004 6005 7ff7e4e39ec9 SetLastError 6002->6005 6003->6005 6006 7ff7e4e39ed3 6003->6006 6031 7ff7e4e3c1c8 6004->6031 6009 7ff7e4e39f52 6005->6009 6010 7ff7e4e39f65 6005->6010 6006->6002 6023 7ff7e4e3deb0 6009->6023 6049 7ff7e4e37fcc 6010->6049 6013 7ff7e4e39f18 FlsSetValue 6017 7ff7e4e39f36 6013->6017 6018 7ff7e4e39f24 FlsSetValue 6013->6018 6014 7ff7e4e39f08 FlsSetValue 6016 7ff7e4e39f11 6014->6016 6038 7ff7e4e3b380 6016->6038 6044 7ff7e4e3a220 6017->6044 6018->6016 6024 7ff7e4e3a88e 6023->6024 6025 7ff7e4e3dec5 6023->6025 6027 7ff7e4e3dee4 6024->6027 6025->6024 6258 7ff7e4e3c9b8 6025->6258 6028 7ff7e4e3def9 6027->6028 6029 7ff7e4e3df0c 6027->6029 6028->6029 6271 7ff7e4e3a7b0 6028->6271 6029->6000 6036 7ff7e4e3c1d9 _set_fmode 6031->6036 6032 7ff7e4e3c22a 6063 7ff7e4e3c11c 6032->6063 6033 7ff7e4e3c20e HeapAlloc 6034 7ff7e4e39efa 6033->6034 6033->6036 6034->6013 6034->6014 6036->6032 6036->6033 6060 7ff7e4e36a24 6036->6060 6039 7ff7e4e3b3b4 6038->6039 6040 7ff7e4e3b385 RtlFreeHeap 6038->6040 6039->6005 6040->6039 6041 7ff7e4e3b3a0 GetLastError 6040->6041 6042 7ff7e4e3b3ad __free_lconv_mon 6041->6042 6043 7ff7e4e3c11c _set_fmode 9 API calls 6042->6043 6043->6039 6089 7ff7e4e3a3e8 6044->6089 6103 7ff7e4e3b4b8 6049->6103 6066 7ff7e4e36a6c 6060->6066 6072 7ff7e4e3a010 GetLastError 6063->6072 6065 7ff7e4e3c125 6065->6034 6071 7ff7e4e39dd8 EnterCriticalSection 6066->6071 6068 7ff7e4e36a79 6069 7ff7e4e39df4 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 6068->6069 6070 7ff7e4e36a36 6069->6070 6070->6036 6073 7ff7e4e3a051 FlsSetValue 6072->6073 6079 7ff7e4e3a034 6072->6079 6074 7ff7e4e3a041 6073->6074 6075 7ff7e4e3a063 6073->6075 6076 7ff7e4e3a0bd SetLastError 6074->6076 6077 7ff7e4e3c1c8 _set_fmode 5 API calls 6075->6077 6076->6065 6078 7ff7e4e3a072 6077->6078 6080 7ff7e4e3a090 FlsSetValue 6078->6080 6081 7ff7e4e3a080 FlsSetValue 6078->6081 6079->6073 6079->6074 6083 7ff7e4e3a0ae 6080->6083 6084 7ff7e4e3a09c FlsSetValue 6080->6084 6082 7ff7e4e3a089 6081->6082 6085 7ff7e4e3b380 __free_lconv_mon 5 API calls 6082->6085 6086 7ff7e4e3a220 _set_fmode 5 API calls 6083->6086 6084->6082 6085->6074 6087 7ff7e4e3a0b6 6086->6087 6088 7ff7e4e3b380 __free_lconv_mon 5 API calls 6087->6088 6088->6076 6101 7ff7e4e39dd8 EnterCriticalSection 6089->6101 6150 7ff7e4e3b764 6103->6150 6155 7ff7e4e39dd8 EnterCriticalSection 6150->6155 6259 7ff7e4e39e98 __CxxCallCatchBlock 59 API calls 6258->6259 6260 7ff7e4e3c9c7 6259->6260 6261 7ff7e4e3ca12 6260->6261 6270 7ff7e4e39dd8 EnterCriticalSection 6260->6270 6261->6024 6272 7ff7e4e39e98 __CxxCallCatchBlock 59 API calls 6271->6272 6273 7ff7e4e3a7b9 6272->6273 6275 7ff7e4e3a82c 59 API calls 6274->6275 6276 7ff7e4e3c4a6 6275->6276 6294 7ff7e4e3c5f4 6276->6294 6278 7ff7e4e3c4e3 6281 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6278->6281 6279 7ff7e4e3c4dc 6279->6278 6280 7ff7e4e3c240 12 API calls 6279->6280 6282 7ff7e4e3c5a0 6279->6282 6285 7ff7e4e3c50c __scrt_get_show_window_mode 6279->6285 6280->6285 6283 7ff7e4e3b08f 6281->6283 6282->6278 6284 7ff7e4e3b380 __free_lconv_mon 11 API calls 6282->6284 6289 7ff7e4e3dae4 6283->6289 6284->6278 6285->6282 6286 7ff7e4e3c5f4 MultiByteToWideChar 6285->6286 6287 7ff7e4e3c582 6286->6287 6287->6282 6288 7ff7e4e3c586 GetStringTypeW 6287->6288 6288->6282 6290 7ff7e4e3a82c 59 API calls 6289->6290 6291 7ff7e4e3db09 6290->6291 6297 7ff7e4e3db7c 6291->6297 6296 7ff7e4e3c5fd MultiByteToWideChar 6294->6296 6298 7ff7e4e3dbbd 6297->6298 6299 7ff7e4e3c5f4 MultiByteToWideChar 6298->6299 6302 7ff7e4e3dc07 6299->6302 6300 7ff7e4e3de85 6301 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6300->6301 6303 7ff7e4e3b0c2 6301->6303 6302->6300 6306 7ff7e4e3dc3f 6302->6306 6316 7ff7e4e3dd3d 6302->6316 6336 7ff7e4e3c240 6302->6336 6303->5983 6305 7ff7e4e3b380 __free_lconv_mon 11 API calls 6305->6300 6307 7ff7e4e3c5f4 MultiByteToWideChar 6306->6307 6306->6316 6308 7ff7e4e3dcb2 6307->6308 6308->6316 6328 7ff7e4e399f8 6308->6328 6311 7ff7e4e3dcfd 6313 7ff7e4e399f8 7 API calls 6311->6313 6311->6316 6312 7ff7e4e3dd4e 6314 7ff7e4e3c240 12 API calls 6312->6314 6315 7ff7e4e3de20 6312->6315 6318 7ff7e4e3dd6c 6312->6318 6313->6316 6314->6318 6315->6316 6317 7ff7e4e3b380 __free_lconv_mon 11 API calls 6315->6317 6316->6300 6316->6305 6317->6316 6318->6316 6319 7ff7e4e399f8 7 API calls 6318->6319 6320 7ff7e4e3ddec 6319->6320 6320->6315 6321 7ff7e4e3de0c 6320->6321 6322 7ff7e4e3de22 6320->6322 6343 7ff7e4e3d0bc 6321->6343 6324 7ff7e4e3d0bc WideCharToMultiByte 6322->6324 6325 7ff7e4e3de1a 6324->6325 6325->6315 6326 7ff7e4e3de3a 6325->6326 6326->6316 6327 7ff7e4e3b380 __free_lconv_mon 11 API calls 6326->6327 6327->6316 6329 7ff7e4e39b9c __CxxCallCatchBlock 5 API calls 6328->6329 6330 7ff7e4e39a36 6329->6330 6331 7ff7e4e39a3e LCMapStringEx 6330->6331 6332 7ff7e4e39a9d 6330->6332 6333 7ff7e4e39acf 6331->6333 6346 7ff7e4e39ae4 6332->6346 6333->6311 6333->6312 6333->6316 6335 7ff7e4e39aa7 LCMapStringW 6335->6333 6337 7ff7e4e3c28b 6336->6337 6338 7ff7e4e3c24f _set_fmode 6336->6338 6340 7ff7e4e3c11c _set_fmode 11 API calls 6337->6340 6338->6337 6339 7ff7e4e3c272 HeapAlloc 6338->6339 6342 7ff7e4e36a24 _set_fmode 2 API calls 6338->6342 6339->6338 6341 7ff7e4e3c289 6339->6341 6340->6341 6341->6306 6342->6338 6345 7ff7e4e3d0e0 WideCharToMultiByte 6343->6345 6347 7ff7e4e39b9c __CxxCallCatchBlock 5 API calls 6346->6347 6348 7ff7e4e39b12 6347->6348 6348->6335 6350 7ff7e4e3c08e RtlLookupFunctionEntry 6349->6350 6351 7ff7e4e3bfcb 6350->6351 6352 7ff7e4e3c0a4 RtlVirtualUnwind 6350->6352 6353 7ff7e4e3c0e8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6351->6353 6352->6350 6352->6351 7565 7ff7e4e3a54c 7566 7ff7e4e3a558 7565->7566 7568 7ff7e4e3a57f 7566->7568 7569 7ff7e4e3d414 7566->7569 7570 7ff7e4e3d419 7569->7570 7574 7ff7e4e3d454 7569->7574 7571 7ff7e4e3d43a DeleteCriticalSection 7570->7571 7572 7ff7e4e3d44c 7570->7572 7571->7571 7571->7572 7573 7ff7e4e3b380 __free_lconv_mon 11 API calls 7572->7573 7573->7574 7574->7566 7832 7ff7e4e42a50 7835 7ff7e4e38720 7832->7835 7836 7ff7e4e3873a 7835->7836 7838 7ff7e4e38787 7835->7838 7837 7ff7e4e38090 _CallSETranslator 68 API calls 7836->7837 7836->7838 7837->7838 7353 7ff7e4e365d0 7354 7ff7e4e3b380 __free_lconv_mon 11 API calls 7353->7354 7355 7ff7e4e365e0 7354->7355 7356 7ff7e4e3b380 __free_lconv_mon 11 API calls 7355->7356 7357 7ff7e4e365f4 7356->7357 7358 7ff7e4e3b380 __free_lconv_mon 11 API calls 7357->7358 7359 7ff7e4e36608 7358->7359 7360 7ff7e4e3b380 __free_lconv_mon 11 API calls 7359->7360 7361 7ff7e4e3661c 7360->7361 7839 7ff7e4e39e38 FlsAlloc 7840 7ff7e4e39e57 7839->7840 7844 7ff7e4e39e53 7839->7844 7841 7ff7e4e3a010 _set_fmode 11 API calls 7840->7841 7842 7ff7e4e39e5c 7841->7842 7842->7844 7845 7ff7e4e39e74 7842->7845 7846 7ff7e4e39e8f 7845->7846 7847 7ff7e4e39e83 FlsFree 7845->7847 7846->7844 7847->7846 7715 7ff7e4e384bc 7716 7ff7e4e38090 _CallSETranslator 68 API calls 7715->7716 7717 7ff7e4e384f1 7716->7717 7718 7ff7e4e38090 _CallSETranslator 68 API calls 7717->7718 7719 7ff7e4e384ff __except_validate_context_record 7718->7719 7720 7ff7e4e38090 _CallSETranslator 68 API calls 7719->7720 7721 7ff7e4e38543 7720->7721 7722 7ff7e4e38090 _CallSETranslator 68 API calls 7721->7722 7723 7ff7e4e3854c 7722->7723 7724 7ff7e4e38090 _CallSETranslator 68 API calls 7723->7724 7725 7ff7e4e38555 7724->7725 7738 7ff7e4e360f4 7725->7738 7728 7ff7e4e38090 _CallSETranslator 68 API calls 7729 7ff7e4e38585 __CxxCallCatchBlock 7728->7729 7730 7ff7e4e36130 __CxxCallCatchBlock 68 API calls 7729->7730 7731 7ff7e4e38636 7730->7731 7736 7ff7e4e362e0 __CxxCallCatchBlock 68 API calls 7731->7736 7737 7ff7e4e3865f __CxxCallCatchBlock 7731->7737 7732 7ff7e4e38090 _CallSETranslator 68 API calls 7733 7ff7e4e38672 7732->7733 7734 7ff7e4e38090 _CallSETranslator 68 API calls 7733->7734 7735 7ff7e4e3867b 7734->7735 7736->7737 7737->7732 7739 7ff7e4e38090 _CallSETranslator 68 API calls 7738->7739 7740 7ff7e4e36105 7739->7740 7741 7ff7e4e38090 _CallSETranslator 68 API calls 7740->7741 7742 7ff7e4e36110 7740->7742 7741->7742 7743 7ff7e4e38090 _CallSETranslator 68 API calls 7742->7743 7744 7ff7e4e36121 7743->7744 7744->7728 7744->7729 6354 7ff7e4e34f3c 6384 7ff7e4e35210 6354->6384 6357 7ff7e4e35088 6440 7ff7e4e354d4 IsProcessorFeaturePresent 6357->6440 6358 7ff7e4e34f58 __scrt_acquire_startup_lock 6360 7ff7e4e35092 6358->6360 6361 7ff7e4e34f76 6358->6361 6362 7ff7e4e354d4 7 API calls 6360->6362 6373 7ff7e4e34f97 __CxxCallCatchBlock __scrt_release_startup_lock 6361->6373 6392 7ff7e4e37680 6361->6392 6363 7ff7e4e3509d 6362->6363 6405 7ff7e4e36710 6363->6405 6366 7ff7e4e34f9b 6368 7ff7e4e3671c __CxxCallCatchBlock 23 API calls 6369 7ff7e4e350ac 6368->6369 6370 7ff7e4e35021 6396 7ff7e4e3542c 6370->6396 6372 7ff7e4e35026 6399 7ff7e4e31020 6372->6399 6373->6366 6373->6370 6416 7ff7e4e36748 6373->6416 6379 7ff7e4e3504d 6380 7ff7e4e35057 6379->6380 6423 7ff7e4e36728 6379->6423 6434 7ff7e4e3524c 6380->6434 6385 7ff7e4e35218 6384->6385 6386 7ff7e4e35224 __scrt_dllmain_crt_thread_attach 6385->6386 6387 7ff7e4e34f50 6386->6387 6388 7ff7e4e35231 6386->6388 6387->6357 6387->6358 6447 7ff7e4e36630 6388->6447 6393 7ff7e4e37693 6392->6393 6394 7ff7e4e376ba 6393->6394 6515 7ff7e4e34e38 6393->6515 6394->6373 6661 7ff7e4e41e00 6396->6661 6398 7ff7e4e35443 GetStartupInfoW 6398->6372 6400 7ff7e4e31084 6399->6400 6663 7ff7e4e347d0 6400->6663 6402 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6403 7ff7e4e310c3 6402->6403 6421 7ff7e4e35468 GetModuleHandleW 6403->6421 6406 7ff7e4e36858 6405->6406 6407 7ff7e4e368c7 6406->6407 6408 7ff7e4e3687d GetModuleHandleW 6406->6408 6409 7ff7e4e369ec __CxxCallCatchBlock 11 API calls 6407->6409 6408->6407 6414 7ff7e4e3688a 6408->6414 6411 7ff7e4e36903 6409->6411 6410 7ff7e4e350a4 6410->6368 6411->6410 6412 7ff7e4e36824 __CxxCallCatchBlock 11 API calls 6411->6412 6413 7ff7e4e3691c 6412->6413 6414->6407 6415 7ff7e4e36790 __CxxCallCatchBlock 3 API calls 6414->6415 6415->6407 6417 7ff7e4e3675f 6416->6417 6418 7ff7e4e36780 6416->6418 6417->6370 7018 7ff7e4e37e28 6418->7018 6422 7ff7e4e35049 6421->6422 6422->6363 6422->6379 6424 7ff7e4e36858 6423->6424 6425 7ff7e4e368c7 6424->6425 6426 7ff7e4e3687d GetModuleHandleW 6424->6426 6427 7ff7e4e369ec __CxxCallCatchBlock 11 API calls 6425->6427 6426->6425 6432 7ff7e4e3688a 6426->6432 6428 7ff7e4e36903 6427->6428 6429 7ff7e4e3690a 6428->6429 6430 7ff7e4e36824 __CxxCallCatchBlock 11 API calls 6428->6430 6429->6380 6431 7ff7e4e3691c 6430->6431 6432->6425 6433 7ff7e4e36790 __CxxCallCatchBlock 3 API calls 6432->6433 6433->6425 6435 7ff7e4e3525d 6434->6435 6436 7ff7e4e35060 6435->6436 7023 7ff7e4e36644 6435->7023 6436->6366 6438 7ff7e4e35266 6439 7ff7e4e364cc 7 API calls 6438->6439 6439->6436 6441 7ff7e4e354fa _invalid_parameter_noinfo_noreturn __scrt_get_show_window_mode 6440->6441 6442 7ff7e4e35519 RtlCaptureContext RtlLookupFunctionEntry 6441->6442 6443 7ff7e4e3557e __scrt_get_show_window_mode 6442->6443 6444 7ff7e4e35542 RtlVirtualUnwind 6442->6444 6445 7ff7e4e355b0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6443->6445 6444->6443 6446 7ff7e4e355fe _invalid_parameter_noinfo_noreturn 6445->6446 6446->6360 6448 7ff7e4e3b3bc 6447->6448 6449 7ff7e4e35236 6448->6449 6458 7ff7e4e3a7cc 6448->6458 6462 7ff7e4e3a510 6448->6462 6449->6387 6452 7ff7e4e364cc 6449->6452 6453 7ff7e4e364de 6452->6453 6454 7ff7e4e364d4 6452->6454 6453->6387 6494 7ff7e4e3806c 6454->6494 6459 7ff7e4e3a7d9 6458->6459 6461 7ff7e4e3a808 6458->6461 6473 7ff7e4e39f6c 6459->6473 6461->6448 6493 7ff7e4e39dd8 EnterCriticalSection 6462->6493 6464 7ff7e4e3a520 6465 7ff7e4e3d464 60 API calls 6464->6465 6466 7ff7e4e3a529 6465->6466 6467 7ff7e4e3a537 6466->6467 6468 7ff7e4e3a58c 62 API calls 6466->6468 6469 7ff7e4e39df4 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 6467->6469 6470 7ff7e4e3a532 6468->6470 6471 7ff7e4e3a543 6469->6471 6472 7ff7e4e3a67c GetStdHandle GetFileType 6470->6472 6471->6448 6472->6467 6474 7ff7e4e39f98 FlsSetValue 6473->6474 6475 7ff7e4e39f7d FlsGetValue 6473->6475 6476 7ff7e4e39f8a 6474->6476 6477 7ff7e4e39fa5 6474->6477 6475->6476 6478 7ff7e4e39f92 6475->6478 6480 7ff7e4e39f90 6476->6480 6481 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 6476->6481 6479 7ff7e4e3c1c8 _set_fmode 11 API calls 6477->6479 6478->6474 6483 7ff7e4e39fb4 6479->6483 6480->6461 6482 7ff7e4e3a00d 6481->6482 6484 7ff7e4e39fd2 FlsSetValue 6483->6484 6485 7ff7e4e39fc2 FlsSetValue 6483->6485 6487 7ff7e4e39fde FlsSetValue 6484->6487 6488 7ff7e4e39ff0 6484->6488 6486 7ff7e4e39fcb 6485->6486 6489 7ff7e4e3b380 __free_lconv_mon 11 API calls 6486->6489 6487->6486 6490 7ff7e4e3a220 _set_fmode 11 API calls 6488->6490 6489->6476 6491 7ff7e4e39ff8 6490->6491 6492 7ff7e4e3b380 __free_lconv_mon 11 API calls 6491->6492 6492->6480 6495 7ff7e4e364d9 6494->6495 6496 7ff7e4e3807b 6494->6496 6498 7ff7e4e398c8 6495->6498 6502 7ff7e4e3d614 6496->6502 6499 7ff7e4e398f3 6498->6499 6500 7ff7e4e398f7 6499->6500 6501 7ff7e4e398d6 DeleteCriticalSection 6499->6501 6500->6453 6501->6499 6506 7ff7e4e3d75c 6502->6506 6507 7ff7e4e3d63b TlsFree 6506->6507 6513 7ff7e4e3d7a0 __vcrt_FlsAlloc 6506->6513 6508 7ff7e4e3d7ce LoadLibraryExW 6510 7ff7e4e3d86d 6508->6510 6511 7ff7e4e3d7ef GetLastError 6508->6511 6509 7ff7e4e3d88d GetProcAddress 6509->6507 6510->6509 6512 7ff7e4e3d884 FreeLibrary 6510->6512 6511->6513 6512->6509 6513->6507 6513->6508 6513->6509 6514 7ff7e4e3d811 LoadLibraryExW 6513->6514 6514->6510 6514->6513 6516 7ff7e4e34e46 6515->6516 6536 7ff7e4e359e0 6516->6536 6518 7ff7e4e34e57 6541 7ff7e4e37ce0 6518->6541 6520 7ff7e4e34e74 6547 7ff7e4e35278 6520->6547 6522 7ff7e4e354d4 7 API calls 6524 7ff7e4e34f0d 6522->6524 6523 7ff7e4e34e8c _RTC_Initialize 6534 7ff7e4e34eef 6523->6534 6552 7ff7e4e350c4 6523->6552 6524->6393 6526 7ff7e4e34ea1 6555 7ff7e4e36bbc 6526->6555 6530 7ff7e4e34eb6 6531 7ff7e4e36ab0 59 API calls 6530->6531 6532 7ff7e4e34ee1 6531->6532 6533 7ff7e4e373a4 62 API calls 6532->6533 6532->6534 6533->6534 6534->6522 6535 7ff7e4e34efd 6534->6535 6535->6393 6537 7ff7e4e359ff 6536->6537 6538 7ff7e4e35a4a RaiseException 6537->6538 6539 7ff7e4e35a28 RtlPcToFileHeader 6537->6539 6538->6518 6540 7ff7e4e35a40 6539->6540 6540->6538 6542 7ff7e4e37cf1 6541->6542 6543 7ff7e4e3c11c _set_fmode 11 API calls 6542->6543 6546 7ff7e4e37cf9 6542->6546 6544 7ff7e4e37d08 6543->6544 6545 7ff7e4e376c8 _invalid_parameter_noinfo 59 API calls 6544->6545 6545->6546 6546->6520 6548 7ff7e4e35289 6547->6548 6551 7ff7e4e3528e __scrt_acquire_startup_lock 6547->6551 6549 7ff7e4e354d4 7 API calls 6548->6549 6548->6551 6550 7ff7e4e35302 6549->6550 6551->6523 6583 7ff7e4e350dc 6552->6583 6554 7ff7e4e350cd 6554->6526 6556 7ff7e4e34ead 6555->6556 6557 7ff7e4e36bdc 6555->6557 6556->6534 6582 7ff7e4e353c4 InitializeSListHead 6556->6582 6558 7ff7e4e36bfa GetModuleFileNameW 6557->6558 6559 7ff7e4e36be4 6557->6559 6563 7ff7e4e36c25 6558->6563 6560 7ff7e4e3c11c _set_fmode 11 API calls 6559->6560 6561 7ff7e4e36be9 6560->6561 6562 7ff7e4e376c8 _invalid_parameter_noinfo 59 API calls 6561->6562 6562->6556 6598 7ff7e4e36d40 6563->6598 6566 7ff7e4e36c6d 6567 7ff7e4e3c11c _set_fmode 11 API calls 6566->6567 6568 7ff7e4e36c72 6567->6568 6569 7ff7e4e3b380 __free_lconv_mon 11 API calls 6568->6569 6572 7ff7e4e36c80 6569->6572 6570 7ff7e4e36ca7 6574 7ff7e4e3b380 __free_lconv_mon 11 API calls 6570->6574 6571 7ff7e4e36c85 6571->6570 6604 7ff7e4e3ca90 6571->6604 6572->6556 6574->6556 6576 7ff7e4e36cec 6580 7ff7e4e3b380 __free_lconv_mon 11 API calls 6576->6580 6577 7ff7e4e36cd3 6578 7ff7e4e3b380 __free_lconv_mon 11 API calls 6577->6578 6579 7ff7e4e36cdc 6578->6579 6581 7ff7e4e3b380 __free_lconv_mon 11 API calls 6579->6581 6580->6570 6581->6572 6584 7ff7e4e350f6 6583->6584 6585 7ff7e4e350ef 6583->6585 6587 7ff7e4e36f6c 6584->6587 6585->6554 6590 7ff7e4e372d8 6587->6590 6597 7ff7e4e39dd8 EnterCriticalSection 6590->6597 6599 7ff7e4e36d58 6598->6599 6603 7ff7e4e36c65 6598->6603 6600 7ff7e4e3c1c8 _set_fmode 11 API calls 6599->6600 6599->6603 6601 7ff7e4e36d86 6600->6601 6602 7ff7e4e3b380 __free_lconv_mon 11 API calls 6601->6602 6602->6603 6603->6566 6603->6571 6605 7ff7e4e3ca98 6604->6605 6606 7ff7e4e3cad8 6605->6606 6640 7ff7e4e3caf0 6605->6640 6607 7ff7e4e3c11c _set_fmode 11 API calls 6606->6607 6608 7ff7e4e3cadd 6607->6608 6609 7ff7e4e376c8 _invalid_parameter_noinfo 59 API calls 6608->6609 6632 7ff7e4e3cae9 6609->6632 6610 7ff7e4e36d40 11 API calls 6611 7ff7e4e3cd70 6610->6611 6615 7ff7e4e3cd78 6611->6615 6624 7ff7e4e3cdaa 6611->6624 6612 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6617 7ff7e4e36ccd 6612->6617 6613 7ff7e4e3cd20 6613->6610 6614 7ff7e4e3ce88 62 API calls 6614->6640 6618 7ff7e4e3b380 __free_lconv_mon 11 API calls 6615->6618 6616 7ff7e4e3ce16 6621 7ff7e4e3b380 __free_lconv_mon 11 API calls 6616->6621 6617->6576 6617->6577 6620 7ff7e4e3cd7f 6618->6620 6619 7ff7e4e3ccc9 6625 7ff7e4e3ccea 6619->6625 6629 7ff7e4e3b380 __free_lconv_mon 11 API calls 6619->6629 6620->6625 6626 7ff7e4e3b380 __free_lconv_mon 11 API calls 6620->6626 6622 7ff7e4e3ce25 6621->6622 6627 7ff7e4e3ce3e 6622->6627 6630 7ff7e4e3b380 __free_lconv_mon 11 API calls 6622->6630 6623 7ff7e4e3cbc6 FindFirstFileExW 6623->6640 6624->6616 6624->6624 6636 7ff7e4e3ce72 6624->6636 6652 7ff7e4e3c308 6624->6652 6628 7ff7e4e3b380 __free_lconv_mon 11 API calls 6625->6628 6626->6620 6631 7ff7e4e3b380 __free_lconv_mon 11 API calls 6627->6631 6628->6632 6629->6619 6630->6622 6631->6632 6632->6612 6633 7ff7e4e3ccf8 6633->6625 6635 7ff7e4e3b380 __free_lconv_mon 11 API calls 6633->6635 6635->6633 6638 7ff7e4e37718 _invalid_parameter_noinfo_noreturn 17 API calls 6636->6638 6637 7ff7e4e3cc6f FindNextFileW 6637->6640 6642 7ff7e4e3ce84 6638->6642 6639 7ff7e4e3ccef FindClose 6639->6633 6640->6613 6640->6614 6640->6619 6640->6623 6640->6633 6640->6637 6640->6639 6641 7ff7e4e3ccb1 FindClose 6640->6641 6644 7ff7e4e3ef20 6640->6644 6641->6640 6645 7ff7e4e3ef4d 6644->6645 6646 7ff7e4e3c11c _set_fmode 11 API calls 6645->6646 6651 7ff7e4e3ef62 6645->6651 6647 7ff7e4e3ef57 6646->6647 6648 7ff7e4e376c8 _invalid_parameter_noinfo 59 API calls 6647->6648 6648->6651 6649 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6650 7ff7e4e3f320 6649->6650 6650->6641 6651->6649 6656 7ff7e4e3c325 6652->6656 6653 7ff7e4e3c32a 6654 7ff7e4e3c340 6653->6654 6655 7ff7e4e3c11c _set_fmode 11 API calls 6653->6655 6654->6624 6657 7ff7e4e3c334 6655->6657 6656->6653 6656->6654 6659 7ff7e4e3c376 6656->6659 6658 7ff7e4e376c8 _invalid_parameter_noinfo 59 API calls 6657->6658 6658->6654 6659->6654 6660 7ff7e4e3c11c _set_fmode 11 API calls 6659->6660 6660->6657 6662 7ff7e4e41df0 6661->6662 6662->6398 6662->6662 6680 7ff7e4e31c10 6663->6680 6665 7ff7e4e34852 6687 7ff7e4e310d0 6665->6687 6668 7ff7e4e347fa 6668->6665 6684 7ff7e4e34940 6668->6684 6673 7ff7e4e3487c 6736 7ff7e4e34340 GetModuleFileNameA 6673->6736 6676 7ff7e4e316d0 59 API calls 6677 7ff7e4e3489b 6676->6677 6678 7ff7e4e316d0 59 API calls 6677->6678 6679 7ff7e4e310b3 6678->6679 6679->6402 6681 7ff7e4e31c2b 6680->6681 6751 7ff7e4e32c40 6681->6751 6755 7ff7e4e34970 6684->6755 6688 7ff7e4e31410 79 API calls 6687->6688 6689 7ff7e4e31113 6688->6689 6869 7ff7e4e31590 6689->6869 6694 7ff7e4e31410 79 API calls 6695 7ff7e4e31184 6694->6695 6696 7ff7e4e316d0 59 API calls 6695->6696 6697 7ff7e4e31192 6696->6697 6698 7ff7e4e31650 79 API calls 6697->6698 6699 7ff7e4e311a5 6698->6699 6700 7ff7e4e31410 79 API calls 6699->6700 6701 7ff7e4e311ba 6700->6701 6702 7ff7e4e316d0 59 API calls 6701->6702 6703 7ff7e4e311c8 6702->6703 6879 7ff7e4e31700 6703->6879 6705 7ff7e4e311db 6885 7ff7e4e31870 6705->6885 6707 7ff7e4e3122f 6889 7ff7e4e31910 6707->6889 6709 7ff7e4e3127c 6898 7ff7e4e319e0 6709->6898 6712 7ff7e4e316d0 59 API calls 6712->6709 6714 7ff7e4e316d0 59 API calls 6715 7ff7e4e31294 6714->6715 6716 7ff7e4e316d0 59 API calls 6715->6716 6717 7ff7e4e3129d 6716->6717 6718 7ff7e4e319e0 59 API calls 6717->6718 6719 7ff7e4e312a9 6718->6719 6720 7ff7e4e316d0 59 API calls 6719->6720 6721 7ff7e4e312b2 6720->6721 6722 7ff7e4e31410 6721->6722 6723 7ff7e4e31c10 8 API calls 6722->6723 6724 7ff7e4e3143b 6723->6724 6725 7ff7e4e31c60 79 API calls 6724->6725 6726 7ff7e4e3145b 6725->6726 7003 7ff7e4e33ff0 6726->7003 6729 7ff7e4e31c60 79 API calls 6730 7ff7e4e3149f 6729->6730 6731 7ff7e4e314b4 6730->6731 6732 7ff7e4e316d0 59 API calls 6730->6732 6733 7ff7e4e316d0 6731->6733 6732->6731 7007 7ff7e4e33c40 6733->7007 6735 7ff7e4e316e7 6735->6673 6739 7ff7e4e343b0 __scrt_get_show_window_mode 6736->6739 6742 7ff7e4e34455 6736->6742 6737 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6738 7ff7e4e34623 6737->6738 6738->6676 7013 7ff7e4e34630 CreateProcessA 6739->7013 6741 7ff7e4e34451 6741->6742 7014 7ff7e4e346f0 ReadProcessMemory 6741->7014 6742->6737 6744 7ff7e4e344a7 VirtualAllocEx 7015 7ff7e4e34760 WriteProcessMemory 6744->7015 6746 7ff7e4e34501 6747 7ff7e4e3458f 6746->6747 7016 7ff7e4e34760 WriteProcessMemory 6746->7016 7017 7ff7e4e34760 WriteProcessMemory 6747->7017 6750 7ff7e4e345c1 SetThreadContext ResumeThread 6750->6742 6752 7ff7e4e32c6c 6751->6752 6753 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6752->6753 6754 7ff7e4e31c33 6753->6754 6754->6668 6756 7ff7e4e349f2 6755->6756 6758 7ff7e4e349a5 6755->6758 6761 7ff7e4e34a20 6756->6761 6759 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6758->6759 6760 7ff7e4e3495b 6759->6760 6760->6668 6779 7ff7e4e32360 6761->6779 6764 7ff7e4e34a83 6783 7ff7e4e32420 6764->6783 6767 7ff7e4e34aad 6788 7ff7e4e32460 6767->6788 6769 7ff7e4e34ad4 6770 7ff7e4e34b78 6769->6770 6771 7ff7e4e34b1f 6769->6771 6772 7ff7e4e34bc0 8 API calls 6770->6772 6791 7ff7e4e34bc0 6771->6791 6777 7ff7e4e34b66 6772->6777 6776 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6778 7ff7e4e34bb3 6776->6778 6777->6776 6778->6758 6780 7ff7e4e32383 6779->6780 6781 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6780->6781 6782 7ff7e4e323f5 6781->6782 6782->6764 6798 7ff7e4e32400 6782->6798 6784 7ff7e4e32360 8 API calls 6783->6784 6785 7ff7e4e3243c 6784->6785 6801 7ff7e4e32ac0 6785->6801 6805 7ff7e4e32610 6788->6805 6792 7ff7e4e34bfb 6791->6792 6793 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6792->6793 6794 7ff7e4e34b52 6793->6794 6795 7ff7e4e32560 6794->6795 6830 7ff7e4e31b20 6795->6830 6846 7ff7e4e34cdc 6798->6846 6803 7ff7e4e32afd 6801->6803 6802 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6804 7ff7e4e3244d 6802->6804 6803->6802 6804->6767 6808 7ff7e4e32640 6805->6808 6809 7ff7e4e32658 6808->6809 6812 7ff7e4e32690 6809->6812 6813 7ff7e4e326ac 6812->6813 6818 7ff7e4e32495 6812->6818 6814 7ff7e4e326b7 6813->6814 6815 7ff7e4e326c8 6813->6815 6819 7ff7e4e326f0 6814->6819 6827 7ff7e4e32770 6815->6827 6818->6769 6820 7ff7e4e32718 6819->6820 6821 7ff7e4e32713 6819->6821 6823 7ff7e4e32770 79 API calls 6820->6823 6822 7ff7e4e32790 RtlPcToFileHeader RaiseException 6821->6822 6822->6820 6824 7ff7e4e32722 6823->6824 6825 7ff7e4e3272f 6824->6825 6826 7ff7e4e376e8 _invalid_parameter_noinfo_noreturn 59 API calls 6824->6826 6825->6818 6826->6825 6828 7ff7e4e34c44 79 API calls 6827->6828 6829 7ff7e4e32783 6828->6829 6829->6818 6833 7ff7e4e31b50 6830->6833 6832 7ff7e4e31b46 6832->6777 6834 7ff7e4e31b69 6833->6834 6835 7ff7e4e31b78 6833->6835 6837 7ff7e4e31b90 6834->6837 6835->6832 6838 7ff7e4e31beb 6837->6838 6839 7ff7e4e31bf3 6838->6839 6841 7ff7e4e376e8 6838->6841 6839->6835 6842 7ff7e4e37ab0 _invalid_parameter_noinfo_noreturn 59 API calls 6841->6842 6843 7ff7e4e37701 6842->6843 6844 7ff7e4e37718 _invalid_parameter_noinfo_noreturn 17 API calls 6843->6844 6845 7ff7e4e37716 6844->6845 6853 7ff7e4e34d80 6846->6853 6849 7ff7e4e359e0 Concurrency::cancel_current_task 2 API calls 6850 7ff7e4e34cfe 6849->6850 6856 7ff7e4e363c4 6850->6856 6852 7ff7e4e32410 6854 7ff7e4e363c4 __std_exception_copy 59 API calls 6853->6854 6855 7ff7e4e34ced 6854->6855 6855->6849 6857 7ff7e4e3641a __std_exception_destroy 6856->6857 6858 7ff7e4e363e5 6856->6858 6857->6852 6858->6857 6860 7ff7e4e39820 6858->6860 6861 7ff7e4e39837 6860->6861 6862 7ff7e4e3982d 6860->6862 6863 7ff7e4e3c11c _set_fmode 11 API calls 6861->6863 6862->6861 6867 7ff7e4e39852 6862->6867 6864 7ff7e4e3983e 6863->6864 6866 7ff7e4e376c8 _invalid_parameter_noinfo 59 API calls 6864->6866 6865 7ff7e4e3984a 6865->6857 6866->6865 6867->6865 6868 7ff7e4e3c11c _set_fmode 11 API calls 6867->6868 6868->6864 6870 7ff7e4e315ce 6869->6870 6901 7ff7e4e337c0 6870->6901 6872 7ff7e4e31635 6873 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6872->6873 6874 7ff7e4e3115d 6873->6874 6875 7ff7e4e31650 6874->6875 6876 7ff7e4e3167a 6875->6876 6947 7ff7e4e33d60 6876->6947 6880 7ff7e4e3172d 6879->6880 6881 7ff7e4e337c0 79 API calls 6880->6881 6882 7ff7e4e31789 6881->6882 6883 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6882->6883 6884 7ff7e4e31796 6883->6884 6884->6705 6886 7ff7e4e31892 6885->6886 6887 7ff7e4e31906 6886->6887 6960 7ff7e4e32d40 6886->6960 6887->6707 6890 7ff7e4e31c10 8 API calls 6889->6890 6891 7ff7e4e3193f 6890->6891 6964 7ff7e4e31c60 6891->6964 6893 7ff7e4e31957 6894 7ff7e4e31c60 79 API calls 6893->6894 6895 7ff7e4e31986 6894->6895 6896 7ff7e4e31260 6895->6896 6897 7ff7e4e316d0 59 API calls 6895->6897 6896->6709 6896->6712 6897->6896 6899 7ff7e4e31a00 59 API calls 6898->6899 6900 7ff7e4e31288 6899->6900 6900->6714 6903 7ff7e4e337ef 6901->6903 6902 7ff7e4e3385f 6902->6872 6903->6902 6909 7ff7e4e338d0 6903->6909 6926 7ff7e4e33ad0 6909->6926 6912 7ff7e4e338fc 6930 7ff7e4e33b60 6912->6930 6916 7ff7e4e33920 6917 7ff7e4e33953 6916->6917 6939 7ff7e4e33a20 6917->6939 6920 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6921 7ff7e4e33844 6920->6921 6922 7ff7e4e339e0 6921->6922 6923 7ff7e4e339fc 6922->6923 6924 7ff7e4e339f4 6922->6924 6923->6902 6943 7ff7e4e31a00 6924->6943 6927 7ff7e4e33af3 6926->6927 6928 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6927->6928 6929 7ff7e4e338f2 6928->6929 6929->6912 6936 7ff7e4e33b40 6929->6936 6931 7ff7e4e33bb2 6930->6931 6932 7ff7e4e32610 79 API calls 6931->6932 6933 7ff7e4e33bbf 6932->6933 6934 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6933->6934 6935 7ff7e4e33822 6934->6935 6935->6916 6937 7ff7e4e34cdc std::_Xinvalid_argument 61 API calls 6936->6937 6938 7ff7e4e33b50 6937->6938 6940 7ff7e4e33a4c __GSHandlerCheck_EH 6939->6940 6941 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6940->6941 6942 7ff7e4e3399e 6941->6942 6942->6920 6944 7ff7e4e31a17 6943->6944 6945 7ff7e4e31b20 59 API calls 6944->6945 6946 7ff7e4e31a9b 6944->6946 6945->6946 6946->6923 6948 7ff7e4e32360 8 API calls 6947->6948 6949 7ff7e4e33d9b 6948->6949 6950 7ff7e4e32400 61 API calls 6949->6950 6951 7ff7e4e33da5 6949->6951 6950->6951 6952 7ff7e4e32360 8 API calls 6951->6952 6959 7ff7e4e33dd5 6951->6959 6953 7ff7e4e33e34 6952->6953 6954 7ff7e4e32ac0 8 API calls 6953->6954 6955 7ff7e4e33e46 6954->6955 6956 7ff7e4e32460 79 API calls 6955->6956 6956->6959 6957 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6958 7ff7e4e31172 6957->6958 6958->6694 6959->6957 6961 7ff7e4e32d72 6960->6961 6962 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6961->6962 6963 7ff7e4e32dc2 6962->6963 6963->6886 6965 7ff7e4e31c81 6964->6965 6966 7ff7e4e31ca1 6965->6966 6967 7ff7e4e31c92 6965->6967 6971 7ff7e4e32020 6966->6971 6977 7ff7e4e31fc0 6967->6977 6970 7ff7e4e31c9f 6970->6893 6972 7ff7e4e320c0 6971->6972 6974 7ff7e4e32064 6971->6974 6981 7ff7e4e32190 6972->6981 6975 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6974->6975 6976 7ff7e4e320f1 6975->6976 6976->6970 6978 7ff7e4e31ff5 6977->6978 6979 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6978->6979 6980 7ff7e4e32014 6979->6980 6980->6970 6982 7ff7e4e32360 8 API calls 6981->6982 6983 7ff7e4e321e8 6982->6983 6984 7ff7e4e321f9 6983->6984 6985 7ff7e4e32400 61 API calls 6983->6985 6986 7ff7e4e32420 8 API calls 6984->6986 6985->6984 6987 7ff7e4e32223 6986->6987 6988 7ff7e4e32460 79 API calls 6987->6988 6989 7ff7e4e3224a 6988->6989 6990 7ff7e4e322fc 6989->6990 6992 7ff7e4e32295 6989->6992 6991 7ff7e4e324c0 8 API calls 6990->6991 6997 7ff7e4e322ea 6991->6997 6999 7ff7e4e324c0 6992->6999 6995 7ff7e4e32560 59 API calls 6995->6997 6996 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 6998 7ff7e4e32342 6996->6998 6997->6996 6998->6974 7000 7ff7e4e32502 6999->7000 7001 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 7000->7001 7002 7ff7e4e322d6 7001->7002 7002->6995 7004 7ff7e4e3404a 7003->7004 7005 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 7004->7005 7006 7ff7e4e31490 7005->7006 7006->6729 7008 7ff7e4e33c6d 7007->7008 7009 7ff7e4e32560 59 API calls 7008->7009 7010 7ff7e4e33c7b 7008->7010 7009->7010 7011 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 7010->7011 7012 7ff7e4e33cea 7011->7012 7012->6735 7013->6741 7014->6744 7015->6746 7016->6746 7017->6750 7019 7ff7e4e39e98 __CxxCallCatchBlock 59 API calls 7018->7019 7020 7ff7e4e37e31 7019->7020 7021 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7020->7021 7022 7ff7e4e37e51 7021->7022 7024 7ff7e4e3664c 7023->7024 7027 7ff7e4e36662 7023->7027 7025 7ff7e4e3665b 7024->7025 7028 7ff7e4e3b7ac 7024->7028 7025->6438 7027->6438 7029 7ff7e4e3b914 7028->7029 7031 7ff7e4e3ba10 7029->7031 7038 7ff7e4e39dd8 EnterCriticalSection 7031->7038 7362 7ff7e4e40fbb 7363 7ff7e4e40ffb 7362->7363 7365 7ff7e4e41260 7362->7365 7364 7ff7e4e41242 7363->7364 7363->7365 7367 7ff7e4e4102f 7363->7367 7370 7ff7e4e418d8 7364->7370 7366 7ff7e4e41256 7365->7366 7369 7ff7e4e418d8 _log10_special 19 API calls 7365->7369 7369->7366 7373 7ff7e4e41840 7370->7373 7374 7ff7e4e4185a 7373->7374 7375 7ff7e4e418c9 7374->7375 7377 7ff7e4e4169c 7374->7377 7375->7366 7378 7ff7e4e416dc _raise_exc _log10_special 7377->7378 7379 7ff7e4e41785 7378->7379 7380 7ff7e4e41755 7378->7380 7390 7ff7e4e41960 7379->7390 7386 7ff7e4e41578 7380->7386 7383 7ff7e4e41783 _log10_special 7384 7ff7e4e39800 _invalid_parameter_noinfo_noreturn 8 API calls 7383->7384 7385 7ff7e4e417ad 7384->7385 7385->7375 7387 7ff7e4e415bc _log10_special 7386->7387 7388 7ff7e4e415d1 7387->7388 7389 7ff7e4e41960 _log10_special 11 API calls 7387->7389 7388->7383 7389->7388 7391 7ff7e4e41980 7390->7391 7392 7ff7e4e41969 7390->7392 7393 7ff7e4e3c11c _set_fmode 11 API calls 7391->7393 7394 7ff7e4e41978 7392->7394 7395 7ff7e4e3c11c _set_fmode 11 API calls 7392->7395 7393->7394 7394->7383 7395->7394 7848 7ff7e4e42840 7851 7ff7e4e37b4c 7848->7851 7852 7ff7e4e3a010 _set_fmode 11 API calls 7851->7852 7853 7ff7e4e37b6a 7852->7853 7745 7ff7e4e312c0 7746 7ff7e4e316d0 59 API calls 7745->7746 7747 7ff7e4e312e0 7746->7747 7854 7ff7e4e3bc2c 7855 7ff7e4e3b7ac 89 API calls 7854->7855 7856 7ff7e4e3bc37 7855->7856 7864 7ff7e4e3ed18 7856->7864 7877 7ff7e4e39dd8 EnterCriticalSection 7864->7877 7396 7ff7e4e3b1b0 7411 7ff7e4e39dd8 EnterCriticalSection 7396->7411 7415 7ff7e4e329b0 7418 7ff7e4e32910 7415->7418 7421 7ff7e4e32820 7418->7421 7422 7ff7e4e32852 __scrt_get_show_window_mode 7421->7422 7423 7ff7e4e363c4 __std_exception_copy 59 API calls 7422->7423 7424 7ff7e4e32867 7423->7424 7578 7ff7e4e36530 7581 7ff7e4e373ac 7578->7581 7588 7ff7e4e37460 7581->7588 7589 7ff7e4e37470 7588->7589 7590 7ff7e4e373c5 7588->7590 7591 7ff7e4e37498 11 API calls 7589->7591 7592 7ff7e4e3747c 7590->7592 7591->7590 7593 7ff7e4e3748c 7592->7593 7594 7ff7e4e373d2 7592->7594 7602 7ff7e4e374dc 7593->7602 7596 7ff7e4e37498 7594->7596 7597 7ff7e4e373df 7596->7597 7598 7ff7e4e3749d 7596->7598 7599 7ff7e4e374c6 7598->7599 7600 7ff7e4e3b380 __free_lconv_mon 11 API calls 7598->7600 7601 7ff7e4e3b380 __free_lconv_mon 11 API calls 7599->7601 7600->7598 7601->7597 7603 7ff7e4e37512 7602->7603 7604 7ff7e4e374e1 7602->7604 7603->7594 7605 7ff7e4e3750a 7604->7605 7607 7ff7e4e3b380 __free_lconv_mon 11 API calls 7604->7607 7606 7ff7e4e3b380 __free_lconv_mon 11 API calls 7605->7606 7606->7603 7607->7604 7751 7ff7e4e350b0 7754 7ff7e4e35304 7751->7754 7755 7ff7e4e35327 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7754->7755 7756 7ff7e4e350b9 7754->7756 7755->7756 7428 7ff7e4e385b6 7429 7ff7e4e38090 _CallSETranslator 68 API calls 7428->7429 7432 7ff7e4e385c3 __CxxCallCatchBlock 7429->7432 7430 7ff7e4e38607 RaiseException 7431 7ff7e4e3862e 7430->7431 7441 7ff7e4e36130 7431->7441 7432->7430 7435 7ff7e4e38090 _CallSETranslator 68 API calls 7436 7ff7e4e38672 7435->7436 7437 7ff7e4e38090 _CallSETranslator 68 API calls 7436->7437 7438 7ff7e4e3867b 7437->7438 7440 7ff7e4e3865f __CxxCallCatchBlock 7440->7435 7442 7ff7e4e38090 _CallSETranslator 68 API calls 7441->7442 7443 7ff7e4e36142 7442->7443 7444 7ff7e4e3617d 7443->7444 7445 7ff7e4e38090 _CallSETranslator 68 API calls 7443->7445 7446 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7444->7446 7449 7ff7e4e3614d 7445->7449 7447 7ff7e4e36182 7446->7447 7448 7ff7e4e36169 7450 7ff7e4e38090 _CallSETranslator 68 API calls 7448->7450 7449->7444 7449->7448 7451 7ff7e4e3616e 7450->7451 7451->7440 7452 7ff7e4e362e0 7451->7452 7453 7ff7e4e38090 _CallSETranslator 68 API calls 7452->7453 7454 7ff7e4e362ee 7453->7454 7454->7440 7455 7ff7e4e383b4 7467 7ff7e4e382e7 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 7455->7467 7456 7ff7e4e383db 7457 7ff7e4e38090 _CallSETranslator 68 API calls 7456->7457 7458 7ff7e4e383e0 7457->7458 7462 7ff7e4e383eb 7458->7462 7463 7ff7e4e38090 _CallSETranslator 68 API calls 7458->7463 7459 7ff7e4e38416 7460 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7459->7460 7460->7462 7461 7ff7e4e383f8 __FrameHandler3::GetHandlerSearchState 7462->7461 7465 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7462->7465 7463->7462 7464 7ff7e4e3609c 68 API calls Is_bad_exception_allowed 7464->7467 7466 7ff7e4e38421 7465->7466 7467->7456 7467->7459 7467->7464 7468 7ff7e4e360b0 __FrameHandler3::FrameUnwindToEmptyState 68 API calls 7467->7468 7468->7467 7469 7ff7e4e3a198 7470 7ff7e4e3a1b2 7469->7470 7471 7ff7e4e3a19d 7469->7471 7475 7ff7e4e3a2f0 7471->7475 7476 7ff7e4e3a33a 7475->7476 7477 7ff7e4e3a332 7475->7477 7478 7ff7e4e3b380 __free_lconv_mon 11 API calls 7476->7478 7479 7ff7e4e3b380 __free_lconv_mon 11 API calls 7477->7479 7480 7ff7e4e3a347 7478->7480 7479->7476 7481 7ff7e4e3b380 __free_lconv_mon 11 API calls 7480->7481 7482 7ff7e4e3a354 7481->7482 7483 7ff7e4e3b380 __free_lconv_mon 11 API calls 7482->7483 7484 7ff7e4e3a361 7483->7484 7485 7ff7e4e3b380 __free_lconv_mon 11 API calls 7484->7485 7486 7ff7e4e3a36e 7485->7486 7487 7ff7e4e3b380 __free_lconv_mon 11 API calls 7486->7487 7488 7ff7e4e3a37b 7487->7488 7489 7ff7e4e3b380 __free_lconv_mon 11 API calls 7488->7489 7490 7ff7e4e3a388 7489->7490 7491 7ff7e4e3b380 __free_lconv_mon 11 API calls 7490->7491 7492 7ff7e4e3a395 7491->7492 7493 7ff7e4e3b380 __free_lconv_mon 11 API calls 7492->7493 7494 7ff7e4e3a3a5 7493->7494 7495 7ff7e4e3b380 __free_lconv_mon 11 API calls 7494->7495 7496 7ff7e4e3a3b5 7495->7496 7501 7ff7e4e3a470 7496->7501 7515 7ff7e4e39dd8 EnterCriticalSection 7501->7515 7608 7ff7e4e38d1e 7609 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7608->7609 7610 7ff7e4e38d23 __except_validate_context_record 7609->7610 7611 7ff7e4e38090 _CallSETranslator 68 API calls 7610->7611 7612 7ff7e4e38d56 7611->7612 7614 7ff7e4e38e3e 7612->7614 7615 7ff7e4e38db0 7612->7615 7631 7ff7e4e38e04 7612->7631 7613 7ff7e4e38f5c __GSHandlerCheck_EH 73 API calls 7613->7631 7618 7ff7e4e3609c Is_bad_exception_allowed 68 API calls 7614->7618 7621 7ff7e4e38e5d 7614->7621 7616 7ff7e4e38e2b 7615->7616 7619 7ff7e4e38e09 7615->7619 7620 7ff7e4e38dd2 7615->7620 7615->7631 7617 7ff7e4e35d30 __FrameHandler3::FrameUnwindToEmptyState 70 API calls 7616->7617 7617->7631 7618->7621 7619->7616 7626 7ff7e4e38de1 7619->7626 7622 7ff7e4e38194 __GSHandlerCheck_EH 59 API calls 7620->7622 7624 7ff7e4e360c8 __GSHandlerCheck_EH 68 API calls 7621->7624 7628 7ff7e4e38eac 7621->7628 7621->7631 7622->7626 7623 7ff7e4e38f55 7625 7ff7e4e37fcc __CxxCallCatchBlock 59 API calls 7623->7625 7624->7628 7629 7ff7e4e38f5a 7625->7629 7626->7623 7627 7ff7e4e38df3 7626->7627 7630 7ff7e4e38298 __FrameHandler3::FrameUnwindToEmptyState 69 API calls 7627->7630 7628->7613 7628->7631 7630->7631 7632 7ff7e4e4291e 7633 7ff7e4e42936 7632->7633 7639 7ff7e4e429a1 7632->7639 7634 7ff7e4e38090 _CallSETranslator 68 API calls 7633->7634 7633->7639 7635 7ff7e4e42983 7634->7635 7636 7ff7e4e38090 _CallSETranslator 68 API calls 7635->7636 7637 7ff7e4e42998 7636->7637 7638 7ff7e4e37e28 __GSHandlerCheck_EH 59 API calls 7637->7638 7638->7639 7640 7ff7e4e36b1c 7643 7ff7e4e36b4c 7640->7643 7650 7ff7e4e39dd8 EnterCriticalSection 7643->7650 7878 7ff7e4e3561c 7879 7ff7e4e35650 7878->7879 7880 7ff7e4e35634 7878->7880 7880->7879 7887 7ff7e4e36310 7880->7887 7885 7ff7e4e37e28 __GSHandlerCheck_EH 59 API calls 7886 7ff7e4e35676 7885->7886 7888 7ff7e4e38090 _CallSETranslator 68 API calls 7887->7888 7889 7ff7e4e35662 7888->7889 7890 7ff7e4e36324 7889->7890 7891 7ff7e4e38090 _CallSETranslator 68 API calls 7890->7891 7892 7ff7e4e3566e 7891->7892 7892->7885 7654 7ff7e4e34f20 7661 7ff7e4e354c4 SetUnhandledExceptionFilter 7654->7661 7662 7ff7e4e39924 7663 7ff7e4e3995d 7662->7663 7664 7ff7e4e3992e 7662->7664 7664->7663 7665 7ff7e4e39943 FreeLibrary 7664->7665 7665->7664 7760 7ff7e4e364a4 7767 7ff7e4e39880 7760->7767 7763 7ff7e4e364b1 7768 7ff7e4e39888 7767->7768 7770 7ff7e4e398b9 7768->7770 7772 7ff7e4e364ad 7768->7772 7780 7ff7e4e3d6f8 7768->7780 7771 7ff7e4e398c8 __vcrt_uninitialize_locks DeleteCriticalSection 7770->7771 7771->7772 7772->7763 7773 7ff7e4e38024 7772->7773 7785 7ff7e4e3d5cc 7773->7785 7781 7ff7e4e3d75c __vcrt_FlsAlloc 5 API calls 7780->7781 7782 7ff7e4e3d72e 7781->7782 7783 7ff7e4e3d738 7782->7783 7784 7ff7e4e3d743 InitializeCriticalSectionAndSpinCount 7782->7784 7783->7768 7784->7783 7786 7ff7e4e3d75c __vcrt_FlsAlloc 5 API calls 7785->7786 7787 7ff7e4e3d5f1 TlsAlloc 7786->7787

                                                  Control-flow Graph

                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,?,?,00007FF7E4E39B6C,?,?,00000000,00007FF7E4E3BCDB,?,?,00000003,00007FF7E4E36809), ref: 00007FF7E4E39D18
                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF7E4E39B6C,?,?,00000000,00007FF7E4E3BCDB,?,?,00000003,00007FF7E4E36809), ref: 00007FF7E4E39D24
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: MZx$api-ms-$ext-ms-
                                                  • API String ID: 3013587201-2431898299
                                                  • Opcode ID: 22012f02682711b3799a961ab12125ad5bd7006ea3965d99f2077911abd80764
                                                  • Instruction ID: 672fff71cef5829e4ecab3e383766a6b11fc4a617cacda937379c3a9c14a6a21
                                                  • Opcode Fuzzy Hash: 22012f02682711b3799a961ab12125ad5bd7006ea3965d99f2077911abd80764
                                                  • Instruction Fuzzy Hash: 0541FF66B19A0341EB17EF17A8A0775A2D5BF48F90F885536CD4D87788EF3CE4068322

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: CreateFileModuleNameProcess
                                                  • String ID: @$U$h
                                                  • API String ID: 2157755880-1769436074
                                                  • Opcode ID: ca72520b2b583654da5c17d2c27a1f2376d242dddeac6599049d2290f9a7c289
                                                  • Instruction ID: 1e3365fd5add29436541bd292b1ea0f080156eace45c6b3a35aa9fd3f751da81
                                                  • Opcode Fuzzy Hash: ca72520b2b583654da5c17d2c27a1f2376d242dddeac6599049d2290f9a7c289
                                                  • Instruction Fuzzy Hash: C6711B7A60CB8681DA60DF46F4903AAB760FBC9B94F405126EACE83B59DF3CD0458F51

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                  • String ID: MZx
                                                  • API String ID: 3251591375-2575928145
                                                  • Opcode ID: fc8042bb87e420838d7706c2e1d2f26ac8af05287a7a71abb2327b768e75cc79
                                                  • Instruction ID: c26e7b45bed8017d571ed8a4885d80ce25704a09cb27f8fc6661146242a51dc6
                                                  • Opcode Fuzzy Hash: fc8042bb87e420838d7706c2e1d2f26ac8af05287a7a71abb2327b768e75cc79
                                                  • Instruction Fuzzy Hash: A2319E29A0C25342FA16BF27A4A23B9A2919F41B44FC45437E98E473D7DE3DA8048773

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: String
                                                  • String ID: LCMapStringEx
                                                  • API String ID: 2568140703-3893581201
                                                  • Opcode ID: f9633275d9ee9d3b20b8a7fa8d609a387c4e2dab78c2b7ebc5d766684dffdc6a
                                                  • Instruction ID: 3702613240998159b93e4c4a40c25d7de4dfe65007535083e2ab243a7baac850
                                                  • Opcode Fuzzy Hash: f9633275d9ee9d3b20b8a7fa8d609a387c4e2dab78c2b7ebc5d766684dffdc6a
                                                  • Instruction Fuzzy Hash: AD212F35A08B8186DB64DF16F48029AB7A5FB88BD0F444136EACD83B19DF3CD550CB50

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Process$CurrentExitTerminate
                                                  • String ID:
                                                  • API String ID: 1703294689-0
                                                  • Opcode ID: d1b5e31b8130739252ba024cd7ee30c115cd396cc8feb26cc4374d0b0c240fe4
                                                  • Instruction ID: 4c740411a919d375bcc4d1a6d264aa15949fb2300dbc8f00b7cea15eedc59da3
                                                  • Opcode Fuzzy Hash: d1b5e31b8130739252ba024cd7ee30c115cd396cc8feb26cc4374d0b0c240fe4
                                                  • Instruction Fuzzy Hash: 33D09E18B1870B43EE253F7268E537992615F88F11F90283AC95FC7397ED7CA44D8262

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Info
                                                  • String ID:
                                                  • API String ID: 1807457897-3916222277
                                                  • Opcode ID: 741c4182e17423b6762c14ee47741467d08430751a7f72457cdc24d02ab79553
                                                  • Instruction ID: 0e63c924d25f72813a2445dbdc80319d3fd3ece77aac9437b8f92587bcf85850
                                                  • Opcode Fuzzy Hash: 741c4182e17423b6762c14ee47741467d08430751a7f72457cdc24d02ab79553
                                                  • Instruction Fuzzy Hash: 07519036A1C2C28AE7229F25E0847AEB7A0F749B44F944137D7CE47A8ACB7CD545CB11

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 168 7ff7e4e3a8c8-7ff7e4e3a8fb call 7ff7e4e3ab88 171 7ff7e4e3a901-7ff7e4e3a90e 168->171 172 7ff7e4e3ab55-7ff7e4e3ab58 call 7ff7e4e3ac08 168->172 173 7ff7e4e3a911-7ff7e4e3a913 171->173 177 7ff7e4e3ab5d 172->177 175 7ff7e4e3a919-7ff7e4e3a924 173->175 176 7ff7e4e3aa5f-7ff7e4e3aa8d call 7ff7e4e41e00 173->176 175->173 178 7ff7e4e3a926-7ff7e4e3a92c 175->178 186 7ff7e4e3aa90-7ff7e4e3aa96 176->186 180 7ff7e4e3ab5f-7ff7e4e3ab84 call 7ff7e4e39800 177->180 181 7ff7e4e3aa57-7ff7e4e3aa5a 178->181 182 7ff7e4e3a932-7ff7e4e3a93d IsValidCodePage 178->182 181->180 182->181 185 7ff7e4e3a943-7ff7e4e3a94a 182->185 188 7ff7e4e3a94c-7ff7e4e3a95a 185->188 189 7ff7e4e3a972-7ff7e4e3a981 GetCPInfo 185->189 190 7ff7e4e3aa98-7ff7e4e3aa9b 186->190 191 7ff7e4e3aad6-7ff7e4e3aae0 186->191 192 7ff7e4e3a95e-7ff7e4e3a96d 188->192 194 7ff7e4e3a987-7ff7e4e3a9a7 call 7ff7e4e41e00 189->194 195 7ff7e4e3aa4b-7ff7e4e3aa51 189->195 190->191 193 7ff7e4e3aa9d-7ff7e4e3aaa8 190->193 191->186 196 7ff7e4e3aae2-7ff7e4e3aaee 191->196 197 7ff7e4e3ab4b-7ff7e4e3ab4e call 7ff7e4e3afc8 192->197 198 7ff7e4e3aaaa 193->198 199 7ff7e4e3aace-7ff7e4e3aad4 193->199 212 7ff7e4e3a9ad-7ff7e4e3a9b6 194->212 213 7ff7e4e3aa41 194->213 195->172 195->181 201 7ff7e4e3ab19 196->201 202 7ff7e4e3aaf0-7ff7e4e3aaf3 196->202 210 7ff7e4e3ab53 197->210 205 7ff7e4e3aaae-7ff7e4e3aab5 198->205 199->190 199->191 203 7ff7e4e3ab20-7ff7e4e3ab33 201->203 207 7ff7e4e3ab10-7ff7e4e3ab17 202->207 208 7ff7e4e3aaf5-7ff7e4e3aaf8 202->208 209 7ff7e4e3ab38-7ff7e4e3ab49 203->209 205->199 211 7ff7e4e3aab7-7ff7e4e3aacc 205->211 207->203 214 7ff7e4e3aafa-7ff7e4e3aafc 208->214 215 7ff7e4e3ab07-7ff7e4e3ab0e 208->215 209->197 209->209 210->177 211->199 211->205 217 7ff7e4e3a9b8-7ff7e4e3a9bb 212->217 218 7ff7e4e3a9e4-7ff7e4e3a9e8 212->218 219 7ff7e4e3aa43-7ff7e4e3aa46 213->219 214->203 216 7ff7e4e3aafe-7ff7e4e3ab05 214->216 215->203 216->203 217->218 221 7ff7e4e3a9bd-7ff7e4e3a9c6 217->221 220 7ff7e4e3a9ed-7ff7e4e3a9f6 218->220 219->192 220->220 222 7ff7e4e3a9f8-7ff7e4e3aa01 220->222 223 7ff7e4e3a9c8-7ff7e4e3a9cd 221->223 224 7ff7e4e3a9dc-7ff7e4e3a9e2 221->224 225 7ff7e4e3aa31 222->225 226 7ff7e4e3aa03-7ff7e4e3aa06 222->226 227 7ff7e4e3a9d0-7ff7e4e3a9da 223->227 224->217 224->218 230 7ff7e4e3aa38-7ff7e4e3aa3f 225->230 228 7ff7e4e3aa28-7ff7e4e3aa2f 226->228 229 7ff7e4e3aa08-7ff7e4e3aa0b 226->229 227->224 227->227 228->230 231 7ff7e4e3aa0d-7ff7e4e3aa0f 229->231 232 7ff7e4e3aa1f-7ff7e4e3aa26 229->232 230->219 233 7ff7e4e3aa11-7ff7e4e3aa14 231->233 234 7ff7e4e3aa16-7ff7e4e3aa1d 231->234 232->230 233->230 234->230
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: CodeInfoPageValid
                                                  • String ID:
                                                  • API String ID: 546120528-0
                                                  • Opcode ID: 2dc6afea859580e6037be6593a21ed62edb713420741d641145777749c96bdf2
                                                  • Instruction ID: bf3b7f97504669479533d2d439f5edf93e6eccbdf88bf684959dac709a8ed578
                                                  • Opcode Fuzzy Hash: 2dc6afea859580e6037be6593a21ed62edb713420741d641145777749c96bdf2
                                                  • Instruction Fuzzy Hash: 7981D56AA0C68346F726BF26A094379F7A1EB44B40FC44077C6CD67A91DE3DE581C322

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00007FF7E4E359E0: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E4E34E57), ref: 00007FF7E4E35A30
                                                    • Part of subcall function 00007FF7E4E359E0: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E4E34E57), ref: 00007FF7E4E35A71
                                                  • _set_fmode.LIBCMT ref: 00007FF7E4E34E6F
                                                  • _RTC_Initialize.LIBCMT ref: 00007FF7E4E34E90
                                                    • Part of subcall function 00007FF7E4E36BBC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7E4E36BEE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderInitializeRaise_invalid_parameter_noinfo_set_fmode
                                                  • String ID:
                                                  • API String ID: 2451193124-0
                                                  • Opcode ID: f3c0430470f07399e506a1be3701e989bbb1d8738ebd37febbeea140212f0efb
                                                  • Instruction ID: bb1509a2534122a8477c86e00f26fd2e29dd37d5bb84f4d0ea750bf6d14572e9
                                                  • Opcode Fuzzy Hash: f3c0430470f07399e506a1be3701e989bbb1d8738ebd37febbeea140212f0efb
                                                  • Instruction Fuzzy Hash: 6E21AF58E0924345FA16BFB384C23B891915F94B41FD04476E5CE4A2DBDDBDB8418773

                                                  Control-flow Graph

                                                  APIs
                                                  • RtlFreeHeap.NTDLL(?,?,?,00007FF7E4E3BF8A,?,?,?,00007FF7E4E3BE8B,?,?,00000000,00007FF7E4E3C9A9,?,?,?,00007FF7E4E3C8B3), ref: 00007FF7E4E3B396
                                                  • GetLastError.KERNEL32(?,?,?,00007FF7E4E3BF8A,?,?,?,00007FF7E4E3BE8B,?,?,00000000,00007FF7E4E3C9A9,?,?,?,00007FF7E4E3C8B3), ref: 00007FF7E4E3B3A0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 485612231-0
                                                  • Opcode ID: ee630889352ed936ae553ba63d3b4f6f14bc721ad53d24028daf506015ee0002
                                                  • Instruction ID: 2c215b053c00a7c065edf9af43833e0884e67d0f5e2f294bca0cff726f81c502
                                                  • Opcode Fuzzy Hash: ee630889352ed936ae553ba63d3b4f6f14bc721ad53d24028daf506015ee0002
                                                  • Instruction Fuzzy Hash: 93E08655F0820742FF06BFB368E6234A2605F48F50F845132C94DC2256EE3CA8854372

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: HandleModule$AddressFreeLibraryProc
                                                  • String ID:
                                                  • API String ID: 3947729631-0
                                                  • Opcode ID: 883d2c84c99c049fafe14cfb7c78426d52a6edd162f08307a95ee2a3b685a9ec
                                                  • Instruction ID: 8dfd5ec59a0371b35554d880f48712830c1cf2101557ef925ecf33048cc2edb1
                                                  • Opcode Fuzzy Hash: 883d2c84c99c049fafe14cfb7c78426d52a6edd162f08307a95ee2a3b685a9ec
                                                  • Instruction Fuzzy Hash: FE21B476E047428AEB65AF75C0843AC77B0EB84B1CF844636D69C06AC4DF38D448C751

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 01c91395c1916870b6ebb99eb882ff78e046b85d5793e410e623a649603b4a33
                                                  • Instruction ID: ebf0e39f9d044d92ae35f6bd19b5838291a67e5ff4782d1b4355d86e0777d0db
                                                  • Opcode Fuzzy Hash: 01c91395c1916870b6ebb99eb882ff78e046b85d5793e410e623a649603b4a33
                                                  • Instruction Fuzzy Hash: 0311303A90C65782E312BF16A891A79F3A4FF40B40F950536E69D477A6DF3CF8108762

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3668304517-0
                                                  • Opcode ID: c26739b86664f408db0c9997770f65723e3fc929f09927d10a92c6213d1838f9
                                                  • Instruction ID: 097be477609b90fb38b3e0558d5a04117e02c729ca68a747c5ef3d127aac7664
                                                  • Opcode Fuzzy Hash: c26739b86664f408db0c9997770f65723e3fc929f09927d10a92c6213d1838f9
                                                  • Instruction Fuzzy Hash: 4CF0FF2651DB4681D661AF06F4C132EE3A0FF84BA4F501232F7DE42BA5CE3CD8A18B51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 418 7ff7e4e34630-7ff7e4e346af CreateProcessA
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 55f193832a280cde99d3965d7a83e62b7f155f16e8e51956fffb024c732bc776
                                                  • Instruction ID: 9116282469b2cce38adb4773f1fce5dd497ebcc12ff5f6b509254a00770484ff
                                                  • Opcode Fuzzy Hash: 55f193832a280cde99d3965d7a83e62b7f155f16e8e51956fffb024c732bc776
                                                  • Instruction Fuzzy Hash: 80F0CF76618B9482E710CB56F49070BBBA5F3C9794F604519EBC887B28CBBDC065CF40

                                                  Control-flow Graph

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                  • String ID:
                                                  • API String ID: 680105476-0
                                                  • Opcode ID: 931c02c4fcd203e15d47adf75942f4b0e5fe0fb3ee4ad08f730a2a0a270399f2
                                                  • Instruction ID: cee18bef78dbc9b299f6b9bf43838818281d970f5b06548f6cac76a033bbe287
                                                  • Opcode Fuzzy Hash: 931c02c4fcd203e15d47adf75942f4b0e5fe0fb3ee4ad08f730a2a0a270399f2
                                                  • Instruction Fuzzy Hash: 91E0EC49E5930B05F96B3E7355D537880804F45F70EDD1772D9FD092C2AD3DA4514172
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 590438e11f57b6ac7bad76fc945ab05e233fba6b9bcb9c07e7f5b99c2efd162e
                                                  • Instruction ID: e972cd16634150941fc9b6ea76269619c6f22b08c842b0c82c41bf003a0680b5
                                                  • Opcode Fuzzy Hash: 590438e11f57b6ac7bad76fc945ab05e233fba6b9bcb9c07e7f5b99c2efd162e
                                                  • Instruction Fuzzy Hash: 3FF0FF36518B8482C6509B45F49170AB7B4F39AB94FA0511AFAC953B28CF7DC0648B00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: 9ea2c8076de443cf59f910db1f613f80aa3e07039da84784684faed62c920b0f
                                                  • Instruction ID: 03870921615c518e64f4106259937d22a06636358fc7ea7ccdc36adbdff2b7ce
                                                  • Opcode Fuzzy Hash: 9ea2c8076de443cf59f910db1f613f80aa3e07039da84784684faed62c920b0f
                                                  • Instruction Fuzzy Hash: B3F00C3A518F8882C6609B45F48074AB7B4F79AB94F605116EBCD83B28DF3DC1648B00
                                                  APIs
                                                  • __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00007FF7E4E35224
                                                    • Part of subcall function 00007FF7E4E364CC: __vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00007FF7E4E364D4
                                                    • Part of subcall function 00007FF7E4E364CC: __vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00007FF7E4E364D9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: __scrt_dllmain_crt_thread_attach__vcrt_uninitialize_locks__vcrt_uninitialize_ptd
                                                  • String ID:
                                                  • API String ID: 1208906642-0
                                                  • Opcode ID: e9d6ae88fc6a71f53c5a11da52503330d916ee548e66a10f83e59118ebd616ce
                                                  • Instruction ID: ffcc86dc7c07e1d178202c8455ce69fc0687c35eb2ac57205dd15d9ed04b00ea
                                                  • Opcode Fuzzy Hash: e9d6ae88fc6a71f53c5a11da52503330d916ee548e66a10f83e59118ebd616ce
                                                  • Instruction Fuzzy Hash: C3E0926CD0C14394FEAABE7221923B982501F62B44FD0147AD9DE522839E3E214A1733
                                                  APIs
                                                  • HeapAlloc.KERNEL32(?,?,00000000,00007FF7E4E3A072,?,?,?,00007FF7E4E3C125,?,?,?,?,00007FF7E4E37D08), ref: 00007FF7E4E3C21D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: AllocHeap
                                                  • String ID:
                                                  • API String ID: 4292702814-0
                                                  • Opcode ID: 135306cfd6f981af923da4fe000d2c37e782639362960f7bd737ffabaa1f0f79
                                                  • Instruction ID: 49cff517b3ed37c3a699838edac8aaa49303d3238e7ca70014bd484bb75242b2
                                                  • Opcode Fuzzy Hash: 135306cfd6f981af923da4fe000d2c37e782639362960f7bd737ffabaa1f0f79
                                                  • Instruction Fuzzy Hash: 67F0621AB0960B81FE56BFA374A23B5D2905F89F40FCC5133C98E866C1EE3CE8814132
                                                  APIs
                                                  • HeapAlloc.KERNEL32(?,?,?,00007FF7E4E3F389,?,?,00000000,00007FF7E4E3D083,?,?,?,00007FF7E4E370BF,?,?,?,00007FF7E4E372FD), ref: 00007FF7E4E3C27E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: AllocHeap
                                                  • String ID:
                                                  • API String ID: 4292702814-0
                                                  • Opcode ID: 81c4a1072c291bc039217ef3688a7505bcb60df8785fb09408a2d79300e577ee
                                                  • Instruction ID: bd571a583254cf0b1e1aa11f8d61dff2b45eeaadf84831c1ca40c537da0507c7
                                                  • Opcode Fuzzy Hash: 81c4a1072c291bc039217ef3688a7505bcb60df8785fb09408a2d79300e577ee
                                                  • Instruction Fuzzy Hash: F9F0545AA0860B41FE56BFF358D2375D1805F85FA0F8C4636DDAE862C1DE3CE4414132
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst_invalid_parameter_noinfo
                                                  • String ID: C:\Users\user\Desktop\Loader.exe
                                                  • API String ID: 2227656907-3241315448
                                                  • Opcode ID: e225d3fb6d4ae7c10b93392ed77da4608c0e544a1bff775a08a37f312803c6a9
                                                  • Instruction ID: 997b447e5cc4f2d1702543e295303036bead482ae2d3373adb4beb6005f59042
                                                  • Opcode Fuzzy Hash: e225d3fb6d4ae7c10b93392ed77da4608c0e544a1bff775a08a37f312803c6a9
                                                  • Instruction Fuzzy Hash: CAB1B52BB1869741EA62AF23A4853B9E350EB44FD4FC45533EA9E47789DE3CE441C312
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 5f043ce2f24c5dd1fc7556dc09ed2e4de8428533f533a7f6f2f8a904c65be6c1
                                                  • Instruction ID: a19f4d4dd226900b17526e20b5fafa90e03417e286ce2ffd30ddf7d13e5ead07
                                                  • Opcode Fuzzy Hash: 5f043ce2f24c5dd1fc7556dc09ed2e4de8428533f533a7f6f2f8a904c65be6c1
                                                  • Instruction Fuzzy Hash: 67316576608B8586EB609F61F8907EDB360FB44B44F84443ADA4E87B99EF38D548C721
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 0682ff08e83aaada5c55492228567788b13ab54fda938eba02d557cdfddf4092
                                                  • Instruction ID: ad0f95758fd167a0fd64ab865eefe04252a62a320204b8bc2b7d772ca4270480
                                                  • Opcode Fuzzy Hash: 0682ff08e83aaada5c55492228567788b13ab54fda938eba02d557cdfddf4092
                                                  • Instruction Fuzzy Hash: 16318736608F8186DB60DF25E8507AEB3A0FB84B54F900136EA9D87B59EF3CD545CB11
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 1ef9cfd6a28bfbf257edefedf7c8203de68038772214ee7f848650bd26ef0748
                                                  • Instruction ID: 5f7e12e76bee5f0e6e3dedb7664e20730f3461ac4a07ab1e8a2c9a0807655ffc
                                                  • Opcode Fuzzy Hash: 1ef9cfd6a28bfbf257edefedf7c8203de68038772214ee7f848650bd26ef0748
                                                  • Instruction Fuzzy Hash: E2114F22B14B0589EF009F60F8643B873A4F758B58F841A32DA6D87758EF78D1558350
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: HeapProcess
                                                  • String ID:
                                                  • API String ID: 54951025-0
                                                  • Opcode ID: 04e430f214420386c097ea80a3f65c29a15293500482715ba298f06b5bffda18
                                                  • Instruction ID: 061ebfa1d82994469942876d636f0bc7f10cc421545f63801b26802048eda7c1
                                                  • Opcode Fuzzy Hash: 04e430f214420386c097ea80a3f65c29a15293500482715ba298f06b5bffda18
                                                  • Instruction Fuzzy Hash: 4CB09220E0BB0AC2EA497B657CAA31463A47F48F10FD8503AC00CC1324EE3C20A58722
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2493b7593c7a72a3c048878eaa47db4bf64ef86c7613569d36cef1db600bd04e
                                                  • Instruction ID: 77fcffb5c2f9810da0c19e67f0f8a37083c05785ca25e96e5b92e50ae9bb93c9
                                                  • Opcode Fuzzy Hash: 2493b7593c7a72a3c048878eaa47db4bf64ef86c7613569d36cef1db600bd04e
                                                  • Instruction Fuzzy Hash: DB42747B6086048AC764DF1AD09161ABBF0F7CCFA8B194216EB8D83765DB39D582CF50
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 485612231-0
                                                  • Opcode ID: e5e308dfeada57223cb931c0b5dfaffe289988bed981820dc51f875181d83110
                                                  • Instruction ID: a6402d033a21d2e76667970d87adc8ab587cbc9a0976825b2628eeeaa4b43f06
                                                  • Opcode Fuzzy Hash: e5e308dfeada57223cb931c0b5dfaffe289988bed981820dc51f875181d83110
                                                  • Instruction Fuzzy Hash: 8941F676714A5981EF04DF2AE964679B3A1FB48FC0B89A033DE4D97B58EE3CD4428301
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 36e227a93ecbd0eaa87d54bff9a39891396378540c1ebb38e19a135996851a4b
                                                  • Instruction ID: 8886148a2b716ab130b28e4ceebd5068aea7248dbe4fe585ce9b48a373619e76
                                                  • Opcode Fuzzy Hash: 36e227a93ecbd0eaa87d54bff9a39891396378540c1ebb38e19a135996851a4b
                                                  • Instruction Fuzzy Hash: 31F06872B182558AEB949F39B452729B7D0F708780FD4D13AD58DC3B08D67C9091CF15
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f3f9b99e833d81c9360031323baeb257995531fff9fb24a03fa220d7ef962a05
                                                  • Instruction ID: fa14e8f9197c72f642a1ca3a5b79d7b8c483f18db1ca54d4d40b608bd9dec4b1
                                                  • Opcode Fuzzy Hash: f3f9b99e833d81c9360031323baeb257995531fff9fb24a03fa220d7ef962a05
                                                  • Instruction Fuzzy Hash: A0A0016591880A91EA05AF11A8A1A39A320AB90B40B805572C04E81164AE3CA5018326
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 3761cf37712abdcf1e6db3273805001c4b0028c3034cc92ba4d43b14fc4efdf9
                                                  • Instruction ID: 4a8ad397a79cc99d1452e9872f915c247bcf326e907c62c69331acbf9bbb4070
                                                  • Opcode Fuzzy Hash: 3761cf37712abdcf1e6db3273805001c4b0028c3034cc92ba4d43b14fc4efdf9
                                                  • Instruction Fuzzy Hash: 4ED18F76A0874286EB21EF66D4813ADB7A0FB45B88F900136EE8D57795CF38E481C752
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF7E4E3D5F1,?,?,00000000,00007FF7E4E38034), ref: 00007FF7E4E3D7E1
                                                  • GetLastError.KERNEL32(?,?,?,00007FF7E4E3D5F1,?,?,00000000,00007FF7E4E38034), ref: 00007FF7E4E3D7EF
                                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF7E4E3D5F1,?,?,00000000,00007FF7E4E38034), ref: 00007FF7E4E3D819
                                                  • FreeLibrary.KERNEL32(?,?,?,00007FF7E4E3D5F1,?,?,00000000,00007FF7E4E38034), ref: 00007FF7E4E3D887
                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF7E4E3D5F1,?,?,00000000,00007FF7E4E38034), ref: 00007FF7E4E3D893
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: MZx$api-ms-
                                                  • API String ID: 2559590344-259127448
                                                  • Opcode ID: e3e0607afb2d36fe791d2cb7d0cfe75f8ab5f5604bbfa85aa404c328e2221570
                                                  • Instruction ID: b8ea4295c107d053e6a5ac8fe7a67d8027b0bb33e2b8b7e4c96f5c9ff7e6094d
                                                  • Opcode Fuzzy Hash: e3e0607afb2d36fe791d2cb7d0cfe75f8ab5f5604bbfa85aa404c328e2221570
                                                  • Instruction Fuzzy Hash: A0318125A1A64391EE13BF03A890A75A2A8BF48F64F890536DD5D47794EF3CF4458322
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: 8eb7e9acec1751e613be6750b9c04c95c48d5d700aaadb3b6e51bf6b1cebdfde
                                                  • Instruction ID: 07c785cdfb48b6f99bc0a73153326d619973a5fd15daeb5d9c835331de8f2384
                                                  • Opcode Fuzzy Hash: 8eb7e9acec1751e613be6750b9c04c95c48d5d700aaadb3b6e51bf6b1cebdfde
                                                  • Instruction Fuzzy Hash: D2217F28B0D20742FA5A7B236AD1379D1915F84FA4FC41636E9AE476C6EF3CA4018222
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: eccb84783a33b6acb2369927ad856cb4a6f1e39df1dbbcb1c74e1911e2e9c731
                                                  • Instruction ID: eae4bfb8c083e0692cd4f6268983dec34201a1e8c08b7e627dacda113d9eb37c
                                                  • Opcode Fuzzy Hash: eccb84783a33b6acb2369927ad856cb4a6f1e39df1dbbcb1c74e1911e2e9c731
                                                  • Instruction Fuzzy Hash: 6611B421718A4582E7509F12F864729A3A0FB48FE4F941235D95DC7B98DF3CD8448755
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,?,00007FF7E4E3C125,?,?,?,?,00007FF7E4E37D08,?,?,?,?,00007FF7E4E34E74), ref: 00007FF7E4E3A01F
                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF7E4E3C125,?,?,?,?,00007FF7E4E37D08,?,?,?,?,00007FF7E4E34E74), ref: 00007FF7E4E3A055
                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF7E4E3C125,?,?,?,?,00007FF7E4E37D08,?,?,?,?,00007FF7E4E34E74), ref: 00007FF7E4E3A082
                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF7E4E3C125,?,?,?,?,00007FF7E4E37D08,?,?,?,?,00007FF7E4E34E74), ref: 00007FF7E4E3A093
                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF7E4E3C125,?,?,?,?,00007FF7E4E37D08,?,?,?,?,00007FF7E4E34E74), ref: 00007FF7E4E3A0A4
                                                  • SetLastError.KERNEL32(?,?,?,00007FF7E4E3C125,?,?,?,?,00007FF7E4E37D08,?,?,?,?,00007FF7E4E34E74), ref: 00007FF7E4E3A0BF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: b62c077a2562629968d0e64dfe6611344bf88aff198bfc4a34faf3d636af4a9f
                                                  • Instruction ID: 2a89a42f5f99c00bfe5f848b77ea2893f3975fe4cac8237e30aa8c9761774516
                                                  • Opcode Fuzzy Hash: b62c077a2562629968d0e64dfe6611344bf88aff198bfc4a34faf3d636af4a9f
                                                  • Instruction Fuzzy Hash: 46119F28B0C20342FA1A7B2266D1379E1525F44FB0FC40736D8BE57AD6DE3CA4818663
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID: MZx
                                                  • API String ID: 2718003287-2575928145
                                                  • Opcode ID: 6ce917d528adb3b7ec2eb0403480b4a9e68144bd1b8ad96170a743d827fd017e
                                                  • Instruction ID: d1c8cf039d274e1fe3774f28fc69a65805f06740cf5de206c350a0af52060462
                                                  • Opcode Fuzzy Hash: 6ce917d528adb3b7ec2eb0403480b4a9e68144bd1b8ad96170a743d827fd017e
                                                  • Instruction Fuzzy Hash: C8D13936B08A4289E712DF7AD4803BCB771FB54B98B814236DE9D97B89DE38D406C711
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 56dec27a48c382bae8c9dbc998320d3297bdff6e0d22f776c03b946996f6de0c
                                                  • Instruction ID: c6d8d84720fd6ae2f1313f65956cbb14b16d02e5e04c1e425e315cbc5edd905b
                                                  • Opcode Fuzzy Hash: 56dec27a48c382bae8c9dbc998320d3297bdff6e0d22f776c03b946996f6de0c
                                                  • Instruction Fuzzy Hash: AFF06865A1960681EF206F35F4543799360EF85F61FD41237C56D851E8DF3CD048C322
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 52608bc6d143c9dc7bfa0a8c4855f078bb6d55b13afd5a83babe45fd19c9ed63
                                                  • Instruction ID: 7a05c3dbcfdc48c25ebeef28d2c14fb46630c93b3759fd792914f038a7c82263
                                                  • Opcode Fuzzy Hash: 52608bc6d143c9dc7bfa0a8c4855f078bb6d55b13afd5a83babe45fd19c9ed63
                                                  • Instruction Fuzzy Hash: 2E1121AAE18A0305FE943D76E5D9375D2406F953B0E9C0E76E9EE062D68E7CFC404126
                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,00007FF7E4E37A3F,?,?,00000000,00007FF7E4E378EE,?,?,?,?,?,00007FF7E4E37B02), ref: 00007FF7E4E3A0F7
                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF7E4E37A3F,?,?,00000000,00007FF7E4E378EE,?,?,?,?,?,00007FF7E4E37B02), ref: 00007FF7E4E3A116
                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF7E4E37A3F,?,?,00000000,00007FF7E4E378EE,?,?,?,?,?,00007FF7E4E37B02), ref: 00007FF7E4E3A13E
                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF7E4E37A3F,?,?,00000000,00007FF7E4E378EE,?,?,?,?,?,00007FF7E4E37B02), ref: 00007FF7E4E3A14F
                                                  • FlsSetValue.KERNEL32(?,?,?,00007FF7E4E37A3F,?,?,00000000,00007FF7E4E378EE,?,?,?,?,?,00007FF7E4E37B02), ref: 00007FF7E4E3A160
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 315fd457ddef81b560e09b51ca76df7db0b77885c296541c44264b052bdf0a77
                                                  • Instruction ID: 7ca47fe57b9dd738964a8147b8df59dca0d900560020d35899196d71c2669e27
                                                  • Opcode Fuzzy Hash: 315fd457ddef81b560e09b51ca76df7db0b77885c296541c44264b052bdf0a77
                                                  • Instruction Fuzzy Hash: CA116068F0C30341FA5A7B2779D1379E2515F44FE0EC8533AD8AD57AD6DE3CA8418222
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 3583ea58da392ae5e1a25b37852758e3d7efc9f279aafc2945d021ad744b599d
                                                  • Instruction ID: db90085583cc6d47910d16b3c15957aaefe80f357a8e279765788496f3270e3e
                                                  • Opcode Fuzzy Hash: 3583ea58da392ae5e1a25b37852758e3d7efc9f279aafc2945d021ad744b599d
                                                  • Instruction Fuzzy Hash: 92114F18A0C20701FA5ABB2758D13B991425F40F64EC8073AE5BE476C6EE3CB4418233
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: b8fdca9cded4bbb6aa06f1f5ade378c1037bc301aacae7e2f84c1045c81e75ca
                                                  • Instruction ID: 4cd7bee9a26cc419e8b81d2986580f1948a8901570d81832d37b3b683d29d3e3
                                                  • Opcode Fuzzy Hash: b8fdca9cded4bbb6aa06f1f5ade378c1037bc301aacae7e2f84c1045c81e75ca
                                                  • Instruction Fuzzy Hash: 5C51D33AB196038ADB15EF16E484B7DB391EB44F88F958172DA8A43748DF3CE841C711
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: dad56c49b405efa0f0b0dfcbe895a6a6fea9ee740eef188aff0589e1bfe89b6b
                                                  • Instruction ID: 9f0466f866ee4ff427f77e06671de2da4f11fe575c64fa0ace73db801e6d04ac
                                                  • Opcode Fuzzy Hash: dad56c49b405efa0f0b0dfcbe895a6a6fea9ee740eef188aff0589e1bfe89b6b
                                                  • Instruction Fuzzy Hash: A1618D3AD0828786EB66AF13948437CB6E1BB54F84F944136EADC47A91CF3CE450C792
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: ba93ea01ede6b7901e4f1a42dd3188ba1bf94f5b48d2c5fd38b2079bf7c360a5
                                                  • Instruction ID: 2e7da2e513639e17fbf96c73367f028812467a1694eb269069ac0658dd49409e
                                                  • Opcode Fuzzy Hash: ba93ea01ede6b7901e4f1a42dd3188ba1bf94f5b48d2c5fd38b2079bf7c360a5
                                                  • Instruction Fuzzy Hash: D8618236908B8681D721AF26E4807A9B7A0FB85B84F444226EBDC07B99DF7CD190CB11
                                                  APIs
                                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7E4E3E4FB), ref: 00007FF7E4E3E204
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7E4E3E4FB), ref: 00007FF7E4E3E28F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: 88b8c225d62e374fe023bc9d5a4caf48daae308facaf316e88f45816378adbdd
                                                  • Instruction ID: 77d1143338a7119e8188cf14c4359fdf9d7b1cec57cdaf42470b99042e2929a3
                                                  • Opcode Fuzzy Hash: 88b8c225d62e374fe023bc9d5a4caf48daae308facaf316e88f45816378adbdd
                                                  • Instruction Fuzzy Hash: 2391E736E0865385F752EF6A94C03BDABA0BB14F88F95413ADE8E53684DF38D441C722
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: AdjustPointer
                                                  • String ID:
                                                  • API String ID: 1740715915-0
                                                  • Opcode ID: 506d3401bf5a93b8ca173106f1f1787cf44583c133506b40ded6fba249d7dab6
                                                  • Instruction ID: e96cf7c03c3ff926b32b2f96160c8c1469c34fe3cbf8ddb91e53704026a04f87
                                                  • Opcode Fuzzy Hash: 506d3401bf5a93b8ca173106f1f1787cf44583c133506b40ded6fba249d7dab6
                                                  • Instruction Fuzzy Hash: 99718269E0A64381EE66AE2395C077CA2D4FF44F80F894877DA8D07685DE3CE44583A3
                                                  APIs
                                                  • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7E4E36BEE
                                                    • Part of subcall function 00007FF7E4E3B380: RtlFreeHeap.NTDLL(?,?,?,00007FF7E4E3BF8A,?,?,?,00007FF7E4E3BE8B,?,?,00000000,00007FF7E4E3C9A9,?,?,?,00007FF7E4E3C8B3), ref: 00007FF7E4E3B396
                                                    • Part of subcall function 00007FF7E4E3B380: GetLastError.KERNEL32(?,?,?,00007FF7E4E3BF8A,?,?,?,00007FF7E4E3BE8B,?,?,00000000,00007FF7E4E3C9A9,?,?,?,00007FF7E4E3C8B3), ref: 00007FF7E4E3B3A0
                                                  • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF7E4E34EAD), ref: 00007FF7E4E36C0C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                                  • String ID: C:\Users\user\Desktop\Loader.exe
                                                  • API String ID: 3580290477-3241315448
                                                  • Opcode ID: a645f223ce12f83b0f8d23c07915082202de851ed736994d0ec83cfc9196f6a2
                                                  • Instruction ID: bbbe218deacaacb2e592f5852a39f4c2bd70e00bdcaa598d5c919129cad12aef
                                                  • Opcode Fuzzy Hash: a645f223ce12f83b0f8d23c07915082202de851ed736994d0ec83cfc9196f6a2
                                                  • Instruction Fuzzy Hash: 09418635A0871785EB15BF32A4912BDB794EF84F84BC55036E98E47745DE3CE4418352
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 6e6dc1b65bfd63166fd0bb342432b01ffd91828e93f14cbc7104de6985ace0a7
                                                  • Instruction ID: 89ead30a20bd16dcceb0d53b747a976d3c97590e3f83350b03132f3d9b215ecd
                                                  • Opcode Fuzzy Hash: 6e6dc1b65bfd63166fd0bb342432b01ffd91828e93f14cbc7104de6985ace0a7
                                                  • Instruction Fuzzy Hash: CA41C72271868685DB21DF2AE4847B9B7A0F798F94F814032EE8D87748EF3CD441C751
                                                  APIs
                                                  • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E4E34E57), ref: 00007FF7E4E35A30
                                                  • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E4E34E57), ref: 00007FF7E4E35A71
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.1669392025.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000000.00000002.1669369400.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669413079.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669677828.00007FF7E514D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669755517.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.1669792713.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 967fbbe814c9c1e701ed63cdd0d532d980ddcea8b093fe1b68fbd27a0b08e2d1
                                                  • Instruction ID: 61329c0a98d5c637fec39467c87a442690352db6dfe335f04bcf1c09a643fd24
                                                  • Opcode Fuzzy Hash: 967fbbe814c9c1e701ed63cdd0d532d980ddcea8b093fe1b68fbd27a0b08e2d1
                                                  • Instruction Fuzzy Hash: 9A114936619B8582EB219F15F490269B7E5FB88F84F984232DECC47758DF3CD5518B00

                                                  Execution Graph

                                                  Execution Coverage:6.5%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:2.9%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:53
                                                  execution_graph 73853 1400abbec 73854 1400abc05 73853->73854 73867 1400abc01 73853->73867 73868 1400a4da4 73854->73868 73859 1400abc23 73895 1400abcd0 36 API calls 4 library calls 73859->73895 73860 1400abc17 73890 14009bc88 73860->73890 73863 1400abc2b 73864 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 73863->73864 73865 1400abc4a 73864->73865 73866 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 73865->73866 73866->73867 73869 1400a4df6 73868->73869 73870 1400a4db1 73868->73870 73874 1400acb04 GetEnvironmentStringsW 73869->73874 73896 140098880 41 API calls 3 library calls 73870->73896 73872 1400a4de0 73897 1400a4a7c 43 API calls 3 library calls 73872->73897 73875 1400abc0f 73874->73875 73876 1400acb34 wcsftime 73874->73876 73875->73859 73875->73860 73877 1400acb8c FreeEnvironmentStringsW 73876->73877 73898 14009d17c 73876->73898 73877->73875 73880 1400acbb0 wcsftime 73884 1400acbe1 73880->73884 73885 1400acbd7 73880->73885 73881 1400acba7 73882 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 73881->73882 73883 1400acbae 73882->73883 73883->73877 73887 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 73884->73887 73886 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 73885->73886 73888 1400acbdf FreeEnvironmentStringsW 73886->73888 73887->73888 73888->73875 73891 14009bc8d HeapFree 73890->73891 73892 14009bcbe 73890->73892 73891->73892 73893 14009bca8 Concurrency::details::SchedulerProxy::DeleteThis __vcrt_getptd_noinit 73891->73893 73892->73867 73903 140093728 6 API calls _get_daylight 73893->73903 73895->73863 73896->73872 73897->73869 73901 14009d18b std::_Facet_Register wcsftime 73898->73901 73900 14009d1c5 73900->73880 73900->73881 73901->73900 73902 140093728 6 API calls _get_daylight 73901->73902 73902->73900 73903->73892 73904 14004c8e6 73905 14004c902 73904->73905 73907 14004c4b0 73905->73907 73908 14004d100 73905->73908 73909 14004d123 73908->73909 73912 14004d11d 73908->73912 73910 14004d13a 73909->73910 73925 14003fc60 73909->73925 73910->73912 73914 14004d1d4 73910->73914 73911 14004d1a7 73911->73907 73912->73911 73944 140058eb0 38 API calls 4 library calls 73912->73944 73945 14002cdc0 38 API calls 73914->73945 73916 14004d216 73946 1400af748 73916->73946 73918 14004d227 73922 14004d255 73918->73922 73949 140047c10 73918->73949 73920 14004d300 73920->73907 73921 14004d100 38 API calls 73921->73922 73922->73920 73922->73921 73923 140047c10 38 API calls 73922->73923 73923->73922 73926 14003fc9d 73925->73926 73928 14003fd33 73926->73928 73929 14003fd11 73926->73929 73934 14003fcad ISource 73926->73934 73930 140092f08 36 API calls 73928->73930 73961 140092f08 73929->73961 73938 14003fd61 BuildCatchObjectHelperInternal 73930->73938 73931 14003fedf 73931->73910 73933 14003fe81 73933->73934 73936 14003ff67 73933->73936 73978 1400ad120 73934->73978 73935 140047c10 38 API calls 73935->73938 73937 14003ff94 73936->73937 73943 14003fc60 38 API calls 73936->73943 73937->73910 73938->73933 73938->73935 73940 140092f08 36 API calls 73938->73940 73942 14003ff17 73938->73942 73939 14003ffab 73939->73910 73940->73938 73942->73933 73985 140096014 36 API calls 2 library calls 73942->73985 73943->73939 73944->73911 73945->73916 73948 1400af767 Concurrency::cancel_current_task 73946->73948 73947 1400af7b2 RaiseException 73947->73918 73948->73947 73950 140047d65 73949->73950 73954 140047c3f 73949->73954 74015 14002b8e0 38 API calls 73950->74015 73951 140047ca4 74008 1400ad148 73951->74008 73953 140047d6a 74016 14002b820 38 API calls 2 library calls 73953->74016 73954->73951 73957 140047c97 73954->73957 73958 140047cd3 73954->73958 73960 140047c8a ISource BuildCatchObjectHelperInternal 73954->73960 73957->73951 73957->73953 73959 1400ad148 std::_Facet_Register 38 API calls 73958->73959 73959->73960 73960->73922 73962 140092f24 73961->73962 73966 140092f42 73961->73966 73992 140093728 6 API calls _get_daylight 73962->73992 73964 140092f29 73993 140096af4 36 API calls _invalid_parameter_noinfo 73964->73993 73975 140092f66 73966->73975 73994 1400981cc 73966->73994 73967 140093003 73986 140092ec4 73967->73986 73968 140092fd8 74000 140093728 6 API calls _get_daylight 73968->74000 73972 140092fdd 74001 140096af4 36 API calls _invalid_parameter_noinfo 73972->74001 73974 140092fe8 74002 1400af374 RtlUnwind 73974->74002 73975->73967 73975->73968 73977 140092f34 73977->73934 73979 1400ad129 73978->73979 73980 1400ad4fc IsProcessorFeaturePresent 73979->73980 73981 1400ad134 73979->73981 73982 1400ad514 73980->73982 73981->73931 74007 1400ad6f4 RtlCaptureContext RtlLookupFunctionEntry capture_current_context 73982->74007 73984 1400ad527 73984->73931 73985->73942 73987 140092ed0 73986->73987 73990 140092ee0 73986->73990 74003 140093728 6 API calls _get_daylight 73987->74003 73989 140092ed5 74004 140096af4 36 API calls _invalid_parameter_noinfo 73989->74004 73990->73977 73992->73964 73993->73977 73995 1400981d5 73994->73995 73999 1400981e5 73994->73999 74005 140093728 6 API calls _get_daylight 73995->74005 73997 1400981da 74006 140096af4 36 API calls _invalid_parameter_noinfo 73997->74006 73999->73975 74000->73972 74001->73974 74002->73977 74003->73989 74004->73990 74005->73997 74006->73999 74007->73984 74011 1400ad153 std::_Facet_Register 74008->74011 74009 1400ad16c 74009->73960 74010 1400ad17d 74018 14002b820 38 API calls 2 library calls 74010->74018 74011->74009 74011->74010 74017 1400ae19c RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 74011->74017 74014 1400ad183 74016->73960 74018->74014 74019 1400ad96c 74042 1400ad290 74019->74042 74022 1400adab8 74123 1400adb78 3 API calls 4 library calls 74022->74123 74023 1400ad988 __scrt_acquire_startup_lock 74025 1400adac2 74023->74025 74032 1400ad9a6 __scrt_release_startup_lock 74023->74032 74124 1400adb78 3 API calls 4 library calls 74025->74124 74027 1400ad9cb 74028 1400adacd BuildCatchObjectHelperInternal 74029 1400ada51 74048 1400adcc0 74029->74048 74031 1400ada56 74051 1400bc6c8 74031->74051 74032->74027 74032->74029 74120 1400a391c 36 API calls 74032->74120 74043 1400ad298 74042->74043 74044 1400ad2a4 __scrt_dllmain_crt_thread_attach 74043->74044 74045 1400ad2ad 74044->74045 74046 1400ad2b1 74044->74046 74045->74022 74045->74023 74046->74045 74125 1400af72c DeleteCriticalSection __vcrt_uninitialize_ptd __vcrt_uninitialize_locks 74046->74125 74126 1400bff10 74048->74126 74050 1400adcd7 GetStartupInfoW 74050->74031 74052 1400a4da4 48 API calls 74051->74052 74054 1400bc6d7 74052->74054 74053 1400ada5e 74056 14007b500 74053->74056 74054->74053 74128 1400bd530 36 API calls TranslateName 74054->74128 74129 14007e710 GetCurrentProcess OpenProcessToken 74056->74129 74059 14007b524 74338 14007ea50 39 API calls 2 library calls 74059->74338 74060 14007b54e 74136 14008a560 GetCurrentProcess OpenProcessToken 74060->74136 74063 14007b52e 74339 140089330 66 API calls _Strcoll 74063->74339 74065 14008a560 8 API calls 74067 14007b566 74065->74067 74144 140086be0 74067->74144 74068 14007b537 74071 14007b542 ExitProcess 74068->74071 74071->74060 74073 14007b5f6 ISource 74074 14007b634 OpenMutexA 74073->74074 74081 14007b7c1 74073->74081 74075 14007b66d ExitProcess 74074->74075 74076 14007b679 CreateMutexA 74074->74076 74075->74076 74322 1400755f0 74076->74322 74120->74029 74123->74025 74124->74028 74125->74045 74127 1400bff00 74126->74127 74127->74050 74127->74127 74128->74054 74130 14007e768 GetTokenInformation 74129->74130 74131 14007e7a4 74129->74131 74130->74131 74132 14007e7b1 CloseHandle 74131->74132 74133 14007e7bd 74131->74133 74132->74133 74134 1400ad120 _Strcoll 3 API calls 74133->74134 74135 14007b520 74134->74135 74135->74059 74135->74060 74137 14008a5cb LookupPrivilegeValueW 74136->74137 74138 14008a636 74136->74138 74137->74138 74139 14008a5ec AdjustTokenPrivileges 74137->74139 74140 14008a64a 74138->74140 74141 14008a63e CloseHandle 74138->74141 74139->74138 74142 1400ad120 _Strcoll 3 API calls 74140->74142 74141->74140 74143 14007b55a 74142->74143 74143->74065 74340 140085ad0 GetCurrentHwProfileW 74144->74340 74148 140086ce9 74149 140086d33 74148->74149 74550 14008e3f4 39 API calls 74148->74550 74362 14008c0a0 74149->74362 74152 140086d43 74155 140086d8c 74152->74155 74157 140086dbc ISource BuildCatchObjectHelperInternal 74152->74157 74551 140097270 74152->74551 74154 140086e8a ISource 74156 1400ad120 _Strcoll 3 API calls 74154->74156 74155->74157 74158 140097270 36 API calls 74155->74158 74159 14007b570 74156->74159 74157->74154 74160 140086ecc 74157->74160 74158->74155 74318 14007bf20 74159->74318 74374 1400853a0 74160->74374 74171 140086be0 134 API calls 74172 140086f6d 74171->74172 74427 140084e20 74172->74427 74174 140086f77 74431 14005c490 74174->74431 74176 140086fa1 74440 1400408c0 74176->74440 74178 140086ffb 74179 1400408c0 38 API calls 74178->74179 74180 14008703e 74179->74180 74456 140042fb0 74180->74456 74183 14005c490 38 API calls 74184 140087097 74183->74184 74185 1400408c0 38 API calls 74184->74185 74186 1400870e6 74185->74186 74187 1400408c0 38 API calls 74186->74187 74188 140087135 74187->74188 74189 140042fb0 38 API calls 74188->74189 74190 140087165 74189->74190 74191 14005c490 38 API calls 74190->74191 74192 14008718e 74191->74192 74193 1400408c0 38 API calls 74192->74193 74194 1400871dc 74193->74194 74195 1400408c0 38 API calls 74194->74195 74196 14008722b 74195->74196 74197 140042fb0 38 API calls 74196->74197 74198 14008725b 74197->74198 74199 14005c490 38 API calls 74198->74199 74319 14007bf42 74318->74319 74319->74319 74320 14006f820 39 API calls 74319->74320 74321 14007bf56 74320->74321 74321->74073 74323 140075621 74322->74323 75095 1400764e0 38 API calls ISource 74323->75095 74325 140075d3c 75096 1400435c0 38 API calls 4 library calls 74325->75096 74327 140075d7f 75097 14006ef40 74327->75097 74329 140075db7 74330 1400408c0 38 API calls 74329->74330 74331 140075e2b 74330->74331 75104 140044780 74331->75104 74335 140075e51 ISource 74336 1400408c0 38 API calls 74335->74336 74337 140075f89 74336->74337 74338->74063 74339->74068 74341 140085b1a 74340->74341 74342 140085b79 74340->74342 74560 1400767f0 74341->74560 74345 1400ad120 _Strcoll 3 API calls 74342->74345 74344 140085b29 74344->74342 74569 14008e3f4 39 API calls 74344->74569 74347 140085bf1 74345->74347 74348 1400850f0 74347->74348 74585 14007e8d0 74348->74585 74352 1400852b7 74353 1400851e1 74355 1400ad120 _Strcoll 3 API calls 74353->74355 74354 140085193 ISource __scrt_get_show_window_mode 74354->74352 74354->74353 74596 1400775d0 55 API calls 74354->74596 74356 14008529e 74355->74356 74356->74148 74358 14008521d 74597 140077730 54 API calls 2 library calls 74358->74597 74360 140085244 74598 14003eec0 74360->74598 74363 14008c1e8 74362->74363 74366 14008c0e9 74362->74366 74613 14002b8e0 38 API calls 74363->74613 74367 14008c128 74366->74367 74368 14008c14a BuildCatchObjectHelperInternal 74366->74368 74370 14008c186 74366->74370 74369 1400ad148 std::_Facet_Register 38 API calls 74367->74369 74372 14008c141 74367->74372 74368->74152 74369->74372 74371 1400ad148 std::_Facet_Register 38 API calls 74370->74371 74371->74368 74372->74368 74612 14002b820 38 API calls 2 library calls 74372->74612 74375 1400853f9 __scrt_get_show_window_mode 74374->74375 74376 1400ad148 std::_Facet_Register 38 API calls 74375->74376 74377 140085463 74376->74377 74614 14004b9d0 74377->74614 74379 1400854a8 EnumDisplayDevicesW 74385 140085569 74379->74385 74386 1400854c5 ISource 74379->74386 74380 1400767f0 38 API calls 74380->74386 74381 140085571 74383 1400ad120 _Strcoll 3 API calls 74381->74383 74384 14008568e 74383->74384 74390 1400852c0 RegGetValueA 74384->74390 74385->74381 74388 140042d30 38 API calls 74385->74388 74386->74380 74387 140085531 EnumDisplayDevicesW 74386->74387 74389 1400856af 74386->74389 74624 14008c7a0 38 API calls 2 library calls 74386->74624 74387->74385 74387->74386 74388->74385 74391 14008533d 74390->74391 74392 1400ad120 _Strcoll 3 API calls 74391->74392 74393 14008537f 74392->74393 74394 1400856c0 74393->74394 74395 14008574f 74394->74395 74398 140085760 ISource 74394->74398 74637 1400474a0 74395->74637 74399 14008583e 74398->74399 74403 140085aab 74398->74403 74626 140042d30 74398->74626 74631 1400bb974 GetNativeSystemInfo 74399->74631 74401 140085843 74632 14006f820 74401->74632 74404 1400858e4 74405 140042d30 38 API calls 74404->74405 74406 14008592e 74405->74406 74407 140042d30 38 API calls 74406->74407 74408 140085988 ISource 74407->74408 74408->74403 74409 1400ad120 _Strcoll 3 API calls 74408->74409 74410 140085a8e 74409->74410 74411 140084fb0 74410->74411 74675 1400adde0 74411->74675 74414 14008500c 74417 1400ad120 _Strcoll 3 API calls 74414->74417 74415 140084fff 74416 1400767f0 38 API calls 74415->74416 74416->74414 74418 14008503e 74417->74418 74419 140085050 74418->74419 74420 1400adde0 _Strcoll 74419->74420 74421 140085060 GetComputerNameW 74420->74421 74422 1400850ac 74421->74422 74423 14008509f 74421->74423 74425 1400ad120 _Strcoll 3 API calls 74422->74425 74424 1400767f0 38 API calls 74423->74424 74424->74422 74426 1400850de 74425->74426 74426->74171 74428 140084f20 74427->74428 74677 1400840a0 74428->74677 74430 140084f44 ISource 74430->74174 74432 140042fb0 38 API calls 74431->74432 74433 14005c4c3 74432->74433 74434 1400ad148 std::_Facet_Register 38 API calls 74433->74434 74435 14005c4d8 74434->74435 74709 140041970 74435->74709 74437 14005c4f5 74438 1400ad120 _Strcoll 3 API calls 74437->74438 74439 14005c50e 74438->74439 74439->74176 74441 1400408f7 74440->74441 74442 1400408ff 74440->74442 74733 140046dc0 38 API calls 2 library calls 74441->74733 74452 140040994 74442->74452 74723 140046c80 74442->74723 74445 14004091d 74447 140040950 ISource 74445->74447 74445->74452 74448 1400ad120 _Strcoll 3 API calls 74447->74448 74450 14004097f 74448->74450 74449 1400409b6 74735 140046a00 74449->74735 74450->74178 74734 140046e50 38 API calls 74452->74734 74457 140042fed 74456->74457 74458 140043026 74457->74458 74459 1400430c7 74457->74459 74476 140043310 74457->74476 74479 140043382 ISource 74457->74479 74461 140043066 74458->74461 74463 14004343d 74458->74463 74800 1400481c0 38 API calls 2 library calls 74458->74800 74459->74463 74480 1400430f4 74459->74480 74802 1400481c0 38 API calls 2 library calls 74459->74802 74460 1400ad120 _Strcoll 3 API calls 74462 14004341f 74460->74462 74485 1400430c2 ISource 74461->74485 74801 14004f510 38 API calls 2 library calls 74461->74801 74462->74183 74809 14003f600 38 API calls 74463->74809 74464 140043333 74467 1400433eb 74464->74467 74477 14004333c 74464->74477 74465 1400433fa 74808 14003f160 38 API calls ISource 74465->74808 74807 140043c60 38 API calls ISource 74467->74807 74471 140043307 74806 140043c60 38 API calls ISource 74471->74806 74476->74464 74476->74465 74476->74479 74477->74463 74477->74479 74479->74460 74480->74485 74803 14004f510 38 API calls 2 library calls 74480->74803 74481 1400409e0 38 API calls 74481->74485 74483 14004f510 38 API calls 74483->74485 74485->74471 74485->74481 74485->74483 74804 140048280 38 API calls ISource 74485->74804 74805 140058710 38 API calls ISource 74485->74805 74550->74148 74552 1400972aa 74551->74552 74553 140097289 74551->74553 74554 1400987ac _Getcoll 36 API calls 74552->74554 74553->74152 74555 1400972af 74554->74555 74556 14009aa38 _Getcoll 36 API calls 74555->74556 74557 1400972c8 74556->74557 74557->74553 75094 14009bb6c 36 API calls 3 library calls 74557->75094 74559 1400972fe 74559->74152 74561 14007683e 74560->74561 74567 14007681f ISource 74560->74567 74570 140036490 74561->74570 74562 1400ad120 _Strcoll 3 API calls 74563 1400768de 74562->74563 74563->74344 74565 140076867 74582 140076900 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry _Strcoll __std_fs_convert_wide_to_narrow 74565->74582 74567->74562 74568 1400768ec 74567->74568 74569->74344 74571 1400365b4 74570->74571 74573 1400364b6 74570->74573 74584 14002b8e0 38 API calls 74571->74584 74574 1400365af 74573->74574 74576 140036572 74573->74576 74577 14003651a 74573->74577 74581 1400364c1 BuildCatchObjectHelperInternal 74573->74581 74583 14002b820 38 API calls 2 library calls 74574->74583 74579 1400ad148 std::_Facet_Register 38 API calls 74576->74579 74577->74574 74578 140036527 74577->74578 74580 1400ad148 std::_Facet_Register 38 API calls 74578->74580 74579->74581 74580->74581 74581->74565 74582->74567 74583->74571 74602 14007cdb0 74585->74602 74587 14007ea32 74608 14007cbc0 38 API calls Concurrency::cancel_current_task 74587->74608 74589 14007e91d 74589->74587 74591 140036490 38 API calls 74589->74591 74593 14007e98e 74591->74593 74592 14007e9f7 ISource 74594 1400ad120 _Strcoll 3 API calls 74592->74594 74593->74587 74593->74592 74595 14007ea1c GetVolumeInformationW 74594->74595 74595->74354 74596->74358 74597->74360 74599 14003ef08 74598->74599 74600 14003ef6c 74599->74600 74611 1400435c0 38 API calls 4 library calls 74599->74611 74600->74353 74603 14007ce2f 74602->74603 74605 14007ce10 __std_fs_get_current_path 74602->74605 74603->74605 74609 140047a50 38 API calls 4 library calls 74603->74609 74607 14007cf45 74605->74607 74610 140047a50 38 API calls 4 library calls 74605->74610 74607->74589 74609->74605 74610->74605 74611->74600 74612->74363 74616 14004b9fc 74614->74616 74623 14004ba21 ISource 74614->74623 74615 14004bb02 74625 14002b820 38 API calls 2 library calls 74615->74625 74616->74615 74618 14004ba57 74616->74618 74619 14004ba2e 74616->74619 74616->74623 74621 1400ad148 std::_Facet_Register 38 API calls 74618->74621 74619->74615 74620 14004ba3b 74619->74620 74622 1400ad148 std::_Facet_Register 38 API calls 74620->74622 74621->74623 74622->74623 74623->74379 74624->74386 74625->74623 74627 140042d92 74626->74627 74629 140042d53 BuildCatchObjectHelperInternal 74626->74629 74657 140047f30 74627->74657 74629->74398 74630 140042dab 74630->74398 74631->74401 74633 14006f8e5 74632->74633 74636 14006f850 BuildCatchObjectHelperInternal 74632->74636 74671 1400734c0 39 API calls 4 library calls 74633->74671 74635 14006f8fa 74635->74404 74636->74404 74638 1400475da 74637->74638 74642 1400474c9 74637->74642 74672 14002b8e0 38 API calls 74638->74672 74639 14004752e 74643 1400ad148 std::_Facet_Register 38 API calls 74639->74643 74641 1400475df 74673 14002b820 38 API calls 2 library calls 74641->74673 74642->74639 74645 140047521 74642->74645 74646 14004755d 74642->74646 74648 140047514 BuildCatchObjectHelperInternal 74642->74648 74643->74648 74645->74639 74645->74641 74647 1400ad148 std::_Facet_Register 38 API calls 74646->74647 74647->74648 74649 14004764c 74648->74649 74650 1400476a5 74648->74650 74651 14004769a 74648->74651 74655 1400475a7 ISource BuildCatchObjectHelperInternal 74648->74655 74652 1400ad148 std::_Facet_Register 38 API calls 74649->74652 74654 1400ad148 std::_Facet_Register 38 API calls 74650->74654 74651->74649 74653 1400476df 74651->74653 74652->74655 74674 14002b820 38 API calls 2 library calls 74653->74674 74654->74655 74655->74398 74658 1400480a6 74657->74658 74662 140047f68 74657->74662 74669 14002b8e0 38 API calls 74658->74669 74660 140047fcd 74663 1400ad148 std::_Facet_Register 38 API calls 74660->74663 74661 1400480ab 74670 14002b820 38 API calls 2 library calls 74661->74670 74662->74660 74665 140047fc0 74662->74665 74666 140047ffc 74662->74666 74668 140047fb3 ISource BuildCatchObjectHelperInternal 74662->74668 74663->74668 74665->74660 74665->74661 74667 1400ad148 std::_Facet_Register 38 API calls 74666->74667 74667->74668 74668->74630 74670->74668 74671->74635 74673->74648 74674->74655 74676 140084fc0 GetUserNameW 74675->74676 74676->74414 74676->74415 74678 140084240 74677->74678 74678->74678 74679 140084257 InternetOpenA 74678->74679 74680 140084315 InternetOpenUrlA 74679->74680 74693 140084282 74679->74693 74682 140084389 HttpQueryInfoW 74680->74682 74680->74693 74683 1400843ef HttpQueryInfoW 74682->74683 74684 1400843b6 74682->74684 74686 14008444c 74683->74686 74687 140084478 InternetQueryDataAvailable 74683->74687 74684->74683 74685 1400ad120 _Strcoll 3 API calls 74688 1400842fa 74685->74688 74707 140092e10 36 API calls ProcessCodePage 74686->74707 74689 140084673 InternetCloseHandle 74687->74689 74704 140084494 74687->74704 74688->74430 74689->74693 74691 14008445d 74691->74687 74694 1400474a0 38 API calls 74691->74694 74692 14008470f 74708 14002b820 38 API calls 2 library calls 74692->74708 74693->74692 74699 1400842d6 ISource 74693->74699 74697 14008446e 74694->74697 74696 140084539 InternetReadFile 74702 14008462d ISource 74696->74702 74706 1400844ee ISource __scrt_get_show_window_mode BuildCatchObjectHelperInternal 74696->74706 74697->74687 74698 140084720 74699->74685 74700 1400ad148 std::_Facet_Register 38 API calls 74700->74706 74701 1400ad148 std::_Facet_Register 38 API calls 74701->74704 74702->74689 74702->74692 74703 140047f30 38 API calls 74703->74706 74704->74689 74704->74692 74704->74696 74704->74701 74704->74706 74705 140084606 InternetQueryDataAvailable 74705->74689 74705->74706 74706->74692 74706->74696 74706->74700 74706->74702 74706->74703 74706->74704 74706->74705 74707->74691 74708->74698 74710 14004199e 74709->74710 74712 1400419ea 74710->74712 74714 1400419ba BuildCatchObjectHelperInternal 74710->74714 74716 140041a42 74710->74716 74720 140041a7d 74710->74720 74715 1400ad148 std::_Facet_Register 38 API calls 74712->74715 74718 140041a00 74712->74718 74714->74437 74715->74718 74717 1400ad148 std::_Facet_Register 38 API calls 74716->74717 74717->74714 74718->74714 74721 14002b820 38 API calls 2 library calls 74718->74721 74722 14002b8e0 38 API calls 74720->74722 74721->74720 74724 140046ca6 74723->74724 74725 140046db3 74724->74725 74726 140046cec 74724->74726 74732 140046d5f 74724->74732 74756 14002b9e0 38 API calls 74725->74756 74728 1400ad148 std::_Facet_Register 38 API calls 74726->74728 74730 140046d0a 74728->74730 74746 1400427b0 74730->74746 74732->74445 74733->74442 74734->74449 74736 140046a57 74735->74736 74758 14002ebf0 74736->74758 74738 140046a95 74780 14004f300 74738->74780 74741 140046aa9 ISource 74743 140046c64 74741->74743 74790 1400af000 74741->74790 74747 140042906 74746->74747 74748 1400427e3 74746->74748 74747->74748 74751 140042913 74747->74751 74749 1400ad120 _Strcoll 3 API calls 74748->74749 74750 140042812 74749->74750 74750->74732 74757 1400477c0 38 API calls 3 library calls 74751->74757 74753 140042934 74754 1400af748 Concurrency::cancel_current_task RaiseException 74753->74754 74755 140042945 74754->74755 74757->74753 74760 14002ec2b 74758->74760 74759 14002ed21 74762 140042d30 38 API calls 74759->74762 74760->74759 74761 1400474a0 38 API calls 74760->74761 74761->74759 74763 14002ed3a 74762->74763 74764 140042d30 38 API calls 74763->74764 74765 14002ed53 74764->74765 74766 14002ed60 74765->74766 74767 140047c10 38 API calls 74765->74767 74768 140042d30 38 API calls 74766->74768 74767->74766 74769 14002edaa 74768->74769 74770 140042d30 38 API calls 74769->74770 74771 14002edbf 74770->74771 74772 14002ee03 ISource 74771->74772 74774 14002ee3c 74771->74774 74773 1400ad120 _Strcoll 3 API calls 74772->74773 74775 14002ee28 74773->74775 74796 1400af090 7 API calls __std_exception_copy 74774->74796 74775->74738 74777 14002ee85 74797 1400af090 7 API calls __std_exception_copy 74777->74797 74779 14002ee92 ISource 74779->74738 74781 14004f364 74780->74781 74782 14004f358 74780->74782 74784 140042d30 38 API calls 74781->74784 74783 1400474a0 38 API calls 74782->74783 74783->74781 74785 14004f381 74784->74785 74786 140042d30 38 API calls 74785->74786 74787 14004f39a 74786->74787 74788 140042d30 38 API calls 74787->74788 74789 14004f3b3 74788->74789 74789->74741 74791 1400af06b 74790->74791 74792 1400af021 74790->74792 74792->74791 74796->74777 74797->74779 74801->74461 74803->74480 74804->74485 74805->74485 74806->74476 74807->74479 75094->74559 75095->74325 75096->74327 75098 1400427b0 38 API calls 75097->75098 75099 14006ef76 75098->75099 75116 1400713b0 75099->75116 75103 14006f001 75103->74329 75105 1400447bd 75104->75105 75107 1400447fe 75104->75107 75106 1400447dc 75105->75106 75226 1400435c0 38 API calls 4 library calls 75105->75226 75115 140044a90 38 API calls 2 library calls 75106->75115 75227 140046930 75107->75227 75111 140046a00 38 API calls 75112 140044831 75111->75112 75113 1400af748 Concurrency::cancel_current_task RaiseException 75112->75113 75114 140044842 75113->75114 75115->74335 75117 1400713f4 75116->75117 75181 14009320c 75117->75181 75121 14006eff5 75122 14006f1c0 75121->75122 75123 14006f4d1 75122->75123 75127 14006f20b __scrt_get_show_window_mode 75122->75127 75218 140072610 38 API calls 2 library calls 75123->75218 75125 14006f504 75126 14006f910 38 API calls 75125->75126 75134 14006f510 75126->75134 75210 14004a4b0 38 API calls 75127->75210 75129 14006f25b 75211 140071740 38 API calls 2 library calls 75129->75211 75131 14006f4cc ISource 75138 1400ad120 _Strcoll 3 API calls 75131->75138 75132 14006f26b 75135 14006f910 38 API calls 75132->75135 75133 1400427b0 38 API calls 75136 14006f6cc 75133->75136 75177 14006f618 ISource 75134->75177 75219 14004a680 38 API calls ISource 75134->75219 75149 14006f277 75135->75149 75140 140042fb0 38 API calls 75136->75140 75139 14006f75c 75138->75139 75139->75103 75145 14006f706 75140->75145 75141 14006f55d 75220 1400509f0 38 API calls 4 library calls 75141->75220 75143 14006f465 75148 14006f4bf 75143->75148 75153 1400427b0 38 API calls 75143->75153 75144 14006f41d 75147 1400427b0 38 API calls 75144->75147 75145->75131 75150 14006f7b0 75145->75150 75146 14006f583 75221 14004ac00 38 API calls _Strcoll 75146->75221 75152 14006f438 75147->75152 75217 14004a2d0 38 API calls ISource 75148->75217 75179 14006f404 ISource 75149->75179 75212 14004a680 38 API calls ISource 75149->75212 75224 140042e50 37 API calls 75150->75224 75161 140042fb0 38 API calls 75152->75161 75153->75152 75157 14006f2c3 75213 1400509f0 38 API calls 4 library calls 75157->75213 75158 14006f7c8 75162 1400af748 Concurrency::cancel_current_task RaiseException 75158->75162 75161->75148 75175 14006f7d8 75162->75175 75163 14006f592 ISource 75173 14006f807 75163->75173 75163->75175 75222 1400af090 7 API calls __std_exception_copy 75163->75222 75165 14006f7f7 75168 1400af748 Concurrency::cancel_current_task RaiseException 75165->75168 75166 14006f2e9 75214 14004ac00 38 API calls _Strcoll 75166->75214 75167 14006f60a 75223 1400af090 7 API calls __std_exception_copy 75167->75223 75168->75173 75171 14006f2f9 75171->75150 75172 14006f30e ISource 75171->75172 75172->75175 75215 1400af090 7 API calls __std_exception_copy 75172->75215 75225 140042e50 37 API calls 75175->75225 75176 14006f379 75216 1400af090 7 API calls __std_exception_copy 75176->75216 75177->75133 75177->75145 75177->75150 75177->75173 75179->75143 75179->75144 75180 14006f387 ISource 75180->75175 75180->75179 75182 1400987ac _Getcoll 36 API calls 75181->75182 75183 140093215 75182->75183 75184 14009aa38 _Getcoll 36 API calls 75183->75184 75185 1400714cc 75184->75185 75186 14006f910 75185->75186 75187 14006f933 75186->75187 75191 14006f980 75186->75191 75205 140071080 38 API calls 75187->75205 75190 14006f938 75190->75191 75206 140071080 38 API calls 75190->75206 75208 14006fc70 38 API calls 75191->75208 75193 14006fab7 75196 1400ad120 _Strcoll 3 API calls 75193->75196 75194 14006f947 75195 14006f95d 75194->75195 75207 140071080 38 API calls 75194->75207 75198 1400ad120 _Strcoll 3 API calls 75195->75198 75200 14006fbb5 75196->75200 75199 14006f97a 75198->75199 75199->75121 75200->75121 75201 14006f956 75201->75191 75201->75195 75202 140071080 38 API calls 75204 14006f9c1 75202->75204 75204->75193 75204->75202 75209 14006fc70 38 API calls 75204->75209 75205->75190 75206->75194 75207->75201 75208->75204 75209->75204 75210->75129 75211->75132 75212->75157 75213->75166 75214->75171 75215->75176 75216->75180 75217->75131 75218->75125 75219->75141 75220->75146 75221->75163 75222->75167 75223->75177 75224->75158 75225->75165 75226->75106 75228 140046980 75227->75228 75229 1400469ae 75228->75229 75230 1400474a0 38 API calls 75228->75230 75231 140042d30 38 API calls 75229->75231 75230->75229 75232 1400469ca 75231->75232 75233 140042d30 38 API calls 75232->75233 75234 14004481e 75233->75234 75234->75111 75235 140097a4c 75236 140097a7d 75235->75236 75237 140097a62 75235->75237 75236->75237 75239 140097a96 75236->75239 75264 140093728 6 API calls _get_daylight 75237->75264 75241 140097a9c 75239->75241 75244 140097ab9 75239->75244 75240 140097a67 75265 140096af4 36 API calls _invalid_parameter_noinfo 75240->75265 75266 140093728 6 API calls _get_daylight 75241->75266 75259 1400a1c90 75244->75259 75249 140097d33 75254 140097b76 75258 140097a73 75254->75258 75286 1400a1cd4 36 API calls _isindst 75254->75286 75255 140097b16 75255->75258 75285 1400a1cd4 36 API calls _isindst 75255->75285 75260 140097abe 75259->75260 75261 1400a1c9f 75259->75261 75267 1400a0da8 75260->75267 75263 1400a1cb8 75261->75263 75287 1400a1b00 75261->75287 75264->75240 75265->75258 75266->75258 75268 1400a0db1 75267->75268 75269 140097ad3 75267->75269 75371 140093728 6 API calls _get_daylight 75268->75371 75269->75249 75273 1400a0dd8 75269->75273 75271 1400a0db6 75372 140096af4 36 API calls _invalid_parameter_noinfo 75271->75372 75274 1400a0de1 75273->75274 75275 140097ae4 75273->75275 75373 140093728 6 API calls _get_daylight 75274->75373 75275->75249 75279 1400a0e08 75275->75279 75277 1400a0de6 75374 140096af4 36 API calls _invalid_parameter_noinfo 75277->75374 75280 1400a0e11 75279->75280 75284 140097af5 75279->75284 75375 140093728 6 API calls _get_daylight 75280->75375 75282 1400a0e16 75376 140096af4 36 API calls _invalid_parameter_noinfo 75282->75376 75284->75249 75284->75254 75284->75255 75285->75258 75286->75258 75309 1400aa344 75287->75309 75289 1400a1b57 75290 14009d17c wcsftime 6 API calls 75289->75290 75304 1400a1b6c 75289->75304 75308 1400a1b5b 75289->75308 75292 1400a1bae 75290->75292 75291 1400a1c00 75358 1400a16fc 44 API calls 7 library calls 75291->75358 75296 1400a1bb6 75292->75296 75300 1400aa344 wcsftime 41 API calls 75292->75300 75294 1400a1b74 75297 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75294->75297 75301 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75296->75301 75299 1400a1b7c 75297->75299 75298 1400a1c08 75298->75294 75302 1400ad120 _Strcoll 3 API calls 75299->75302 75303 1400a1bd8 75300->75303 75301->75304 75305 1400a1b8c 75302->75305 75303->75296 75306 1400a1be1 75303->75306 75304->75294 75318 1400a1978 75304->75318 75305->75263 75307 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75306->75307 75307->75308 75308->75291 75308->75304 75316 1400aa24c 75309->75316 75310 1400aa283 75359 140093728 6 API calls _get_daylight 75310->75359 75312 1400aa288 75360 140096af4 36 API calls _invalid_parameter_noinfo 75312->75360 75315 1400aa294 75315->75289 75316->75309 75316->75310 75316->75315 75361 1400aa1b4 41 API calls wcsftime 75316->75361 75362 1400a6898 36 API calls 2 library calls 75316->75362 75319 1400a198c wcsftime 75318->75319 75320 1400a0e08 _get_daylight 36 API calls 75319->75320 75321 1400a19ab 75320->75321 75322 1400a0da8 _get_daylight 36 API calls 75321->75322 75324 1400a1aeb 75321->75324 75323 1400a19bc 75322->75323 75323->75324 75326 1400a0dd8 _get_daylight 36 API calls 75323->75326 75325 1400aa344 wcsftime 41 API calls 75324->75325 75327 1400a1b57 75325->75327 75328 1400a19cd 75326->75328 75332 14009d17c wcsftime 6 API calls 75327->75332 75346 1400a1b6c 75327->75346 75351 1400a1b5b 75327->75351 75328->75324 75329 1400a19d5 75328->75329 75330 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75329->75330 75331 1400a19e1 GetTimeZoneInformation 75330->75331 75348 1400a1ac0 wcsftime 75331->75348 75352 1400a19fe __scrt_get_show_window_mode 75331->75352 75334 1400a1bae 75332->75334 75333 1400a1c00 75370 1400a16fc 44 API calls 7 library calls 75333->75370 75338 1400a1bb6 75334->75338 75342 1400aa344 wcsftime 41 API calls 75334->75342 75336 1400a1b74 75339 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75336->75339 75337 1400a1978 wcsftime 43 API calls 75337->75336 75343 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75338->75343 75341 1400a1b7c 75339->75341 75340 1400a1c08 75340->75336 75344 1400ad120 _Strcoll 3 API calls 75341->75344 75345 1400a1bd8 75342->75345 75343->75346 75347 1400a1b8c 75344->75347 75345->75338 75349 1400a1be1 75345->75349 75346->75336 75346->75337 75347->75294 75348->75294 75350 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75349->75350 75350->75351 75351->75333 75351->75346 75363 1400a5264 75352->75363 75356 1400a1aa9 75369 1400a1c10 44 API calls wcsftime 75356->75369 75358->75298 75359->75312 75360->75315 75361->75316 75362->75316 75364 1400987ac _Getcoll 36 API calls 75363->75364 75365 1400a526d 75364->75365 75366 14009aa38 _Getcoll 36 API calls 75365->75366 75367 1400a1a92 75366->75367 75368 1400a1c10 44 API calls wcsftime 75367->75368 75368->75356 75369->75348 75370->75340 75371->75271 75372->75269 75373->75277 75374->75275 75375->75282 75376->75284 75377 14003fab0 75378 14003fac8 75377->75378 75382 14003fad4 BuildCatchObjectHelperInternal 75377->75382 75379 14003fae5 BuildCatchObjectHelperInternal 75380 14003fc1e 75380->75379 75383 140096304 _fread_nolock 41 API calls 75380->75383 75382->75379 75382->75380 75384 140096304 75382->75384 75383->75379 75387 140096324 75384->75387 75386 14009631c 75386->75382 75388 14009634e 75387->75388 75389 14009637d 75387->75389 75388->75389 75390 14009635d __scrt_get_show_window_mode 75388->75390 75391 14009639a 75388->75391 75389->75386 75411 140093728 6 API calls _get_daylight 75390->75411 75396 1400960a4 75391->75396 75394 140096372 75412 140096af4 36 API calls _invalid_parameter_noinfo 75394->75412 75400 1400960d3 __scrt_get_show_window_mode 75396->75400 75402 1400960ed 75396->75402 75397 1400960dd 75433 140093728 6 API calls _get_daylight 75397->75433 75399 1400960e2 75434 140096af4 36 API calls _invalid_parameter_noinfo 75399->75434 75400->75397 75400->75402 75409 140096142 __scrt_get_show_window_mode BuildCatchObjectHelperInternal 75400->75409 75402->75389 75404 1400962c5 __scrt_get_show_window_mode 75501 140093728 6 API calls _get_daylight 75404->75501 75405 1400981cc _fread_nolock 36 API calls 75405->75409 75409->75402 75409->75404 75409->75405 75413 14009c188 75409->75413 75435 140093728 6 API calls _get_daylight 75409->75435 75436 140096af4 36 API calls _invalid_parameter_noinfo 75409->75436 75437 14009f1ec 75409->75437 75411->75394 75412->75389 75414 14009c1a5 75413->75414 75418 14009c1d0 75413->75418 75527 140093728 6 API calls _get_daylight 75414->75527 75416 14009c1aa 75528 140096af4 36 API calls _invalid_parameter_noinfo 75416->75528 75419 14009c20c 75418->75419 75426 14009c1b5 75418->75426 75529 14009ebd8 6 API calls 2 library calls 75418->75529 75421 1400981cc _fread_nolock 36 API calls 75419->75421 75422 14009c21e 75421->75422 75502 14009f0cc 75422->75502 75424 14009c22b 75425 1400981cc _fread_nolock 36 API calls 75424->75425 75424->75426 75427 14009c260 75425->75427 75426->75409 75427->75426 75428 1400981cc _fread_nolock 36 API calls 75427->75428 75429 14009c26c 75428->75429 75429->75426 75430 1400981cc _fread_nolock 36 API calls 75429->75430 75431 14009c279 75430->75431 75432 1400981cc _fread_nolock 36 API calls 75431->75432 75432->75426 75433->75399 75434->75402 75435->75409 75436->75409 75438 14009f22d 75437->75438 75439 14009f214 75437->75439 75441 14009f607 75438->75441 75445 14009f278 75438->75445 75547 140093708 6 API calls _get_daylight 75439->75547 75562 140093708 6 API calls _get_daylight 75441->75562 75442 14009f219 75548 140093728 6 API calls _get_daylight 75442->75548 75447 14009f222 75445->75447 75448 14009f281 75445->75448 75454 14009f2b2 75445->75454 75446 14009f60c 75563 140093728 6 API calls _get_daylight 75446->75563 75447->75409 75549 140093708 6 API calls _get_daylight 75448->75549 75451 14009f28d 75564 140096af4 36 API calls _invalid_parameter_noinfo 75451->75564 75452 14009f286 75550 140093728 6 API calls _get_daylight 75452->75550 75456 14009f2d9 75454->75456 75457 14009f313 75454->75457 75458 14009f2e6 75454->75458 75456->75458 75486 14009f302 75456->75486 75460 14009d17c wcsftime 6 API calls 75457->75460 75551 140093708 6 API calls _get_daylight 75458->75551 75461 14009f324 75460->75461 75463 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75461->75463 75462 14009f2eb 75552 140093728 6 API calls _get_daylight 75462->75552 75466 14009f32e 75463->75466 75469 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75466->75469 75467 14009f2f2 75553 140096af4 36 API calls _invalid_parameter_noinfo 75467->75553 75472 14009f335 75469->75472 75471 14009f4ae 75473 14009f4b3 ReadFile 75471->75473 75475 14009f33d 75472->75475 75476 14009f358 75472->75476 75477 14009f4d9 75473->75477 75478 14009f5cd __vcrt_getptd_noinit 75473->75478 75474 14009f441 GetConsoleMode 75474->75471 75479 14009f455 75474->75479 75554 140093728 6 API calls _get_daylight 75475->75554 75556 14009f8ac 36 API calls 2 library calls 75476->75556 75477->75478 75481 14009f4a2 75477->75481 75487 14009f483 __vcrt_getptd_noinit 75478->75487 75488 14009f5d8 75478->75488 75479->75473 75483 14009f45f ReadConsoleW 75479->75483 75491 14009f512 75481->75491 75492 14009f537 75481->75492 75500 14009f2fd 75481->75500 75483->75481 75483->75487 75484 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75484->75447 75485 14009f342 75555 140093708 6 API calls _get_daylight 75485->75555 75539 1400a822c 75486->75539 75487->75500 75557 14009369c 6 API calls 2 library calls 75487->75557 75560 140093728 6 API calls _get_daylight 75488->75560 75558 14009ee04 37 API calls 4 library calls 75491->75558 75494 14009f5bb 75492->75494 75492->75500 75559 14009ec44 37 API calls _fread_nolock 75494->75559 75495 14009f5dd 75561 140093708 6 API calls _get_daylight 75495->75561 75499 14009f5c8 75499->75500 75500->75484 75501->75399 75503 14009f0f6 75502->75503 75506 14009f126 75502->75506 75530 140093708 6 API calls _get_daylight 75503->75530 75505 14009f0fb 75531 140093728 6 API calls _get_daylight 75505->75531 75507 14009f13f 75506->75507 75510 14009f17d 75506->75510 75532 140093708 6 API calls _get_daylight 75507->75532 75512 14009f19b 75510->75512 75513 14009f186 75510->75513 75511 14009f144 75533 140093728 6 API calls _get_daylight 75511->75533 75518 14009f1cd 75512->75518 75519 14009f1b8 75512->75519 75535 140093708 6 API calls _get_daylight 75513->75535 75516 14009f14c 75534 140096af4 36 API calls _invalid_parameter_noinfo 75516->75534 75517 14009f18b 75536 140093728 6 API calls _get_daylight 75517->75536 75523 14009f1ec _fread_nolock 41 API calls 75518->75523 75537 140093728 6 API calls _get_daylight 75519->75537 75526 14009f103 75523->75526 75524 14009f1bd 75538 140093708 6 API calls _get_daylight 75524->75538 75526->75424 75527->75416 75528->75426 75529->75419 75530->75505 75531->75526 75532->75511 75533->75516 75534->75526 75535->75517 75536->75516 75537->75524 75538->75526 75540 1400a8242 75539->75540 75541 1400a8235 75539->75541 75543 14009f422 75540->75543 75566 140093728 6 API calls _get_daylight 75540->75566 75565 140093728 6 API calls _get_daylight 75541->75565 75543->75471 75543->75474 75545 1400a8279 75567 140096af4 36 API calls _invalid_parameter_noinfo 75545->75567 75547->75442 75548->75447 75549->75452 75550->75451 75551->75462 75552->75467 75553->75500 75554->75485 75555->75500 75556->75486 75557->75500 75558->75500 75559->75499 75560->75495 75561->75500 75562->75446 75563->75451 75564->75447 75565->75543 75566->75545 75567->75543 75568 1400ad888 75569 1400ad898 75568->75569 75583 1400bc768 75569->75583 75571 1400ad8a4 75589 1400ad2cc 75571->75589 75574 1400ad93d 75575 1400ad8bc _RTC_Initialize 75581 1400ad911 75575->75581 75594 1400ad47c 75575->75594 75577 1400ad8d1 75597 1400bc3c8 75577->75597 75579 1400ad8dd 75579->75581 75629 1400990b8 75579->75629 75582 1400ad92d 75581->75582 75636 1400adb78 3 API calls 4 library calls 75581->75636 75584 1400bc779 75583->75584 75586 1400bc781 75584->75586 75637 140093728 6 API calls _get_daylight 75584->75637 75586->75571 75587 1400bc790 75638 140096af4 36 API calls _invalid_parameter_noinfo 75587->75638 75590 1400ad2dd 75589->75590 75593 1400ad2e2 __scrt_acquire_startup_lock 75589->75593 75590->75593 75639 1400adb78 3 API calls 4 library calls 75590->75639 75592 1400ad356 75593->75575 75640 1400ad440 75594->75640 75596 1400ad485 75596->75577 75598 1400bc3e8 75597->75598 75607 1400bc3ff 75597->75607 75599 1400bc3f0 75598->75599 75600 1400bc406 75598->75600 75645 140093728 6 API calls _get_daylight 75599->75645 75602 1400a4da4 48 API calls 75600->75602 75604 1400bc40b 75602->75604 75603 1400bc3f5 75646 140096af4 36 API calls _invalid_parameter_noinfo 75603->75646 75647 1400bd40c 37 API calls 4 library calls 75604->75647 75607->75579 75608 1400bc422 75648 1400bc1a0 36 API calls 75608->75648 75610 1400bc45f 75649 1400bc368 6 API calls 2 library calls 75610->75649 75612 1400bc475 75613 1400bc47d 75612->75613 75614 1400bc495 75612->75614 75650 140093728 6 API calls _get_daylight 75613->75650 75651 1400bc1a0 36 API calls 75614->75651 75617 1400bc482 75618 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75617->75618 75620 1400bc490 75618->75620 75619 1400bc4b7 75622 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75619->75622 75620->75607 75621 1400bc4b1 75621->75619 75623 1400bc4fc 75621->75623 75624 1400bc4e3 75621->75624 75622->75607 75627 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75623->75627 75625 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75624->75625 75626 1400bc4ec 75625->75626 75628 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 75626->75628 75627->75619 75628->75620 75630 1400987ac _Getcoll 36 API calls 75629->75630 75631 1400990c5 75630->75631 75632 1400990f9 75631->75632 75652 140093728 6 API calls _get_daylight 75631->75652 75632->75581 75634 1400990ee 75653 140096af4 36 API calls _invalid_parameter_noinfo 75634->75653 75636->75574 75637->75587 75638->75586 75639->75592 75641 1400ad45a 75640->75641 75643 1400ad453 75640->75643 75644 1400aa79c 7 API calls 75641->75644 75643->75596 75644->75643 75645->75603 75646->75607 75647->75608 75648->75610 75649->75612 75650->75617 75651->75621 75652->75634 75653->75632 75654 14008b707 75655 14008b711 75654->75655 75660 14008bc00 75655->75660 75658 1400ad120 _Strcoll 3 API calls 75659 14008ba63 75658->75659 75663 14008bc3f 75660->75663 75666 14008b720 75660->75666 75661 14008beb8 75681 14002b900 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry _Strcoll 75661->75681 75663->75661 75669 14008be3d 75663->75669 75679 140042d30 38 API calls 75663->75679 75680 14002b5b0 36 API calls 75663->75680 75665 14008bed9 75682 14008d310 38 API calls 75665->75682 75666->75658 75668 14008beef 75670 140046a00 38 API calls 75668->75670 75669->75666 75683 14008d3f0 38 API calls 75669->75683 75671 14008bf02 75670->75671 75673 1400af748 Concurrency::cancel_current_task RaiseException 75671->75673 75673->75669 75674 14008bf3a 75675 140046a00 38 API calls 75674->75675 75676 14008bf4d 75675->75676 75677 1400af748 Concurrency::cancel_current_task RaiseException 75676->75677 75678 14008bf5e 75677->75678 75679->75663 75680->75663 75681->75665 75682->75668 75683->75674 75684 140098368 75685 1400981cc _fread_nolock 36 API calls 75684->75685 75687 140098387 75685->75687 75686 1400983c8 75688 14009838f 75686->75688 75690 140098409 75686->75690 75707 14009d028 36 API calls 2 library calls 75686->75707 75687->75686 75687->75688 75706 1400982ec 36 API calls ProcessCodePage 75687->75706 75695 1400981f4 75690->75695 75693 1400983fd 75693->75690 75708 14009ebd8 6 API calls 2 library calls 75693->75708 75696 1400981cc _fread_nolock 36 API calls 75695->75696 75697 140098219 75696->75697 75698 1400982ba 75697->75698 75699 140098229 75697->75699 75718 14009b6d8 36 API calls 2 library calls 75698->75718 75701 140098247 75699->75701 75704 140098265 75699->75704 75717 14009b6d8 36 API calls 2 library calls 75701->75717 75703 140098255 75703->75688 75704->75703 75709 14009f808 75704->75709 75706->75686 75707->75693 75708->75690 75710 14009f838 75709->75710 75719 14009f63c 75710->75719 75712 14009f851 75713 14009f877 75712->75713 75726 14008e124 36 API calls 3 library calls 75712->75726 75716 14009f88c 75713->75716 75727 14008e124 36 API calls 3 library calls 75713->75727 75716->75703 75717->75703 75718->75703 75721 14009f693 75719->75721 75725 14009f665 75719->75725 75720 14009f6ac 75733 140096a28 36 API calls _invalid_parameter_noinfo 75720->75733 75721->75720 75723 14009f703 75721->75723 75723->75725 75728 14009f75c 75723->75728 75725->75712 75726->75713 75727->75716 75734 1400a4128 75728->75734 75731 14009f79a SetFilePointerEx 75732 14009f789 __vcrt_getptd_noinit _fread_nolock 75731->75732 75732->75725 75733->75725 75735 1400a4131 75734->75735 75736 1400a4146 75734->75736 75746 140093708 6 API calls _get_daylight 75735->75746 75743 14009f783 75736->75743 75748 140093708 6 API calls _get_daylight 75736->75748 75739 1400a4136 75747 140093728 6 API calls _get_daylight 75739->75747 75740 1400a4181 75749 140093728 6 API calls _get_daylight 75740->75749 75743->75731 75743->75732 75744 1400a4189 75750 140096af4 36 API calls _invalid_parameter_noinfo 75744->75750 75746->75739 75747->75743 75748->75740 75749->75744 75750->75743 75751 14005104b 75855 140059670 75751->75855 75753 1400ad120 _Strcoll 3 API calls 75754 140051a26 75753->75754 75755 14004b500 38 API calls 75766 140050eae 75755->75766 75756 140051288 75873 14004b500 75756->75873 75757 140051562 75911 14004a680 38 API calls ISource 75757->75911 75758 1400514ad 75907 14004a680 38 API calls ISource 75758->75907 75760 140051290 75761 1400516cc 75760->75761 75762 14005129c 75760->75762 75919 14004a680 38 API calls ISource 75761->75919 75891 140053480 75762->75891 75766->75755 75766->75756 75766->75757 75766->75758 75773 1400538c0 38 API calls 75766->75773 75841 140051375 75766->75841 75767 1400515a2 75912 1400509f0 38 API calls 4 library calls 75767->75912 75768 1400512b4 75772 14004b500 38 API calls 75768->75772 75769 1400514ed 75908 1400509f0 38 API calls 4 library calls 75769->75908 75778 1400512c0 75772->75778 75773->75766 75775 140051513 75909 14004ac00 38 API calls _Strcoll 75775->75909 75776 1400515c8 75913 14004ac00 38 API calls _Strcoll 75776->75913 75777 14005170c 75920 1400509f0 38 API calls 4 library calls 75777->75920 75782 140051617 75778->75782 75783 1400512cc 75778->75783 75915 14004a680 38 API calls ISource 75782->75915 75787 14004b500 38 API calls 75783->75787 75784 140051523 75788 140051532 75784->75788 75789 140051ab0 75784->75789 75785 1400515d8 75790 1400515e7 75785->75790 75791 140051acd 75785->75791 75786 140051732 75921 14004ac00 38 API calls _Strcoll 75786->75921 75811 1400512d4 75787->75811 75910 14002eec0 7 API calls __std_exception_destroy 75788->75910 75926 140042e50 37 API calls 75789->75926 75914 14002eec0 7 API calls __std_exception_destroy 75790->75914 75927 140042e50 37 API calls 75791->75927 75795 140051742 75799 140051b07 75795->75799 75800 140051751 75795->75800 75797 140051657 75916 1400509f0 38 API calls 4 library calls 75797->75916 75798 140051abd 75806 1400af748 Concurrency::cancel_current_task RaiseException 75798->75806 75929 140042e50 37 API calls 75799->75929 75922 14002eec0 7 API calls __std_exception_destroy 75800->75922 75801 140051ada 75807 1400af748 Concurrency::cancel_current_task RaiseException 75801->75807 75806->75791 75808 140051aea 75807->75808 75928 140042e50 37 API calls 75808->75928 75809 14005167d 75917 14004ac00 38 API calls _Strcoll 75809->75917 75810 140051b14 75813 1400af748 Concurrency::cancel_current_task RaiseException 75810->75813 75903 14004a680 38 API calls ISource 75811->75903 75818 140051b24 75813->75818 75817 14005168d 75817->75808 75821 14005169c 75817->75821 75930 140042e50 37 API calls 75818->75930 75819 14005131c 75904 1400509f0 38 API calls 4 library calls 75819->75904 75820 140051af7 75824 1400af748 Concurrency::cancel_current_task RaiseException 75820->75824 75918 14002eec0 7 API calls __std_exception_destroy 75821->75918 75823 140051342 75905 14004ac00 38 API calls _Strcoll 75823->75905 75824->75799 75827 140051b31 75830 1400af748 Concurrency::cancel_current_task RaiseException 75827->75830 75828 140051352 75831 140051361 75828->75831 75832 140051a5a 75828->75832 75833 140051b41 75830->75833 75906 14002eec0 7 API calls __std_exception_destroy 75831->75906 75923 140042e50 37 API calls 75832->75923 75931 140042e50 37 API calls 75833->75931 75835 140051a66 75839 1400af748 Concurrency::cancel_current_task RaiseException 75835->75839 75837 140051b4e 75840 1400af748 Concurrency::cancel_current_task RaiseException 75837->75840 75842 140051a76 75839->75842 75843 140051b5e 75840->75843 75841->75753 75924 140042e50 37 API calls 75842->75924 75932 140042e50 37 API calls 75843->75932 75846 140051a83 75847 1400af748 Concurrency::cancel_current_task RaiseException 75846->75847 75849 140051a93 75847->75849 75848 140051b6b 75850 1400af748 Concurrency::cancel_current_task RaiseException 75848->75850 75925 140053330 37 API calls 75849->75925 75854 140051b7b 75850->75854 75852 140051aa0 75853 1400af748 Concurrency::cancel_current_task RaiseException 75852->75853 75853->75789 75854->75854 75856 140059705 75855->75856 75857 140059690 75855->75857 75859 140059777 75856->75859 75860 14005970f 75856->75860 75858 140042fb0 38 API calls 75857->75858 75862 1400596b5 75858->75862 75861 140042fb0 38 API calls 75859->75861 75863 140059744 75860->75863 75864 14005971d 75860->75864 75866 14005979c 75861->75866 75867 140042fb0 38 API calls 75862->75867 75933 140060f90 38 API calls 2 library calls 75863->75933 75868 140042fb0 38 API calls 75864->75868 75870 140042fb0 38 API calls 75866->75870 75871 1400596f1 75867->75871 75869 140059736 75868->75869 75869->75766 75872 1400597d9 75870->75872 75871->75766 75872->75766 75874 14004b523 75873->75874 75878 14004b570 75873->75878 75876 14004d100 38 API calls 75874->75876 75875 14004d100 38 API calls 75875->75878 75877 14004b528 75876->75877 75877->75878 75879 14004d100 38 API calls 75877->75879 75878->75875 75889 14004b5c3 75878->75889 75880 14004b537 75879->75880 75881 14004b54d 75880->75881 75882 14004d100 38 API calls 75880->75882 75883 1400ad120 _Strcoll 3 API calls 75881->75883 75884 14004b546 75882->75884 75885 14004b56a 75883->75885 75884->75878 75884->75881 75885->75760 75886 14004b6c8 75887 1400ad120 _Strcoll 3 API calls 75886->75887 75888 14004b81b 75887->75888 75888->75760 75889->75886 75890 14004d100 38 API calls 75889->75890 75890->75889 75892 1400534a5 75891->75892 75893 1400534d8 75892->75893 75894 140053581 75892->75894 75902 140053530 75892->75902 75896 1400ad148 std::_Facet_Register 38 API calls 75893->75896 75934 14002b9e0 38 API calls 75894->75934 75898 1400534fc 75896->75898 75899 140041970 38 API calls 75898->75899 75900 140053518 75899->75900 75901 1400427b0 38 API calls 75900->75901 75901->75902 75902->75768 75903->75819 75904->75823 75905->75828 75906->75841 75907->75769 75908->75775 75909->75784 75910->75841 75911->75767 75912->75776 75913->75785 75914->75841 75915->75797 75916->75809 75917->75817 75918->75841 75919->75777 75920->75786 75921->75795 75922->75841 75923->75835 75924->75846 75925->75852 75926->75798 75927->75801 75928->75820 75929->75810 75930->75827 75931->75837 75932->75848 75933->75869 75935 140085c7b RegOpenKeyExA 75936 140085ca5 RegQueryValueExA 75935->75936 75942 140085ce4 ISource 75935->75942 75936->75942 75937 140085d7a 75940 1400ad120 _Strcoll 3 API calls 75937->75940 75938 140085d74 RegCloseKey 75938->75937 75941 140085d8d 75940->75941 75942->75937 75942->75938 75943 14008b17b 75944 14008b18c 75943->75944 75945 14008b1a1 75943->75945 75948 1400ad120 _Strcoll 3 API calls 75944->75948 75946 14008b1aa 75945->75946 75961 14008b36f 75945->75961 75949 1400417a0 38 API calls 75946->75949 75959 14008b202 75946->75959 75947 14008b41f 75951 14008bc00 38 API calls 75947->75951 75950 14008ba63 75948->75950 75949->75959 75953 14008b438 75951->75953 75952 14008bc00 38 API calls 75952->75961 75958 14008b120 3 API calls 75953->75958 75954 14008b2d2 75957 14008bc00 38 API calls 75954->75957 75955 14008b120 3 API calls 75955->75961 75956 14008bc00 38 API calls 75956->75959 75960 14008b30b 75957->75960 75958->75944 75959->75954 75959->75956 75964 14008b120 75959->75964 75963 14008b120 3 API calls 75960->75963 75961->75947 75961->75952 75961->75955 75963->75944 75965 14008b150 75964->75965 75966 1400ad120 _Strcoll 3 API calls 75965->75966 75967 14008ba63 75966->75967 75967->75959 75968 14004c7d4 75969 14004c525 75968->75969 75971 14004c539 75968->75971 75970 140047c10 38 API calls 75969->75970 75970->75971 75972 14004d100 38 API calls 75971->75972 75973 14004c4b0 75972->75973 75974 14006bf80 76037 14002eaf0 75974->76037 75977 14002eaf0 43 API calls 75978 14006c854 75977->75978 75989 14006cc76 ISource 75978->75989 76043 14002d4e0 75978->76043 75980 1400ad120 _Strcoll 3 API calls 75982 14006cca1 75980->75982 75988 14006c95d 75988->75989 75990 14006ccbd 75988->75990 75989->75980 75991 140046930 38 API calls 75990->75991 75992 14006cce5 75991->75992 75993 140046a00 38 API calls 75992->75993 75994 14006ccfa 75993->75994 75995 1400af748 Concurrency::cancel_current_task RaiseException 75994->75995 75996 14006cd0d 75995->75996 76071 14002e1d0 75996->76071 76038 14002eb21 76037->76038 76077 1400b9e68 76038->76077 76041 1400ad120 _Strcoll 3 API calls 76042 14002ebc2 76041->76042 76042->75977 76044 14002d509 76043->76044 76045 140036490 38 API calls 76044->76045 76046 14002d59a 76045->76046 76047 14002d370 76046->76047 76048 14002d3a0 76047->76048 76114 1400b9b18 76048->76114 76050 14002d43a 76060 14006ecd0 76050->76060 76052 14002d3ac __std_fs_convert_wide_to_narrow 76052->76050 76053 14002d48f 76052->76053 76055 1400417a0 38 API calls 76052->76055 76059 14002d489 76052->76059 76121 14002c530 38 API calls Concurrency::cancel_current_task 76053->76121 76057 14002d410 __std_fs_convert_wide_to_narrow 76055->76057 76057->76050 76119 14002c530 38 API calls Concurrency::cancel_current_task 76057->76119 76120 14002c160 38 API calls 2 library calls 76059->76120 76061 14006ecf6 76060->76061 76062 14006f820 39 API calls 76061->76062 76063 14006c8ab 76062->76063 76064 14007e7e0 76063->76064 76122 14007df10 76064->76122 76067 1400442d0 38 API calls 76068 14007e83a 76067->76068 76069 1400ad120 _Strcoll 3 API calls 76068->76069 76070 14007e8bd 76069->76070 76070->75988 76072 14002e1e9 76071->76072 76576 14002db70 39 API calls ISource 76072->76576 76074 14002e220 76075 1400af748 Concurrency::cancel_current_task RaiseException 76074->76075 76076 14002e231 76075->76076 76080 1400b9eaa 76077->76080 76078 1400b9eb3 76079 1400ad120 _Strcoll 3 API calls 76078->76079 76082 14002eb3d 76079->76082 76080->76078 76081 1400b9fc5 76080->76081 76083 1400b9f0b GetFileAttributesExW 76080->76083 76109 1400ba23c CreateFileW __vcrt_getptd_noinit 76081->76109 76082->76041 76086 1400b9f70 76083->76086 76087 1400b9f1f __vcrt_getptd_noinit 76083->76087 76085 1400b9fe8 76088 1400ba0bb 76085->76088 76089 1400ba01d GetFileInformationByHandleEx 76085->76089 76100 1400b9fee ProcessCodePage 76085->76100 76086->76078 76086->76081 76087->76078 76091 1400b9f2e FindFirstFileW 76087->76091 76090 1400ba0d6 GetFileInformationByHandleEx 76088->76090 76088->76100 76092 1400ba05d 76089->76092 76097 1400ba037 __vcrt_getptd_noinit ProcessCodePage 76089->76097 76098 1400ba0ec __vcrt_getptd_noinit ProcessCodePage 76090->76098 76090->76100 76093 1400b9f4d FindClose 76091->76093 76105 1400b9f42 __vcrt_getptd_noinit 76091->76105 76092->76088 76094 1400ba07e GetFileInformationByHandleEx 76092->76094 76093->76086 76094->76088 76102 1400ba09a __vcrt_getptd_noinit ProcessCodePage 76094->76102 76095 1400ba17d 76110 140098174 36 API calls BuildCatchObjectHelperInternal 76095->76110 76101 1400ba18e 76097->76101 76097->76105 76098->76105 76106 1400ba188 76098->76106 76099 1400ba182 76111 140098174 36 API calls BuildCatchObjectHelperInternal 76099->76111 76100->76078 76100->76095 76100->76105 76113 140098174 36 API calls BuildCatchObjectHelperInternal 76101->76113 76102->76099 76102->76105 76105->76078 76112 140098174 36 API calls BuildCatchObjectHelperInternal 76106->76112 76109->76085 76115 1400a5264 _Getctype 36 API calls 76114->76115 76116 1400b9b21 76115->76116 76117 1400b9b2a AreFileApisANSI 76116->76117 76118 1400b9b37 76116->76118 76117->76118 76118->76052 76120->76053 76123 14002eaf0 43 API calls 76122->76123 76126 14007df5f __scrt_get_show_window_mode 76123->76126 76124 14007df97 76125 14007df9f 76124->76125 76177 14007e6af 76124->76177 76129 1400ad120 _Strcoll 3 API calls 76125->76129 76126->76124 76126->76125 76178 140049810 76126->76178 76128 14007e6c6 76239 14002cdc0 38 API calls 76128->76239 76130 14007e641 76129->76130 76130->76067 76130->76068 76132 14007dfde 76133 14007e435 76132->76133 76134 14007e041 76132->76134 76195 14005ecb0 76133->76195 76225 140088720 19 API calls 2 library calls 76134->76225 76140 14007e053 76226 1400888e0 47 API calls 6 library calls 76140->76226 76144 14007e6f0 76145 1400af748 Concurrency::cancel_current_task RaiseException 76144->76145 76148 14007e701 76145->76148 76146 14007e487 76150 14005ecb0 39 API calls 76146->76150 76147 14007e064 76151 14007e077 76147->76151 76152 14007e14c GetFileSize 76147->76152 76149 1400474a0 38 API calls 76149->76146 76154 14007e49a 76150->76154 76151->76128 76155 14007e0be ISource 76151->76155 76153 14007e18d 76152->76153 76158 14007e168 __scrt_get_show_window_mode 76152->76158 76153->76158 76161 140047d80 38 API calls 76153->76161 76214 14008c1f0 76154->76214 76227 1400402b0 37 API calls 76155->76227 76157 14007e1f2 SetFilePointer ReadFile 76168 14007e241 76157->76168 76171 14007e352 76157->76171 76158->76157 76160 14007e10f 76160->76125 76161->76157 76164 14007e2c4 ISource 76228 1400402b0 37 API calls 76164->76228 76166 14007e3a7 ISource 76229 1400402b0 37 API calls 76166->76229 76168->76128 76168->76164 76169 14007e55d 76236 1400402b0 37 API calls 76169->76236 76171->76128 76171->76166 76173 14007e65c 76237 14002cdc0 38 API calls 76173->76237 76175 14007e69e 76176 1400af748 Concurrency::cancel_current_task RaiseException 76175->76176 76176->76177 76238 14002e240 39 API calls Concurrency::cancel_current_task 76177->76238 76179 140043a70 55 API calls 76178->76179 76180 1400498c7 76179->76180 76240 14004b2b0 76180->76240 76185 14004991f 76251 1400424e0 36 API calls _Strcoll 76185->76251 76186 1400499a8 76193 140049958 76186->76193 76253 14002cdc0 38 API calls 76186->76253 76188 140049931 76252 1400467e0 51 API calls 4 library calls 76188->76252 76190 140049a12 76192 1400af748 Concurrency::cancel_current_task RaiseException 76190->76192 76194 140049a23 76192->76194 76193->76132 76196 14005ed0d 76195->76196 76198 14005edf3 76195->76198 76405 14005fad0 76196->76405 76453 14002cdc0 38 API calls 76198->76453 76199 14005ed32 76203 14005ed69 76199->76203 76443 14003f860 76199->76443 76200 14005edc0 76210 14005ebd0 76200->76210 76202 14005ee35 76204 1400af748 Concurrency::cancel_current_task RaiseException 76202->76204 76203->76200 76454 14002cdc0 38 API calls 76203->76454 76204->76203 76206 14005ee8e 76207 1400af748 Concurrency::cancel_current_task RaiseException 76206->76207 76208 14005eea2 76207->76208 76211 14005ec00 76210->76211 76212 14005fad0 38 API calls 76211->76212 76213 14005ec0f 76212->76213 76213->76146 76213->76149 76215 14008c24d 76214->76215 76217 14008c267 76214->76217 76215->76217 76224 14003fc60 38 API calls 76215->76224 76216 14008c30a 76221 14008c315 ISource 76216->76221 76568 1400435c0 38 API calls 4 library calls 76216->76568 76217->76216 76557 14008daf0 76217->76557 76220 1400ad120 _Strcoll 3 API calls 76223 14007e4fd 76220->76223 76221->76220 76222 14008c3d9 76221->76222 76223->76128 76230 1400425e0 76223->76230 76224->76217 76225->76140 76226->76147 76227->76160 76228->76160 76229->76160 76231 14004264a 76230->76231 76232 1400425fa 76230->76232 76231->76169 76231->76173 76233 1400423f0 36 API calls 76232->76233 76234 140042634 76233->76234 76575 1400920d8 37 API calls ProcessCodePage 76234->76575 76236->76125 76237->76175 76239->76144 76241 1400434c0 42 API calls 76240->76241 76242 1400498f4 76241->76242 76242->76186 76243 1400bb3e8 76242->76243 76244 1400bb42e 76243->76244 76246 140049916 76244->76246 76254 1400bcac0 76244->76254 76246->76185 76246->76186 76247 1400bb461 76247->76246 76271 1400966d4 36 API calls ProcessCodePage 76247->76271 76249 1400bb47c 76249->76246 76272 1400920d8 37 API calls ProcessCodePage 76249->76272 76251->76188 76252->76193 76253->76190 76255 1400bc9ec 76254->76255 76256 1400bca12 76255->76256 76258 1400bca45 76255->76258 76282 140093728 6 API calls _get_daylight 76256->76282 76260 1400bca4b 76258->76260 76261 1400bca58 76258->76261 76259 1400bca17 76283 140096af4 36 API calls _invalid_parameter_noinfo 76259->76283 76284 140093728 6 API calls _get_daylight 76260->76284 76273 14009bf68 76261->76273 76265 1400bca22 76265->76247 76266 1400bca62 76267 1400bca6c 76266->76267 76268 1400bca79 76266->76268 76285 140093728 6 API calls _get_daylight 76267->76285 76277 1400bdd3c 76268->76277 76271->76249 76272->76246 76274 14009bf7f 76273->76274 76286 14009bfdc 76274->76286 76276 14009bf8a 76276->76266 76296 1400bd99c 76277->76296 76280 1400bdd96 76280->76265 76282->76259 76283->76265 76284->76265 76285->76265 76288 14009c00d 76286->76288 76293 14009c093 76288->76293 76294 14009c2f0 6 API calls 3 library calls 76288->76294 76289 14009c069 76290 14009bc88 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 76289->76290 76291 14009c073 76290->76291 76291->76293 76295 14009ca90 FreeLibrary GetProcAddress InitializeCriticalSectionAndSpinCount __crtLCMapStringW 76291->76295 76293->76276 76294->76289 76295->76293 76301 1400bd9d7 __vcrt_InitializeCriticalSectionEx 76296->76301 76298 1400bdc75 76315 140096af4 36 API calls _invalid_parameter_noinfo 76298->76315 76300 1400bdba7 76300->76280 76308 1400bf308 76300->76308 76301->76301 76306 1400bdb9e 76301->76306 76311 1400aad6c 39 API calls 4 library calls 76301->76311 76303 1400bdc09 76303->76306 76312 1400aad6c 39 API calls 4 library calls 76303->76312 76305 1400bdc28 76305->76306 76313 1400aad6c 39 API calls 4 library calls 76305->76313 76306->76300 76314 140093728 6 API calls _get_daylight 76306->76314 76316 1400be7b8 76308->76316 76310 1400bf335 76310->76280 76311->76303 76312->76305 76313->76306 76314->76298 76315->76300 76317 1400be7cf 76316->76317 76318 1400be7ed 76316->76318 76367 140093728 6 API calls _get_daylight 76317->76367 76318->76317 76321 1400be809 76318->76321 76320 1400be7d4 76368 140096af4 36 API calls _invalid_parameter_noinfo 76320->76368 76325 1400bef18 76321->76325 76324 1400be7e0 76324->76310 76369 1400beafc 76325->76369 76327 1400bef5f 76328 1400bef8d 76327->76328 76329 1400befa5 76327->76329 76392 140093708 6 API calls _get_daylight 76328->76392 76385 1400a3f2c 76329->76385 76332 1400befaa 76333 1400befca CreateFileW 76332->76333 76334 1400befb1 76332->76334 76335 1400bf0b0 GetFileType 76333->76335 76336 1400bf035 76333->76336 76394 140093708 6 API calls _get_daylight 76334->76394 76339 1400bf10e 76335->76339 76340 1400bf0bd __vcrt_getptd_noinit 76335->76340 76342 1400bf043 CreateFileW 76336->76342 76343 1400bf07d __vcrt_getptd_noinit 76336->76343 76399 1400a3e44 7 API calls 2 library calls 76339->76399 76397 14009369c 6 API calls 2 library calls 76340->76397 76341 1400befb6 76395 140093728 6 API calls _get_daylight 76341->76395 76342->76335 76342->76343 76396 14009369c 6 API calls 2 library calls 76343->76396 76344 1400bef9e 76344->76324 76346 1400bef92 76393 140093728 6 API calls _get_daylight 76346->76393 76350 1400bf130 76351 1400bf184 76350->76351 76400 1400bed04 42 API calls 2 library calls 76350->76400 76357 1400bf18b 76351->76357 76402 1400be87c 41 API calls 2 library calls 76351->76402 76354 1400bf0cc ProcessCodePage 76354->76346 76398 140093728 6 API calls _get_daylight 76354->76398 76355 1400bf1c2 76355->76357 76358 1400bf1d1 76355->76358 76401 14009be00 37 API calls ProcessCodePage 76357->76401 76358->76344 76360 1400bf250 ProcessCodePage 76358->76360 76361 1400bf259 CreateFileW 76360->76361 76362 1400bf2c5 76361->76362 76363 1400bf297 __vcrt_getptd_noinit 76361->76363 76362->76344 76403 14009369c 6 API calls 2 library calls 76363->76403 76365 1400bf2a4 76404 1400a406c 7 API calls 2 library calls 76365->76404 76367->76320 76368->76324 76370 1400beb28 76369->76370 76375 1400beb42 76369->76375 76371 140093728 _get_daylight 6 API calls 76370->76371 76370->76375 76372 1400beb37 76371->76372 76373 140096af4 _invalid_parameter_noinfo 36 API calls 76372->76373 76373->76375 76374 1400bebc0 76376 1400bec11 76374->76376 76378 140093728 _get_daylight 6 API calls 76374->76378 76375->76374 76380 140093728 _get_daylight 6 API calls 76375->76380 76377 1400bc738 36 API calls 76376->76377 76384 1400bec6a 76376->76384 76377->76384 76379 1400bec06 76378->76379 76381 140096af4 _invalid_parameter_noinfo 36 API calls 76379->76381 76382 1400bebb5 76380->76382 76381->76376 76383 140096af4 _invalid_parameter_noinfo 36 API calls 76382->76383 76383->76374 76384->76327 76389 1400a3f4f 76385->76389 76386 1400a3f7d 76386->76332 76387 1400a3f78 76388 1400a3c7c 9 API calls 76387->76388 76388->76386 76389->76386 76389->76387 76390 1400a3fce EnterCriticalSection 76389->76390 76390->76386 76391 1400a3fdd LeaveCriticalSection 76390->76391 76391->76389 76392->76346 76393->76344 76394->76341 76395->76346 76396->76346 76397->76354 76398->76346 76399->76350 76400->76351 76401->76344 76402->76355 76403->76365 76404->76362 76406 14005fb10 76405->76406 76410 14005faed 76405->76410 76407 14005fb1e 76406->76407 76409 140049e10 38 API calls 76406->76409 76407->76199 76408 14005fb0a 76408->76199 76409->76407 76410->76408 76455 14002cdc0 38 API calls 76410->76455 76412 14005fb73 76413 1400af748 Concurrency::cancel_current_task RaiseException 76412->76413 76416 14005fb84 ISource 76413->76416 76414 14005fce5 76414->76199 76416->76414 76456 14005e540 38 API calls BuildCatchObjectHelperInternal 76416->76456 76417 14005fecc 76458 14005e540 38 API calls BuildCatchObjectHelperInternal 76417->76458 76420 14005fe99 76420->76417 76422 140060052 76420->76422 76457 140053cd0 38 API calls _Strcoll 76420->76457 76421 14005feef 76459 140053cd0 38 API calls _Strcoll 76421->76459 76424 14006007d 76422->76424 76463 14005e3d0 38 API calls 2 library calls 76422->76463 76435 1400600a6 ISource 76424->76435 76464 14005df50 38 API calls 2 library calls 76424->76464 76427 14005ff06 76428 14005ff3d 76427->76428 76427->76435 76441 14005ff69 76427->76441 76460 14005e3d0 38 API calls 2 library calls 76427->76460 76428->76441 76461 14005df50 38 API calls 2 library calls 76428->76461 76429 1400600b3 76431 1400600eb 76429->76431 76465 14005e3d0 38 API calls 2 library calls 76429->76465 76431->76435 76466 14005df50 38 API calls 2 library calls 76431->76466 76432 14005e3d0 38 API calls 76432->76441 76436 1400ad120 _Strcoll 3 API calls 76435->76436 76439 1400601ea 76435->76439 76438 1400601cf 76436->76438 76438->76199 76440 140053cd0 38 API calls 76440->76441 76441->76429 76441->76432 76441->76435 76441->76440 76462 14005df50 38 API calls 2 library calls 76441->76462 76444 14003f893 76443->76444 76452 14003f8eb 76444->76452 76467 1400423f0 76444->76467 76446 1400ad120 _Strcoll 3 API calls 76448 14003f959 76446->76448 76447 14003f8b6 76449 14003f8d6 76447->76449 76447->76452 76477 14009663c 76447->76477 76448->76203 76449->76452 76485 140095c34 76449->76485 76452->76446 76453->76202 76454->76206 76455->76412 76456->76420 76457->76420 76458->76421 76459->76427 76460->76428 76461->76441 76462->76441 76463->76424 76464->76435 76465->76431 76466->76435 76468 1400424c2 76467->76468 76469 140042413 76467->76469 76470 1400ad120 _Strcoll 3 API calls 76468->76470 76469->76468 76475 14004241d 76469->76475 76471 1400424d1 76470->76471 76471->76447 76472 140042461 76473 1400ad120 _Strcoll 3 API calls 76472->76473 76474 14004247e 76473->76474 76474->76447 76475->76472 76494 1400935b0 36 API calls ProcessCodePage 76475->76494 76478 14009666c 76477->76478 76495 1400963cc 76478->76495 76480 140096685 76483 1400966aa 76480->76483 76502 14008e124 36 API calls 3 library calls 76480->76502 76482 1400966bf 76482->76449 76483->76482 76503 14008e124 36 API calls 3 library calls 76483->76503 76486 140095c5d 76485->76486 76487 140095c48 76485->76487 76486->76487 76488 140095c62 76486->76488 76531 140093728 6 API calls _get_daylight 76487->76531 76523 14009eb34 76488->76523 76491 140095c4d 76532 140096af4 36 API calls _invalid_parameter_noinfo 76491->76532 76493 140095c58 76493->76452 76494->76472 76496 140096436 76495->76496 76497 1400963f6 76495->76497 76496->76497 76498 140096442 76496->76498 76510 140096a28 36 API calls _invalid_parameter_noinfo 76497->76510 76504 140096550 76498->76504 76501 14009641d 76501->76480 76502->76483 76503->76482 76505 140096595 76504->76505 76509 140096580 76504->76509 76511 140096468 76505->76511 76507 14009659f 76507->76509 76515 14008e7fc 76507->76515 76509->76501 76510->76501 76512 1400964eb 76511->76512 76513 140096482 76511->76513 76512->76507 76513->76512 76521 14009f8ac 36 API calls 2 library calls 76513->76521 76516 14008e822 76515->76516 76520 14008e853 76515->76520 76517 1400981cc _fread_nolock 36 API calls 76516->76517 76516->76520 76518 14008e843 76517->76518 76522 14009b6d8 36 API calls 2 library calls 76518->76522 76520->76509 76521->76512 76522->76520 76524 14009eb64 76523->76524 76533 14009e640 76524->76533 76526 14009eb7d 76527 14009eba3 76526->76527 76539 14008e124 36 API calls 3 library calls 76526->76539 76529 14009ebb8 76527->76529 76540 14008e124 36 API calls 3 library calls 76527->76540 76529->76493 76531->76491 76532->76493 76534 14009e65b 76533->76534 76536 14009e68a 76533->76536 76553 140096a28 36 API calls _invalid_parameter_noinfo 76534->76553 76541 14009e6ac 76536->76541 76538 14009e67b 76538->76526 76539->76527 76540->76529 76542 14009e6f0 76541->76542 76543 14009e6c7 76541->76543 76545 1400981cc _fread_nolock 36 API calls 76542->76545 76554 140096a28 36 API calls _invalid_parameter_noinfo 76543->76554 76546 14009e6f5 76545->76546 76547 14009e772 76546->76547 76548 14009e782 76546->76548 76550 14009e6e7 76546->76550 76555 14009e958 37 API calls 2 library calls 76547->76555 76548->76550 76556 14009e7fc 36 API calls _fread_nolock 76548->76556 76550->76538 76551 14009e780 76551->76550 76553->76538 76554->76550 76555->76551 76556->76550 76569 14008da20 76557->76569 76559 14008dd02 76559->76216 76561 14008dd3f 76574 14002b820 38 API calls 2 library calls 76561->76574 76563 14008da20 38 API calls 76564 14008db2c ISource BuildCatchObjectHelperInternal 76563->76564 76564->76559 76564->76561 76564->76563 76566 14008dd34 76564->76566 76567 1400ad148 38 API calls std::_Facet_Register 76564->76567 76565 14008dd45 76573 14002b8e0 38 API calls 76566->76573 76567->76564 76568->76221 76570 14008da36 76569->76570 76571 14008da53 76569->76571 76570->76571 76572 14003fc60 38 API calls 76570->76572 76571->76564 76572->76571 76574->76565 76575->76231 76576->76074 76577 14004b7de 76582 14004c3b0 76577->76582 76580 1400ad120 _Strcoll 3 API calls 76581 14004b81b 76580->76581 76584 14004c3d6 76582->76584 76583 14004c402 76586 14004d100 38 API calls 76583->76586 76584->76583 76588 140058eb0 38 API calls 4 library calls 76584->76588 76587 14004b7e6 76586->76587 76587->76580 76588->76583 76589 1400a3751 76601 1400aa7e4 76589->76601 76602 1400987ac _Getcoll 36 API calls 76601->76602 76603 1400aa7ed 76602->76603 76606 140098174 36 API calls BuildCatchObjectHelperInternal 76603->76606 76607 14006931b 76608 140069333 ISource 76607->76608 76609 140069415 ISource 76608->76609 76612 1400697d0 76608->76612 76610 1400ad120 _Strcoll 3 API calls 76609->76610 76611 140069443 76610->76611 76669 14007eea0 76612->76669 76614 14006983f __scrt_get_show_window_mode 76615 14006987e GetModuleFileNameW 76614->76615 76616 1400698c0 76615->76616 76616->76616 76617 140036490 38 API calls 76616->76617 76618 1400698dd 76617->76618 76619 140036490 38 API calls 76618->76619 76620 140069afe 76619->76620 76731 140036720 76620->76731 76622 140069b0c 76743 140044f90 39 API calls 76622->76743 76624 140069b26 76625 140036490 38 API calls 76624->76625 76626 140069d9d 76625->76626 76627 140036720 38 API calls 76626->76627 76628 140069dab 76627->76628 76744 140044f90 39 API calls 76628->76744 76630 140069dc6 76631 140036490 38 API calls 76630->76631 76632 14006a03e 76631->76632 76745 14002d4a0 38 API calls 76632->76745 76634 14006a05a 76746 140044f90 39 API calls 76634->76746 76636 14006a06f 76637 140036490 38 API calls 76636->76637 76638 14006a51d 76637->76638 76639 140036720 38 API calls 76638->76639 76640 14006a52e 76639->76640 76747 140044f90 39 API calls 76640->76747 76642 14006a54c 76643 140036490 38 API calls 76642->76643 76644 14006a7dd 76643->76644 76645 140036720 38 API calls 76644->76645 76646 14006a7ee 76645->76646 76748 140044f90 39 API calls 76646->76748 76648 14006a80c 76649 140036490 38 API calls 76648->76649 76650 14006aa90 76649->76650 76651 140036720 38 API calls 76650->76651 76652 14006aaa1 76651->76652 76749 140044f90 39 API calls 76652->76749 76654 14006aabf 76655 140036490 38 API calls 76654->76655 76656 14006acaa 76655->76656 76657 140036720 38 API calls 76656->76657 76658 14006acbb 76657->76658 76750 140044f90 39 API calls 76658->76750 76660 14006acd9 76661 140036490 38 API calls 76660->76661 76662 14006afef 76661->76662 76663 140036720 38 API calls 76662->76663 76664 14006b000 76663->76664 76751 140044f90 39 API calls 76664->76751 76666 14006b01e 76752 14002cf70 76666->76752 76670 14007ef33 76669->76670 76756 14002d810 76670->76756 76672 14007ef58 ISource 76673 14002eaf0 43 API calls 76672->76673 76676 14007f4a7 76672->76676 76674 14007efc4 __scrt_get_show_window_mode 76673->76674 76675 14007f006 76674->76675 76679 140049810 70 API calls 76674->76679 76675->76676 76721 14007f067 ISource 76675->76721 76799 14002e240 39 API calls Concurrency::cancel_current_task 76676->76799 76678 1400ad120 _Strcoll 3 API calls 76680 14007f099 76678->76680 76681 14007f0e9 76679->76681 76680->76614 76730 14007f370 76681->76730 76765 140044660 76681->76765 76682 14007f4cf 76800 14002cdc0 38 API calls 76682->76800 76686 14007f162 76690 14007f202 76686->76690 76691 14007f17f 76686->76691 76687 14007f4f6 76688 1400af748 Concurrency::cancel_current_task RaiseException 76687->76688 76689 14007f507 76688->76689 76801 14002cdc0 38 API calls 76689->76801 76772 14008ac60 76690->76772 76691->76682 76693 14007f1b1 76691->76693 76696 140040360 39 API calls 76693->76696 76694 14007f216 76701 14007f2b0 76694->76701 76702 14007f22d 76694->76702 76698 14007f1be 76696->76698 76697 14007f530 76699 1400af748 Concurrency::cancel_current_task RaiseException 76697->76699 76700 140042fb0 38 API calls 76698->76700 76711 14007f544 76699->76711 76703 14007f1de 76700->76703 76706 14008ac60 38 API calls 76701->76706 76702->76689 76704 14007f25f 76702->76704 76795 140034ac0 37 API calls 76703->76795 76787 140040360 76704->76787 76707 14007f2c4 76706->76707 76709 14008ac60 38 API calls 76707->76709 76712 14007f2d3 76709->76712 76802 14002cdc0 38 API calls 76711->76802 76715 140044780 38 API calls 76712->76715 76713 140042fb0 38 API calls 76716 14007f28c 76713->76716 76718 14007f2e3 76715->76718 76796 140034ac0 37 API calls 76716->76796 76717 14007f56e 76720 1400af748 Concurrency::cancel_current_task RaiseException 76717->76720 76718->76711 76723 140040360 39 API calls 76718->76723 76722 14007f582 76720->76722 76721->76678 76724 14007f323 76723->76724 76725 140041970 38 API calls 76724->76725 76726 14007f333 76725->76726 76727 140042fb0 38 API calls 76726->76727 76728 14007f362 76727->76728 76797 140034ac0 37 API calls 76728->76797 76730->76721 76798 1400402b0 37 API calls 76730->76798 76735 14003674e 76731->76735 76732 140036843 76998 14002b8e0 38 API calls 76732->76998 76735->76732 76737 14003676a BuildCatchObjectHelperInternal 76735->76737 76738 140036804 76735->76738 76739 1400367dd 76735->76739 76742 1400367ee 76735->76742 76737->76622 76740 1400ad148 std::_Facet_Register 38 API calls 76738->76740 76741 1400ad148 std::_Facet_Register 38 API calls 76739->76741 76739->76742 76740->76737 76741->76742 76742->76737 76997 14002b820 38 API calls 2 library calls 76742->76997 76743->76624 76744->76630 76745->76634 76746->76636 76747->76642 76748->76648 76749->76654 76750->76660 76751->76666 76753 14002cf8d 76752->76753 76754 1400af748 Concurrency::cancel_current_task RaiseException 76753->76754 76755 14002cf9e 76754->76755 76757 14002d850 76756->76757 76758 14002d97a 76757->76758 76762 14002d896 76757->76762 76759 140036720 38 API calls 76758->76759 76760 14002d982 76759->76760 76804 14002d140 76760->76804 76764 14002d8fa BuildCatchObjectHelperInternal 76762->76764 76803 14004db90 38 API calls 4 library calls 76762->76803 76764->76672 76766 1400427b0 38 API calls 76765->76766 76767 140044696 76766->76767 76827 14004dd00 76767->76827 76771 140044705 76771->76686 76773 14008acfe 76772->76773 76775 14008ac7f 76772->76775 76995 14008caf0 38 API calls 76773->76995 76778 14008acba 76775->76778 76993 14008cbb0 38 API calls 76775->76993 76776 14008ad18 76777 140046a00 38 API calls 76776->76777 76779 14008ad2b 76777->76779 76778->76694 76781 1400af748 Concurrency::cancel_current_task RaiseException 76779->76781 76783 14008ad3c 76781->76783 76782 14008acdf 76994 14008cc70 38 API calls 3 library calls 76782->76994 76785 14008aced 76786 1400af748 Concurrency::cancel_current_task RaiseException 76785->76786 76786->76773 76788 1400425e0 37 API calls 76787->76788 76790 140040372 76788->76790 76789 1400403a0 76789->76713 76790->76789 76996 14002cdc0 38 API calls 76790->76996 76792 1400403e6 76793 1400af748 Concurrency::cancel_current_task RaiseException 76792->76793 76794 1400403f7 76793->76794 76795->76721 76796->76721 76797->76730 76798->76675 76800->76687 76801->76697 76802->76717 76803->76764 76806 14002d15f 76804->76806 76805 14002d26b 76807 14002d297 76805->76807 76811 14002d2c0 76805->76811 76806->76805 76816 14002d24a 76806->76816 76808 14002d35e 76807->76808 76814 14002d2a7 76807->76814 76825 1400435a0 38 API calls 76808->76825 76811->76814 76819 140046f10 38 API calls 4 library calls 76811->76819 76812 14002d255 76812->76764 76820 140041590 76814->76820 76818 14002d9c0 38 API calls BuildCatchObjectHelperInternal 76816->76818 76818->76812 76819->76814 76821 1400415f3 76820->76821 76824 1400415af BuildCatchObjectHelperInternal 76820->76824 76826 140047200 38 API calls 4 library calls 76821->76826 76823 14004160c 76823->76812 76824->76812 76826->76823 76828 14004dd54 76827->76828 76829 14009320c 36 API calls 76828->76829 76830 14004de3a 76829->76830 76831 14004b500 38 API calls 76830->76831 76832 14004de61 76831->76832 76896 14002f1f0 76832->76896 76835 1400ad120 _Strcoll 3 API calls 76836 1400446f9 76835->76836 76837 140048e80 76836->76837 76838 140049191 76837->76838 76841 140048ecb __scrt_get_show_window_mode 76837->76841 76904 140050d10 76838->76904 76840 1400491c4 76842 14004b500 38 API calls 76840->76842 76963 14004a4b0 38 API calls 76841->76963 76846 1400491d0 76842->76846 76844 140048f1b 76964 14004fb20 38 API calls 2 library calls 76844->76964 76890 1400492d8 ISource 76846->76890 76971 14004a680 38 API calls ISource 76846->76971 76847 14004918c ISource 76852 1400ad120 _Strcoll 3 API calls 76847->76852 76848 140048f2b 76853 14004b500 38 API calls 76848->76853 76849 1400427b0 38 API calls 76850 14004938c 76849->76850 76854 140042fb0 38 API calls 76850->76854 76856 14004941c 76852->76856 76857 140048f37 76853->76857 76859 1400493c6 76854->76859 76855 14004921d 76972 1400509f0 38 API calls 4 library calls 76855->76972 76856->76771 76894 1400490c4 ISource 76857->76894 76965 14004a680 38 API calls ISource 76857->76965 76859->76847 76864 140049470 76859->76864 76860 140049243 76973 14004ac00 38 API calls _Strcoll 76860->76973 76861 140049125 76863 14004917f 76861->76863 76869 1400427b0 38 API calls 76861->76869 76862 1400490dd 76866 1400427b0 38 API calls 76862->76866 76970 14004a2d0 38 API calls ISource 76863->76970 76976 140042e50 37 API calls 76864->76976 76867 1400490f8 76866->76867 76876 140042fb0 38 API calls 76867->76876 76869->76867 76872 140048f83 76966 1400509f0 38 API calls 4 library calls 76872->76966 76873 140049488 76877 1400af748 Concurrency::cancel_current_task RaiseException 76873->76877 76876->76863 76891 140049498 76877->76891 76878 1400494b7 76883 1400af748 Concurrency::cancel_current_task RaiseException 76878->76883 76879 140048fa9 76967 14004ac00 38 API calls _Strcoll 76879->76967 76880 140049252 ISource 76880->76891 76893 1400494c7 76880->76893 76974 1400af090 7 API calls __std_exception_copy 76880->76974 76882 1400492ca 76975 1400af090 7 API calls __std_exception_copy 76882->76975 76883->76893 76886 140048fb9 76886->76864 76887 140048fce ISource 76886->76887 76887->76891 76968 1400af090 7 API calls __std_exception_copy 76887->76968 76889 140049039 76969 1400af090 7 API calls __std_exception_copy 76889->76969 76890->76849 76890->76859 76890->76864 76890->76893 76977 140042e50 37 API calls 76891->76977 76893->76771 76894->76861 76894->76862 76895 140049047 ISource 76895->76891 76895->76894 76897 14002f227 76896->76897 76898 14002f1fe 76896->76898 76897->76835 76898->76897 76903 14002cdc0 38 API calls 76898->76903 76900 14002f25e 76901 1400af748 Concurrency::cancel_current_task RaiseException 76900->76901 76902 14002f26f 76901->76902 76903->76900 76905 140050d8d 76904->76905 76906 14005195c 76904->76906 76978 14004a680 38 API calls ISource 76906->76978 76908 14005199c 76979 1400509f0 38 API calls 4 library calls 76908->76979 76910 1400519c2 76980 14004ac00 38 API calls _Strcoll 76910->76980 76912 1400519d2 76913 140051a3d 76912->76913 76914 1400519dd 76912->76914 76982 140042e50 37 API calls 76913->76982 76981 14002eec0 7 API calls __std_exception_destroy 76914->76981 76916 140051a49 76917 1400af748 Concurrency::cancel_current_task RaiseException 76916->76917 76919 140051a59 76917->76919 76983 140042e50 37 API calls 76919->76983 76921 140051a66 76922 1400af748 Concurrency::cancel_current_task RaiseException 76921->76922 76923 140051a76 76922->76923 76984 140042e50 37 API calls 76923->76984 76925 140051a83 76926 1400af748 Concurrency::cancel_current_task RaiseException 76925->76926 76928 140051a93 76926->76928 76927 1400519f1 76929 1400ad120 _Strcoll 3 API calls 76927->76929 76985 140053330 37 API calls 76928->76985 76930 140051a26 76929->76930 76930->76840 76932 140051aa0 76933 1400af748 Concurrency::cancel_current_task RaiseException 76932->76933 76934 140051ab0 76933->76934 76986 140042e50 37 API calls 76934->76986 76936 140051abd 76937 1400af748 Concurrency::cancel_current_task RaiseException 76936->76937 76938 140051acd 76937->76938 76987 140042e50 37 API calls 76938->76987 76940 140051ada 76941 1400af748 Concurrency::cancel_current_task RaiseException 76940->76941 76942 140051aea 76941->76942 76988 140042e50 37 API calls 76942->76988 76944 140051af7 76945 1400af748 Concurrency::cancel_current_task RaiseException 76944->76945 76946 140051b07 76945->76946 76989 140042e50 37 API calls 76946->76989 76948 140051b14 76949 1400af748 Concurrency::cancel_current_task RaiseException 76948->76949 76950 140051b24 76949->76950 76990 140042e50 37 API calls 76950->76990 76952 140051b31 76953 1400af748 Concurrency::cancel_current_task RaiseException 76952->76953 76954 140051b41 76953->76954 76991 140042e50 37 API calls 76954->76991 76956 140051b4e 76957 1400af748 Concurrency::cancel_current_task RaiseException 76956->76957 76958 140051b5e 76957->76958 76992 140042e50 37 API calls 76958->76992 76960 140051b6b 76961 1400af748 Concurrency::cancel_current_task RaiseException 76960->76961 76962 140051b7b 76961->76962 76962->76840 76962->76962 76963->76844 76964->76848 76965->76872 76966->76879 76967->76886 76968->76889 76969->76895 76970->76847 76971->76855 76972->76860 76973->76880 76974->76882 76975->76890 76976->76873 76977->76878 76978->76908 76979->76910 76980->76912 76981->76927 76982->76916 76983->76921 76984->76925 76985->76932 76986->76936 76987->76940 76988->76944 76989->76948 76990->76952 76991->76956 76992->76960 76993->76782 76994->76785 76995->76776 76996->76792 76997->76732

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object$DeleteMetricsSystem$CreateSelectStream_$CapsCompatibleCriticalDeviceReleaseSection$BitmapEnterLeaveReadResetSizeStream
                                                  • String ID:
                                                  • API String ID: 3214587331-3916222277
                                                  • Opcode ID: b8ad9de3582fef1955ac4035c1c75ac334f415ebc7e19910e4ff908aacfd4282
                                                  • Instruction ID: 8a9b4e0b064338a6d8d553899a54bca9af0a5e421b87f50a1b45792b9aa8e9a5
                                                  • Opcode Fuzzy Hash: b8ad9de3582fef1955ac4035c1c75ac334f415ebc7e19910e4ff908aacfd4282
                                                  • Instruction Fuzzy Hash: 91B11B72618BC086E761DB22E8543DEB7A5F789BC0F508615EA8E43B69DF3CC185CB10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Name$DevicesDisplayEnum$ComputerCurrentFileGlobalMemoryModuleProfileStatusUserValuewcsftime
                                                  • String ID: %d-%m-%Y, %H:%M:%S$computer_name$cpu$gpu$ram$system$time$timezone$user_name
                                                  • API String ID: 2509368203-1182675529
                                                  • Opcode ID: a46e5203c657c07eb4b7182e7fef379a7db23a876a87c17c3647340b6bfc226d
                                                  • Instruction ID: 0cfcea1034b7f9981394cb5387c0e5e44c922b0cc561fc60f0db12949e2aba7b
                                                  • Opcode Fuzzy Hash: a46e5203c657c07eb4b7182e7fef379a7db23a876a87c17c3647340b6bfc226d
                                                  • Instruction Fuzzy Hash: DDF26B73614BC085DB22CB26E8903DD77A1F799798F419616FB8D17BA9EB78C290C700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 535 14003c5e0-14003c6df LoadLibraryA 536 14003c6e5-14003caa0 GetProcAddress * 6 535->536 537 14003d5a0-14003d5aa 535->537 536->537 538 14003caa6-14003caa9 536->538 539 14003d5ac-14003d5ae 537->539 540 14003d5b9-14003d5bc 537->540 538->537 543 14003caaf-14003cab2 538->543 539->540 541 14003d5c7-14003d5f6 call 1400ad120 540->541 542 14003d5be-14003d5c1 FreeLibrary 540->542 542->541 543->537 545 14003cab8-14003cabb 543->545 545->537 548 14003cac1-14003cac4 545->548 548->537 549 14003caca-14003cacd 548->549 549->537 550 14003cad3-14003cae1 549->550 551 14003cae5-14003cae7 550->551 551->537 552 14003caed-14003caf9 551->552 552->537 553 14003caff-14003cb08 552->553 554 14003cb10-14003cb2b 553->554 556 14003cb31-14003cb4f 554->556 557 14003d587-14003d593 554->557 556->557 560 14003cb55-14003cb67 556->560 557->554 558 14003d599 557->558 558->537 561 14003d573-14003d582 560->561 562 14003cb6d 560->562 561->557 563 14003cb72-14003cbc3 call 1400ad148 562->563 568 14003ce42 563->568 569 14003cbc9-14003cbd0 563->569 571 14003ce44-14003ce4b 568->571 569->568 570 14003cbd6-14003cccf call 1400767f0 call 1400442d0 call 1400445a0 569->570 596 14003ccd0-14003ccd8 570->596 573 14003d0c1-14003d0fd 571->573 574 14003ce51-14003ce58 571->574 580 14003d103-14003d111 573->580 581 14003d397-14003d399 573->581 574->573 576 14003ce5e-14003cf4b call 1400767f0 call 1400442d0 call 1400445a0 574->576 608 14003cf52-14003cf5a 576->608 585 14003d117-14003d11e 580->585 586 14003d390-14003d393 580->586 587 14003d545-14003d55b call 14003f160 581->587 588 14003d39f-14003d4c8 call 1400475f0 call 1400408c0 call 1400475f0 call 1400408c0 call 140042fb0 call 1400ad148 call 1400640b0 581->588 585->586 594 14003d124-14003d218 call 1400767f0 call 1400442d0 call 1400445a0 585->594 586->581 592 14003d395 586->592 603 14003d561-14003d56c 587->603 604 14003cb70 587->604 678 14003d4d4-14003d4e7 call 1400427b0 588->678 679 14003d4ca-14003d4cc 588->679 592->581 625 14003d220-14003d227 594->625 596->596 601 14003ccda-14003cd34 call 1400475f0 call 140045b00 call 140042fb0 596->601 631 14003cd67-14003cd91 601->631 632 14003cd36-14003cd47 601->632 603->561 604->563 608->608 612 14003cf5c-14003cfb5 call 1400475f0 call 140045b00 call 140042fb0 608->612 648 14003cfe8-14003d012 612->648 649 14003cfb7-14003cfc8 612->649 625->625 629 14003d229-14003d282 call 1400475f0 call 140045b00 call 140042fb0 625->629 689 14003d284-14003d295 629->689 690 14003d2b5-14003d2de 629->690 640 14003cd93-14003cda7 631->640 641 14003cdc9-14003cdef 631->641 636 14003cd62 call 1400ad140 632->636 637 14003cd49-14003cd5c 632->637 636->631 637->636 646 14003d651-14003d656 call 140096b14 637->646 651 14003cdc2-14003cdc7 call 1400ad140 640->651 652 14003cda9-14003cdbc 640->652 644 14003cdf1-14003ce05 641->644 645 14003ce27-14003ce40 641->645 659 14003ce07-14003ce1a 644->659 660 14003ce20-14003ce25 call 1400ad140 644->660 645->571 653 14003d657-14003d65c call 140096b14 646->653 655 14003d014-14003d028 648->655 656 14003d04a-14003d070 648->656 661 14003cfe3 call 1400ad140 649->661 662 14003cfca-14003cfdd 649->662 651->641 652->651 652->653 669 14003d65d-14003d662 call 140096b14 653->669 665 14003d043-14003d048 call 1400ad140 655->665 666 14003d02a-14003d03d 655->666 671 14003d072-14003d086 656->671 672 14003d0a8-14003d0ba 656->672 659->660 659->669 660->645 661->648 662->661 674 14003d663-14003d668 call 140096b14 662->674 665->656 666->665 680 14003d669-14003d66e call 140096b14 666->680 669->674 682 14003d0a1-14003d0a6 call 1400ad140 671->682 683 14003d088-14003d09b 671->683 672->573 674->680 703 14003d4eb-14003d4f7 678->703 691 14003d4d2 679->691 692 14003d5fd-14003d64a call 140042970 call 140046930 call 140046a00 call 1400af748 679->692 695 14003d66f-14003d674 call 140096b14 680->695 682->672 683->682 683->695 700 14003d297-14003d2aa 689->700 701 14003d2b0 call 1400ad140 689->701 704 14003d314-14003d33a 690->704 705 14003d2e0-14003d2f4 690->705 691->703 731 14003d64b-14003d650 call 140096b14 692->731 709 14003d675-14003d67a call 140096b14 695->709 700->701 700->709 701->690 714 14003d4f9-14003d51c 703->714 715 14003d51e-14003d528 call 14004f510 703->715 717 14003d33c-14003d350 704->717 718 14003d370-14003d389 704->718 712 14003d2f6-14003d309 705->712 713 14003d30f call 1400ad140 705->713 712->713 720 14003d5f7-14003d5fc call 140096b14 712->720 713->704 722 14003d52d-14003d53e call 140042fb0 714->722 715->722 725 14003d352-14003d365 717->725 726 14003d36b call 1400ad140 717->726 718->586 720->692 722->587 725->726 725->731 726->718 731->646
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Library$FreeLoad
                                                  • String ID: cannot use push_back() with $system$vault
                                                  • API String ID: 2449869053-1741236777
                                                  • Opcode ID: 0d948670e934948f9399bcc25d98691fce76d742d32ec229edf0addd9f7a4c44
                                                  • Instruction ID: 2ec4e2a7ae8c91d38f5a8356c21f69af9047b71e87f6ad347462173074feb4f2
                                                  • Opcode Fuzzy Hash: 0d948670e934948f9399bcc25d98691fce76d742d32ec229edf0addd9f7a4c44
                                                  • Instruction Fuzzy Hash: 3F925E72205BC489DB628F26E8843DE77B4F749798F104216EB9D4BBA9EF74C694C300

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$Exit$MutexOpenToken$CloseCreateCurrentFileHandleInformationInitializeModuleName
                                                  • String ID: SeDebugPrivilege$SeImpersonatePrivilege
                                                  • API String ID: 4279366119-3768118664
                                                  • Opcode ID: c15579a596aae32c568705457757ddd2bb20bc35d715638889c75400a0ff4399
                                                  • Instruction ID: 962da8f413caa45279bf650923a9d6b93aba050168666a2f2076e0c646855bcd
                                                  • Opcode Fuzzy Hash: c15579a596aae32c568705457757ddd2bb20bc35d715638889c75400a0ff4399
                                                  • Instruction Fuzzy Hash: AF619F72218A8581EA26AB66E4553EEA391FBCD7C4F505615F78E43AF6EF3CC040CB11
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: content$directory_iterator::directory_iterator$exists$filename$status
                                                  • API String ID: 3677997916-3429737954
                                                  • Opcode ID: 175320917f964c83a506369eff2fb3a54cecadb9ef131e354b589dabf4103beb
                                                  • Instruction ID: 23406d12f56c9c9c5856e535017d7a69c74f1142575ed8a38387d0c1f75b00f7
                                                  • Opcode Fuzzy Hash: 175320917f964c83a506369eff2fb3a54cecadb9ef131e354b589dabf4103beb
                                                  • Instruction Fuzzy Hash: 81E25F72614BC08AEB62DF35D8803DD73A5F789798F505216EB9D4BAA9EF74C684C300

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1433 140032ca0-140032d72 1434 140032d75-140032d7c 1433->1434 1434->1434 1435 140032d7e-140032efe call 1400475f0 1434->1435 1438 140032f01-140032f09 1435->1438 1438->1438 1439 140032f0b-140032f93 call 1400475f0 1438->1439 1442 140032f96-140032f9e 1439->1442 1442->1442 1443 140032fa0-14003302a call 1400475f0 RegOpenKeyExA 1442->1443 1446 140033030-140033072 RegQueryValueExA 1443->1446 1447 1400330ee-1400330f5 1443->1447 1446->1447 1448 140033074-1400330b2 call 1400475f0 call 1400418a0 1446->1448 1449 1400330f7 RegCloseKey 1447->1449 1450 1400330fd-140033168 call 140054b20 1447->1450 1466 1400330b4-1400330c5 1448->1466 1467 1400330e5-1400330ea 1448->1467 1449->1450 1455 14003319c-1400331af 1450->1455 1456 14003316a-14003317c 1450->1456 1460 1400331b5-1400331f5 call 14002eaf0 1455->1460 1461 14003382b-140033836 1455->1461 1458 140033197 call 1400ad140 1456->1458 1459 14003317e-140033191 1456->1459 1458->1455 1459->1458 1463 1400339d1-1400339d6 call 140096b14 1459->1463 1485 1400339a7-1400339a9 1460->1485 1486 1400331fb-1400331fe 1460->1486 1468 140033838-14003384e 1461->1468 1469 14003386e-140033890 1461->1469 1489 1400339d7-1400339e9 call 14002e1d0 1463->1489 1474 1400330c7-1400330da 1466->1474 1475 1400330e0 call 1400ad140 1466->1475 1467->1447 1476 140033869 call 1400ad140 1468->1476 1477 140033850-140033863 1468->1477 1471 140033892-1400338a6 1469->1471 1472 1400338c6-1400338e0 1469->1472 1481 1400338c1 call 1400ad140 1471->1481 1482 1400338a8-1400338bb 1471->1482 1483 1400338e2-1400338f6 1472->1483 1484 140033916-140033930 1472->1484 1474->1475 1487 1400339cb-1400339d0 call 140096b14 1474->1487 1475->1467 1476->1469 1477->1476 1478 1400339f0-1400339f5 call 140096b14 1477->1478 1516 1400339f6-140033a05 call 14002e1d0 1478->1516 1481->1472 1482->1481 1490 140033a1e-140033a23 call 140096b14 1482->1490 1495 140033911 call 1400ad140 1483->1495 1496 1400338f8-14003390b 1483->1496 1498 140033962-1400339a6 call 1400ad120 1484->1498 1499 140033932-140033946 1484->1499 1491 1400339b6-1400339ca call 14002e240 1485->1491 1492 1400339ab 1485->1492 1486->1461 1497 140033204-14003322b call 14002d020 1486->1497 1487->1463 1521 1400339ea-1400339ef call 140096b14 1489->1521 1505 140033a24-140033a29 call 140096b14 1490->1505 1491->1487 1492->1461 1495->1484 1496->1495 1496->1505 1524 14003329c-140033305 call 140036490 call 140044100 1497->1524 1525 14003322d 1497->1525 1509 140033948-14003395b 1499->1509 1510 14003395d call 1400ad140 1499->1510 1509->1510 1520 1400339b0-1400339b5 call 140096b14 1509->1520 1510->1498 1535 140033a06-140033a0b call 140096b14 1516->1535 1520->1491 1521->1478 1524->1489 1544 14003330b-14003331a 1524->1544 1531 140033230-140033237 1525->1531 1532 140033239-14003323d 1531->1532 1533 14003323f-140033246 1531->1533 1532->1533 1538 140033248-14003324b 1532->1538 1533->1531 1533->1538 1543 140033a0c-140033a11 call 140096b14 1535->1543 1538->1524 1542 14003324d 1538->1542 1545 140033250-14003325c 1542->1545 1558 140033a12-140033a17 call 140096b14 1543->1558 1547 140033352-140033382 1544->1547 1548 14003331c-140033332 1544->1548 1549 14003326e-140033271 1545->1549 1550 14003325e-140033262 1545->1550 1555 140033384-140033388 1547->1555 1556 14003338c-1400333cb call 14002e8c0 1547->1556 1552 140033334-140033347 1548->1552 1553 14003334d call 1400ad140 1548->1553 1549->1524 1557 140033273-140033277 1549->1557 1550->1549 1554 140033264-14003326a 1550->1554 1552->1521 1552->1553 1553->1547 1554->1545 1560 14003326c 1554->1560 1555->1556 1568 1400333da-140033404 call 14002e9a0 1556->1568 1569 1400333cd-1400333d6 1556->1569 1562 140033280-14003328c 1557->1562 1570 140033a18-140033a1d call 14002cf70 1558->1570 1560->1524 1565 140033294-14003329a 1562->1565 1566 14003328e-140033292 1562->1566 1565->1524 1565->1562 1566->1524 1566->1565 1574 14003340a 1568->1574 1575 140033789-140033793 1568->1575 1569->1568 1570->1490 1577 140033410-140033431 call 14002eaf0 1574->1577 1578 140033795-14003379f 1575->1578 1579 1400337bf-1400337c9 1575->1579 1587 140033433-14003343b 1577->1587 1588 140033441-140033444 1577->1588 1578->1579 1581 1400337a1-1400337b3 1578->1581 1582 1400337f5-1400337fc 1579->1582 1583 1400337cb-1400337d5 1579->1583 1581->1579 1594 1400337b5-1400337be 1581->1594 1582->1461 1585 1400337fe-140033808 1582->1585 1583->1582 1586 1400337d7-1400337e9 1583->1586 1585->1461 1589 14003380a-14003381e 1585->1589 1586->1582 1595 1400337eb-1400337f4 1586->1595 1587->1516 1587->1588 1592 14003344a-140033461 call 14007e7e0 1588->1592 1593 140033769-140033783 call 14002e7b0 1588->1593 1589->1461 1601 140033820-14003382a 1589->1601 1604 140033467-1400334b0 call 140042a00 call 14002d4e0 call 14002d370 1592->1604 1605 14003375d-140033764 call 14002f380 1592->1605 1593->1575 1593->1577 1594->1579 1595->1582 1601->1461 1614 1400334b2 1604->1614 1615 1400334b5-140033554 call 1400442d0 call 1400445a0 call 1400475f0 call 1400408c0 call 140042fb0 1604->1615 1605->1593 1614->1615 1626 140033587-14003359f 1615->1626 1627 140033556-140033567 1615->1627 1628 1400335d2-1400335ea 1626->1628 1629 1400335a1-1400335b2 1626->1629 1630 140033582 call 1400ad140 1627->1630 1631 140033569-14003357c 1627->1631 1634 140033622-140033643 1628->1634 1635 1400335ec-140033602 1628->1635 1632 1400335b4-1400335c7 1629->1632 1633 1400335cd call 1400ad140 1629->1633 1630->1626 1631->1535 1631->1630 1632->1543 1632->1633 1633->1628 1634->1570 1640 140033649-14003375c call 14005c490 call 1400475f0 call 1400408c0 call 140042fb0 call 140041970 call 1400408c0 call 140041970 call 1400408c0 call 140040760 call 140042fb0 1634->1640 1638 140033604-140033617 1635->1638 1639 14003361d call 1400ad140 1635->1639 1638->1558 1638->1639 1639->1634 1640->1605
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: content$directory_iterator::directory_iterator$exists$filename$status
                                                  • API String ID: 3677997916-3429737954
                                                  • Opcode ID: bd29fab57e6ba89ddd447dda21f70310d0c0f8bbbc31d0296f751e6485ff42c4
                                                  • Instruction ID: 62805d46291fcd4fccf0c70bfe2eedc485df16924868f35b375ef2d556690b27
                                                  • Opcode Fuzzy Hash: bd29fab57e6ba89ddd447dda21f70310d0c0f8bbbc31d0296f751e6485ff42c4
                                                  • Instruction Fuzzy Hash: FB825C72611BC48AEB228F36D8803DE73A1F789798F505216EB9D57BA9EF74C584C300

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1662 1400a16fc-1400a1737 call 1400a0d98 call 1400a0da0 call 1400a0e08 1669 1400a173d-1400a1748 call 1400a0da8 1662->1669 1670 1400a1961-1400a19ad call 140096b44 call 1400a0d98 call 1400a0da0 call 1400a0e08 1662->1670 1669->1670 1676 1400a174e-1400a1758 1669->1676 1696 1400a1aeb-1400a1b59 call 140096b44 call 1400aa344 1670->1696 1697 1400a19b3-1400a19be call 1400a0da8 1670->1697 1678 1400a177a-1400a177e 1676->1678 1679 1400a175a-1400a175d 1676->1679 1682 1400a1781-1400a1789 1678->1682 1681 1400a1760-1400a176b 1679->1681 1684 1400a176d-1400a1774 1681->1684 1685 1400a1776-1400a1778 1681->1685 1682->1682 1686 1400a178b-1400a179e call 14009d17c 1682->1686 1684->1681 1684->1685 1685->1678 1688 1400a17a7-1400a17b5 1685->1688 1693 1400a17a0-1400a17a2 call 14009bc88 1686->1693 1694 1400a17b6-1400a17c2 call 14009bc88 1686->1694 1693->1688 1703 1400a17c9-1400a17d1 1694->1703 1715 1400a1b5b-1400a1b62 1696->1715 1716 1400a1b67-1400a1b6a 1696->1716 1697->1696 1705 1400a19c4-1400a19cf call 1400a0dd8 1697->1705 1703->1703 1706 1400a17d3-1400a17e4 call 1400a6898 1703->1706 1705->1696 1717 1400a19d5-1400a19f8 call 14009bc88 GetTimeZoneInformation 1705->1717 1706->1670 1714 1400a17ea-1400a1840 call 1400bff10 * 4 call 1400a1618 1706->1714 1774 1400a1842-1400a1846 1714->1774 1719 1400a1bf7-1400a1bfa 1715->1719 1720 1400a1b6c 1716->1720 1721 1400a1ba1-1400a1bb4 call 14009d17c 1716->1721 1728 1400a1ac0-1400a1aea call 1400a0d90 call 1400a0d80 call 1400a0d88 1717->1728 1729 1400a19fe-1400a1a1f 1717->1729 1726 1400a1b6f 1719->1726 1727 1400a1c00-1400a1c08 call 1400a16fc 1719->1727 1720->1726 1737 1400a1bbf-1400a1bda call 1400aa344 1721->1737 1738 1400a1bb6 1721->1738 1733 1400a1b74-1400a1ba0 call 14009bc88 call 1400ad120 1726->1733 1734 1400a1b6f call 1400a1978 1726->1734 1727->1733 1735 1400a1a2a-1400a1a31 1729->1735 1736 1400a1a21-1400a1a27 1729->1736 1734->1733 1743 1400a1a33-1400a1a3b 1735->1743 1744 1400a1a45 1735->1744 1736->1735 1762 1400a1bdc-1400a1bdf 1737->1762 1763 1400a1be1-1400a1bf3 call 14009bc88 1737->1763 1745 1400a1bb8-1400a1bbd call 14009bc88 1738->1745 1743->1744 1750 1400a1a3d-1400a1a43 1743->1750 1754 1400a1a47-1400a1abb call 1400bff10 * 4 call 1400a5264 call 1400a1c10 * 2 1744->1754 1745->1720 1750->1754 1754->1728 1762->1745 1763->1719 1776 1400a184c-1400a1850 1774->1776 1777 1400a1848 1774->1777 1776->1774 1779 1400a1852-1400a1877 call 140092e10 1776->1779 1777->1776 1785 1400a187a-1400a187e 1779->1785 1787 1400a1880-1400a188b 1785->1787 1788 1400a188d-1400a1891 1785->1788 1787->1788 1790 1400a1893-1400a1897 1787->1790 1788->1785 1793 1400a1899-1400a18c1 call 140092e10 1790->1793 1794 1400a1918-1400a191c 1790->1794 1802 1400a18df-1400a18e3 1793->1802 1803 1400a18c3 1793->1803 1795 1400a191e-1400a1920 1794->1795 1796 1400a1923-1400a1930 1794->1796 1795->1796 1798 1400a194b-1400a195a call 1400a0d90 call 1400a0d80 1796->1798 1799 1400a1932-1400a1948 call 1400a1618 1796->1799 1798->1670 1799->1798 1802->1794 1808 1400a18e5-1400a1903 call 140092e10 1802->1808 1806 1400a18c6-1400a18cd 1803->1806 1806->1802 1809 1400a18cf-1400a18dd 1806->1809 1814 1400a190f-1400a1916 1808->1814 1809->1802 1809->1806 1814->1794 1815 1400a1905-1400a1909 1814->1815 1815->1794 1816 1400a190b 1815->1816 1816->1814
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _get_daylight$_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                  • String ID: Eastern Standard Time$Eastern Summer Time
                                                  • API String ID: 355007559-239921721
                                                  • Opcode ID: f970efac1f66613c336eacff4caa9cfbe84d0ab26aa53302a62d3075d5a24a6d
                                                  • Instruction ID: 0e2af64cfaed83a3ab014c0441055b0818baa83ef077c612d66b586912d86e0e
                                                  • Opcode Fuzzy Hash: f970efac1f66613c336eacff4caa9cfbe84d0ab26aa53302a62d3075d5a24a6d
                                                  • Instruction Fuzzy Hash: 40D1E43670064086E762EF67E8513E967A1F7ACBD4F448225FF4947AE5DB38D481CB40

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1817 1400840a0-14008423e 1818 140084240-140084247 1817->1818 1818->1818 1819 140084249-14008427c call 1400475f0 InternetOpenA 1818->1819 1822 140084282-140084298 1819->1822 1823 140084315-14008432c 1819->1823 1826 1400842a0-1400842a8 1822->1826 1824 14008432e 1823->1824 1825 140084331-140084358 InternetOpenUrlA 1823->1825 1824->1825 1827 140084389-1400843b4 HttpQueryInfoW 1825->1827 1828 14008435a-140084384 1825->1828 1829 1400842aa-1400842bb 1826->1829 1830 1400842db-140084314 call 1400ad120 1826->1830 1831 1400843ef-14008444a HttpQueryInfoW 1827->1831 1832 1400843b6-1400843ea 1827->1832 1828->1826 1833 1400842bd-1400842d0 1829->1833 1834 1400842d6 call 1400ad140 1829->1834 1839 14008444c-140084462 call 140092e10 1831->1839 1840 140084478-14008448e InternetQueryDataAvailable 1831->1840 1832->1831 1833->1834 1837 140084715-14008471a call 140096b14 1833->1837 1834->1830 1851 14008471b-140084720 call 14002b820 1837->1851 1839->1840 1850 140084464-140084473 call 1400474a0 1839->1850 1843 140084673-1400846c6 InternetCloseHandle 1840->1843 1844 140084494-140084499 1840->1844 1854 1400846cf-1400846d8 1843->1854 1849 1400844a0-1400844a6 1844->1849 1849->1843 1852 1400844ac-1400844c6 1849->1852 1850->1840 1857 140084539-140084551 InternetReadFile 1852->1857 1858 1400844c8-1400844ce 1852->1858 1854->1830 1859 1400846de-1400846ef 1854->1859 1861 14008462d-140084634 1857->1861 1862 140084557-14008455c 1857->1862 1864 1400844fc-1400844ff call 1400ad148 1858->1864 1865 1400844d0-1400844d7 1858->1865 1859->1834 1866 1400846f5-140084708 1859->1866 1861->1843 1869 140084636-140084647 1861->1869 1862->1861 1868 140084562-14008456d 1862->1868 1872 140084504-140084534 call 1400bff10 1864->1872 1865->1851 1870 1400844dd-1400844e8 call 1400ad148 1865->1870 1866->1837 1867 14008470a 1866->1867 1867->1834 1873 14008459f-1400845b9 call 140047f30 1868->1873 1874 14008456f-14008459d call 1400bf870 1868->1874 1875 140084649-14008465c 1869->1875 1876 140084662-14008466f call 1400ad140 1869->1876 1880 14008470f-140084714 call 140096b14 1870->1880 1889 1400844ee-1400844fa 1870->1889 1872->1857 1891 1400845ba-1400845c1 1873->1891 1874->1891 1875->1876 1875->1880 1876->1843 1880->1837 1889->1872 1892 1400845c3-1400845d4 1891->1892 1893 140084604 1891->1893 1895 1400845ef-140084602 call 1400ad140 1892->1895 1896 1400845d6-1400845e9 1892->1896 1894 140084606-14008461c InternetQueryDataAvailable 1893->1894 1894->1843 1898 14008461e-140084628 1894->1898 1895->1894 1896->1880 1896->1895 1898->1849
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$Query$AvailableDataHttpInfoOpen$CloseConcurrency::cancel_current_taskFileHandleRead
                                                  • String ID:
                                                  • API String ID: 1475545111-0
                                                  • Opcode ID: 5564f8b7e3b8cda5b9e7844f531143998aac2b6f73e955ce09d41620cba67f2b
                                                  • Instruction ID: f0be8985bf0e26381fb0b58506fa69bef840138c90a8d4bbed39db66bf6f3b00
                                                  • Opcode Fuzzy Hash: 5564f8b7e3b8cda5b9e7844f531143998aac2b6f73e955ce09d41620cba67f2b
                                                  • Instruction Fuzzy Hash: 27024933A14B9486EB11CB6AE84039E77A5F7997D8F104215FF9857BA9EF78C190C700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1900 1400bef18-1400bef8b call 1400beafc 1903 1400bef8d-1400bef96 call 140093708 1900->1903 1904 1400befa5-1400befaf call 1400a3f2c 1900->1904 1909 1400bef99-1400befa0 call 140093728 1903->1909 1910 1400befca-1400bf033 CreateFileW 1904->1910 1911 1400befb1-1400befc8 call 140093708 call 140093728 1904->1911 1926 1400bf2e6-1400bf306 1909->1926 1912 1400bf0b0-1400bf0bb GetFileType 1910->1912 1913 1400bf035-1400bf03b 1910->1913 1911->1909 1919 1400bf10e-1400bf115 1912->1919 1920 1400bf0bd-1400bf0f8 call 1400d3168 call 14009369c call 1400d3140 1912->1920 1916 1400bf07d-1400bf0ab call 1400d3168 call 14009369c 1913->1916 1917 1400bf03d-1400bf041 1913->1917 1916->1909 1917->1916 1922 1400bf043-1400bf07b CreateFileW 1917->1922 1924 1400bf11d-1400bf120 1919->1924 1925 1400bf117-1400bf11b 1919->1925 1920->1909 1946 1400bf0fe-1400bf109 call 140093728 1920->1946 1922->1912 1922->1916 1930 1400bf126-1400bf17b call 1400a3e44 1924->1930 1931 1400bf122 1924->1931 1925->1930 1940 1400bf19a-1400bf1cb call 1400be87c 1930->1940 1941 1400bf17d-1400bf189 call 1400bed04 1930->1941 1931->1930 1950 1400bf1cd-1400bf1cf 1940->1950 1951 1400bf1d1-1400bf213 1940->1951 1941->1940 1952 1400bf18b 1941->1952 1946->1909 1954 1400bf18d-1400bf195 call 14009be00 1950->1954 1955 1400bf235-1400bf240 1951->1955 1956 1400bf215-1400bf219 1951->1956 1952->1954 1954->1926 1959 1400bf2e4 1955->1959 1960 1400bf246-1400bf24a 1955->1960 1956->1955 1958 1400bf21b-1400bf230 1956->1958 1958->1955 1959->1926 1960->1959 1962 1400bf250-1400bf295 call 1400d3140 CreateFileW 1960->1962 1965 1400bf2ca-1400bf2df 1962->1965 1966 1400bf297-1400bf2c5 call 1400d3168 call 14009369c call 1400a406c 1962->1966 1965->1959 1966->1965
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                  • String ID:
                                                  • API String ID: 1617910340-0
                                                  • Opcode ID: ad973e6908b5c5e029224e3ab01ca94b19cb4adaabd133e22d80478e6497b413
                                                  • Instruction ID: 320eb96e718149e4e7e60864c9bbf8eacca92e1ca184eaa25a96958780752bf2
                                                  • Opcode Fuzzy Hash: ad973e6908b5c5e029224e3ab01ca94b19cb4adaabd133e22d80478e6497b413
                                                  • Instruction Fuzzy Hash: 41C1AB76720A418AEB11CFAAC4917EC37B1E74DBE8F115615EB2A9B7A5CB38C452C700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1973 140065250-1400658ee call 14002d4e0 call 14002d370 1981 1400658f0-1400658f7 1973->1981 1981->1981 1982 1400658f9-1400698b7 call 140054b20 call 14002d810 call 14002eaf0 call 14002e240 call 140096b14 * 3 call 14002e1d0 call 140096b14 call 140042970 call 140046930 call 140046a00 call 1400af748 call 140096b14 * 2 call 14002cf70 call 14002e0c0 call 14002e1d0 call 14002e240 call 140096b14 call 14002e1d0 * 2 call 140096b14 call 140042970 call 140046930 call 140046a00 call 1400af748 call 140096b14 call 14002e0c0 call 14002cf70 call 140096b14 call 14002e240 call 140096b14 * 3 call 14002e1d0 call 140096b14 call 140042970 call 140046930 call 140046a00 call 1400af748 call 140096b14 * 2 call 14002cf70 call 14002e0c0 call 14002e1d0 call 14002e240 call 14002e1d0 * 4 call 14002cf70 call 14002e1d0 * 3 call 14002cf70 call 140096b14 * 3 call 14007eea0 call 1400bff10 GetModuleFileNameW 1981->1982 2112 1400698c0-1400698c9 1982->2112 2112->2112 2113 1400698cb-140069ade call 140036490 2112->2113 2116 140069ae1-140069aea 2113->2116 2116->2116 2117 140069aec-140069d7d call 140036490 call 140036720 call 140044f90 2116->2117 2127 140069d80-140069d89 2117->2127 2127->2127 2128 140069d8b-14006a01e call 140036490 call 140036720 call 140044f90 2127->2128 2138 14006a021-14006a02a 2128->2138 2138->2138 2139 14006a02c-14006a500 call 140036490 call 14002d4a0 call 140044f90 2138->2139 2152 14006a503-14006a50c 2139->2152 2152->2152 2153 14006a50e-14006a7bd call 140036490 call 140036720 call 140044f90 2152->2153 2163 14006a7c0-14006a7c9 2153->2163 2163->2163 2164 14006a7cb-14006aa70 call 140036490 call 140036720 call 140044f90 2163->2164 2174 14006aa73-14006aa7c 2164->2174 2174->2174 2175 14006aa7e-14006ac8b call 140036490 call 140036720 call 140044f90 2174->2175 2185 14006ac90-14006ac99 2175->2185 2185->2185 2186 14006ac9b-14006afc7 call 140036490 call 140036720 call 140044f90 2185->2186 2196 14006afd0-14006afd8 2186->2196 2196->2196 2197 14006afda-14006b226 call 140036490 call 140036720 call 140044f90 call 14002cf70 call 140064c70 2196->2197
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_fs_convert_wide_to_narrow$__std_fs_code_page
                                                  • String ID: cannot use push_back() with $directory_iterator::directory_iterator$exists$recursive_directory_iterator::operator++$recursive_directory_iterator::recursive_directory_iterator$status
                                                  • API String ID: 3645842244-1862120484
                                                  • Opcode ID: faa1d1145ba5e556b848c73fd33eef50efad81b8938a0009e7cdda006ddcc96c
                                                  • Instruction ID: 031dd4974e96f4dd573688d53c9078fa1c6111530a30c886699dc0fc79c76709
                                                  • Opcode Fuzzy Hash: faa1d1145ba5e556b848c73fd33eef50efad81b8938a0009e7cdda006ddcc96c
                                                  • Instruction Fuzzy Hash: FED21272519BC885D6718B1AF88139BB3A1F79D784F505229EBCD53B69EB7CC290CB00

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2211 1400320b0-140032182 2212 140032185-14003218c 2211->2212 2212->2212 2213 14003218e-1400322ea call 1400475f0 2212->2213 2216 1400322f0-1400322f8 2213->2216 2216->2216 2217 1400322fa-140032378 call 1400475f0 2216->2217 2220 140032380-140032388 2217->2220 2220->2220 2221 14003238a-140032411 call 1400475f0 RegOpenKeyExA 2220->2221 2224 140032417-140032456 RegQueryValueExA 2221->2224 2225 1400324ee-1400324f5 2221->2225 2224->2225 2228 14003245c-1400324a9 call 1400475f0 call 1400418a0 2224->2228 2226 1400324f7 RegCloseKey 2225->2226 2227 1400324fd-14003256e call 140054b20 2225->2227 2226->2227 2234 1400325a2-1400325b5 2227->2234 2235 140032570-140032582 2227->2235 2243 1400324ab-1400324bf 2228->2243 2244 1400324df-1400324e7 2228->2244 2237 140032aa3-140032aae 2234->2237 2238 1400325bb-140032601 call 14002eaf0 2234->2238 2239 140032584-140032597 2235->2239 2240 14003259d call 1400ad140 2235->2240 2246 140032ae9-140032b0e 2237->2246 2247 140032ab0-140032ac9 2237->2247 2261 140032607-14003260a 2238->2261 2262 140032c25-140032c27 2238->2262 2239->2240 2241 140032c55-140032c5a call 140096b14 2239->2241 2240->2234 2267 140032c5b-140032c70 call 14002e1d0 2241->2267 2250 1400324c1-1400324d4 2243->2250 2251 1400324da call 1400ad140 2243->2251 2244->2225 2248 140032b44-140032b5e 2246->2248 2249 140032b10-140032b24 2246->2249 2253 140032ae4 call 1400ad140 2247->2253 2254 140032acb-140032ade 2247->2254 2258 140032b94-140032bae 2248->2258 2259 140032b60-140032b74 2248->2259 2256 140032b26-140032b39 2249->2256 2257 140032b3f call 1400ad140 2249->2257 2250->2251 2260 140032c4f-140032c54 call 140096b14 2250->2260 2251->2244 2253->2246 2254->2253 2264 140032c71-140032c76 call 140096b14 2254->2264 2256->2257 2268 140032c8f-140032c94 call 140096b14 2256->2268 2257->2248 2276 140032be0-140032c24 call 1400ad120 2258->2276 2277 140032bb0-140032bc4 2258->2277 2273 140032b76-140032b89 2259->2273 2274 140032b8f call 1400ad140 2259->2274 2260->2241 2261->2237 2275 140032610-14003262d call 140044100 2261->2275 2269 140032c34-140032c4e call 14002e240 2262->2269 2270 140032c29 2262->2270 2293 140032c77-140032c7c call 140096b14 2264->2293 2267->2264 2284 140032c95-140032c9a call 140096b14 2268->2284 2269->2260 2270->2237 2273->2274 2273->2284 2274->2258 2275->2267 2302 140032633-14003264e 2275->2302 2287 140032bc6-140032bd9 2277->2287 2288 140032bdb call 1400ad140 2277->2288 2287->2288 2297 140032c2e-140032c33 call 140096b14 2287->2297 2288->2276 2307 140032c7d-140032c82 call 140096b14 2293->2307 2297->2269 2305 140032658-14003268e call 14002e8c0 2302->2305 2306 140032650-140032654 2302->2306 2312 140032690-140032699 2305->2312 2313 14003269d-1400326be call 14002e9a0 2305->2313 2306->2305 2315 140032c83-140032c88 call 140096b14 2307->2315 2312->2313 2318 1400326c4-1400326c8 2313->2318 2319 140032a01-140032a0b 2313->2319 2324 140032c89-140032c8e call 14002cf70 2315->2324 2321 1400326d0-1400326e5 call 14007e7e0 2318->2321 2322 140032a37-140032a41 2319->2322 2323 140032a0d-140032a17 2319->2323 2335 1400326eb-140032737 call 140042a00 call 14002d4e0 call 14002d370 2321->2335 2336 1400329de-1400329fb call 14002f380 call 14002e7b0 2321->2336 2328 140032a43-140032a4d 2322->2328 2329 140032a6d-140032a74 2322->2329 2323->2322 2327 140032a19-140032a2b 2323->2327 2324->2268 2327->2322 2339 140032a2d-140032a36 2327->2339 2328->2329 2333 140032a4f-140032a61 2328->2333 2329->2237 2331 140032a76-140032a80 2329->2331 2331->2237 2334 140032a82-140032a96 2331->2334 2333->2329 2343 140032a63-140032a6c 2333->2343 2334->2237 2347 140032a98-140032aa2 2334->2347 2356 14003273c-1400327db call 1400442d0 call 1400445a0 call 1400475f0 call 1400408c0 call 140042fb0 2335->2356 2357 140032739 2335->2357 2336->2319 2336->2321 2339->2322 2343->2329 2347->2237 2368 14003280e-140032826 2356->2368 2369 1400327dd-1400327ee 2356->2369 2357->2356 2372 140032828-140032839 2368->2372 2373 140032859-140032871 2368->2373 2370 140032809 call 1400ad140 2369->2370 2371 1400327f0-140032803 2369->2371 2370->2368 2371->2293 2371->2370 2374 140032854 call 1400ad140 2372->2374 2375 14003283b-14003284e 2372->2375 2376 140032873-140032889 2373->2376 2377 1400328a9-1400328c7 2373->2377 2374->2373 2375->2307 2375->2374 2380 1400328a4 call 1400ad140 2376->2380 2381 14003288b-14003289e 2376->2381 2377->2324 2382 1400328cd-1400329dd call 14005c490 call 1400475f0 call 1400408c0 call 140042fb0 call 140041970 call 1400408c0 call 140041970 call 1400408c0 call 140040760 call 140042fb0 2377->2382 2380->2377 2381->2315 2381->2380 2382->2336
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: content$directory_iterator::directory_iterator$exists$filename
                                                  • API String ID: 3677997916-1400943384
                                                  • Opcode ID: 2316d6660ad33f69ae55bd29c0a13a611ed398c49c268220a2994983f1843a00
                                                  • Instruction ID: fdd2384dfce0150235b7be390f6418f44b90b76628f1849b6480400e0b2e9a5f
                                                  • Opcode Fuzzy Hash: 2316d6660ad33f69ae55bd29c0a13a611ed398c49c268220a2994983f1843a00
                                                  • Instruction Fuzzy Hash: 7D724C72611BC499EB228F36D8803DD77A0F789798F109215EB9D5BBA9EF74C680C340

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2404 14007df10-14007df95 call 14002eaf0 2407 14007df97-14007df99 2404->2407 2408 14007dfa1-14007dfa4 2404->2408 2409 14007e6b0-14007e6c6 call 14002e240 2407->2409 2410 14007df9f 2407->2410 2411 14007dfb7-14007dfd0 call 1400bff10 2408->2411 2412 14007dfa6-14007dfb2 2408->2412 2421 14007e6c7-14007e6cc call 140096b14 2409->2421 2410->2412 2419 14007dfd5-14007e03b call 140049810 2411->2419 2420 14007dfd2 2411->2420 2415 14007e62f-14007e65b call 1400ad120 2412->2415 2427 14007e435-14007e46f call 14005ecb0 call 14005ebd0 2419->2427 2428 14007e041-14007e049 2419->2428 2420->2419 2429 14007e6cd-14007e701 call 14002bbd0 call 14002cdc0 call 1400af748 2421->2429 2444 14007e471-14007e482 call 1400474a0 2427->2444 2445 14007e48e-14007e4f8 call 14005ecb0 call 14008c1f0 2427->2445 2431 14007e04e-14007e071 call 140088720 call 1400888e0 2428->2431 2432 14007e04b 2428->2432 2450 14007e077-14007e08d 2431->2450 2451 14007e14c-14007e166 GetFileSize 2431->2451 2432->2431 2454 14007e487 2444->2454 2471 14007e4fd-14007e51c 2445->2471 2456 14007e0c3-14007e147 call 1400402b0 2450->2456 2457 14007e08f-14007e0a3 2450->2457 2452 14007e168-14007e18b 2451->2452 2453 14007e18d-14007e1a3 2451->2453 2459 14007e1f2-14007e23b SetFilePointer ReadFile 2452->2459 2460 14007e1d5-14007e1ed call 140047d80 2453->2460 2461 14007e1a5-14007e1d3 call 1400bff10 2453->2461 2454->2445 2472 14007e61b-14007e62a call 1400bb1ec 2456->2472 2463 14007e0a5-14007e0b8 2457->2463 2464 14007e0be call 1400ad140 2457->2464 2469 14007e352-14007e376 2459->2469 2470 14007e241-14007e293 2459->2470 2460->2459 2461->2459 2463->2421 2463->2464 2464->2456 2482 14007e378-14007e38c 2469->2482 2483 14007e3ac-14007e430 call 1400402b0 2469->2483 2479 14007e295-14007e2a9 2470->2479 2480 14007e2c9-14007e34d call 1400402b0 2470->2480 2471->2429 2474 14007e522-14007e52e call 1400425e0 2471->2474 2472->2415 2487 14007e530-14007e557 2474->2487 2488 14007e55d-14007e617 call 1400402b0 2474->2488 2485 14007e2c4 call 1400ad140 2479->2485 2486 14007e2ab-14007e2be 2479->2486 2480->2472 2490 14007e3a7 call 1400ad140 2482->2490 2491 14007e38e-14007e3a1 2482->2491 2483->2472 2485->2480 2486->2421 2486->2485 2487->2488 2493 14007e65c-14007e65f 2487->2493 2488->2472 2490->2483 2491->2421 2491->2490 2499 14007e661-14007e668 2493->2499 2500 14007e66a-14007e67b 2493->2500 2501 14007e67f-14007e6af call 14002bbd0 call 14002cdc0 call 1400af748 2499->2501 2500->2501 2501->2409
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$PointerReadSize
                                                  • String ID: exists$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                  • API String ID: 404940565-15404121
                                                  • Opcode ID: 0683f384183c2aee485083eaa643c96062efc2106c8fae226bcd34debfb2e5c9
                                                  • Instruction ID: a7efa278b789a091a952ecf7804818e508a819529244d4e7b1ee4b8bfe63f7b0
                                                  • Opcode Fuzzy Hash: 0683f384183c2aee485083eaa643c96062efc2106c8fae226bcd34debfb2e5c9
                                                  • Instruction Fuzzy Hash: 69322632611BC489EB21CF35D8807DD77A1F789B88F508226EB8D5BBA9EB74C645C700

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                  • String ID: Eastern Standard Time$Eastern Summer Time
                                                  • API String ID: 3458911817-239921721
                                                  • Opcode ID: 346ab8a5c4df6500431c541ba2f0bca230f1ecc7217e036000549d6e711d945f
                                                  • Instruction ID: 4ab37d3fa7c9fdb582fe448a726573fe52a466e20a16ed51a879e3e0b2c8cc1e
                                                  • Opcode Fuzzy Hash: 346ab8a5c4df6500431c541ba2f0bca230f1ecc7217e036000549d6e711d945f
                                                  • Instruction Fuzzy Hash: 8951613621064086F762EF67F9817D97760F7ACBC4F444626FB4987AB6DB38D4818B40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 1405656091-0
                                                  • Opcode ID: 500d264b94c76e10bb7ad506ef0a555ed75bc66b43a59da6eb24dc754e51f7a2
                                                  • Instruction ID: 28c35c292e486cd51e7828065e4e2486622d87188324d2f30eb372141ce4aa21
                                                  • Opcode Fuzzy Hash: 500d264b94c76e10bb7ad506ef0a555ed75bc66b43a59da6eb24dc754e51f7a2
                                                  • Instruction Fuzzy Hash: 1A81C7B3B012458BEB598F36D9417EC63A5E798BC8F049129EB0D8B7A9EB38D541C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_exception_destroy
                                                  • String ID: value
                                                  • API String ID: 2453523683-494360628
                                                  • Opcode ID: f3ab481adf26e7fc62f689a1b14253d57f24bd398a58451cc93ee0ee3af88f39
                                                  • Instruction ID: 4157f297126a23fe588f45231007c796bee3a81a254ffe5b804a119b388bf979
                                                  • Opcode Fuzzy Hash: f3ab481adf26e7fc62f689a1b14253d57f24bd398a58451cc93ee0ee3af88f39
                                                  • Instruction Fuzzy Hash: 17028B72624BC085EB02DB76D4803ED6761E78A7E4F515222FB9E43AEADF78C185C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                  • String ID: [PID:
                                                  • API String ID: 420147892-2210602247
                                                  • Opcode ID: 0c950f8b155bc2ef1efead22239ab0028e84ac47bfa0f278c3d4f43e35984d4a
                                                  • Instruction ID: cece93d552114422a5db79efb6cb5b095d6d34e54e317ad826c2fed787882349
                                                  • Opcode Fuzzy Hash: 0c950f8b155bc2ef1efead22239ab0028e84ac47bfa0f278c3d4f43e35984d4a
                                                  • Instruction Fuzzy Hash: 54E16172614BC085EB22DB26E8803DE77A5F7897A4F505216FB9D47BA9DF78C284C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                                  • String ID:
                                                  • API String ID: 3038321057-0
                                                  • Opcode ID: 012d78ec9778671e051357f93a4634913505e7a4763b4c3b036141e78afb5143
                                                  • Instruction ID: e6ed573dd5adc179a62c0c43ff1dd623381a8e6f68e1d36954cd8c9a6a60e3b9
                                                  • Opcode Fuzzy Hash: 012d78ec9778671e051357f93a4634913505e7a4763b4c3b036141e78afb5143
                                                  • Instruction Fuzzy Hash: 8E215C32218B8082E761CF22F45439AB7A0FB8DBD0F598125FB8947B68DF7DC5568B00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Cred$EnumerateFree
                                                  • String ID: cannot use push_back() with
                                                  • API String ID: 3403564193-4122110429
                                                  • Opcode ID: fbaaafad7e4c248f5a6ccb509bfbe2770017f78eb61105b3f1b1e9e1a46d0c20
                                                  • Instruction ID: 15e837bc0680750b5105bb68f1ec756bb9003d5bb125d07902e424ac5bc16deb
                                                  • Opcode Fuzzy Hash: fbaaafad7e4c248f5a6ccb509bfbe2770017f78eb61105b3f1b1e9e1a46d0c20
                                                  • Instruction Fuzzy Hash: 34627D72614BC489EB228F26E8803DE7761F789798F504316EBAD57BA9DB74C294C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InformationTimeZone
                                                  • String ID: [UTC
                                                  • API String ID: 565725191-1715286942
                                                  • Opcode ID: dae8efce5d2530c78139cd26f997094fb4b1ed245d954789b40324fff528bad9
                                                  • Instruction ID: 0f088bd619a210dec1cb0986f13bb44e3f6854156ff9e1ffbd8192f932ae259b
                                                  • Opcode Fuzzy Hash: dae8efce5d2530c78139cd26f997094fb4b1ed245d954789b40324fff528bad9
                                                  • Instruction Fuzzy Hash: 5CB12832614BC88AD7718F2AE84139AB7A5F79C788F105315EBCC57B69EB78C250CB44
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteFileModuleNameShell
                                                  • String ID:
                                                  • API String ID: 1703432166-0
                                                  • Opcode ID: 8cf5c74d64a0911ccf009ca7f061b764517e4121d83dc6aa143f050b31a04890
                                                  • Instruction ID: fcdc6028fe68c1de9c1d61a4c27d8a3d82f381935235dac80c5d4554a44c27d4
                                                  • Opcode Fuzzy Hash: 8cf5c74d64a0911ccf009ca7f061b764517e4121d83dc6aa143f050b31a04890
                                                  • Instruction Fuzzy Hash: AA121772625F848ADB418F2AE88079EB3A4F788788F506215FFDD57B69EB38C150C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CryptDataFreeLocalUnprotect
                                                  • String ID:
                                                  • API String ID: 1561624719-0
                                                  • Opcode ID: 0f57a5f6f00cf3114cdad985b88ad97b4443b737a92ed5702ae11a0636d70846
                                                  • Instruction ID: 7804563b8dd68e9e0661087fd5dbb69b584154c51fa0838d7a27f1f595743b83
                                                  • Opcode Fuzzy Hash: 0f57a5f6f00cf3114cdad985b88ad97b4443b737a92ed5702ae11a0636d70846
                                                  • Instruction Fuzzy Hash: FC416032614B80CAE3219F75E4403ED37A4F75978CF084229BB8907E9ADB79C6A4C758
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: NameUser
                                                  • String ID:
                                                  • API String ID: 2645101109-0
                                                  • Opcode ID: e5988426a38de09ee6cf2dd1c57c0096c2fcff121a7d67ee165aa271772a2a34
                                                  • Instruction ID: 4cc3c8844ba736298f8bd32032979993a0d240d019a900159361ccb08714f342
                                                  • Opcode Fuzzy Hash: e5988426a38de09ee6cf2dd1c57c0096c2fcff121a7d67ee165aa271772a2a34
                                                  • Instruction Fuzzy Hash: FC011B3261868082E762DF26E8513DAB3A4F79C7C8F441226FB8D47669DBBCC194CB40

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 40 14007dae0-14007db1b call 14007d860 43 14007db1d-14007db2c EnterCriticalSection 40->43 44 14007db5c 40->44 45 14007db80-14007db9a LeaveCriticalSection GdipGetImageEncodersSize 43->45 46 14007db2e-14007db50 GdiplusStartup 43->46 47 14007db61-14007db7f call 1400ad120 44->47 45->44 50 14007db9c-14007dbaf 45->50 46->45 48 14007db52-14007db56 LeaveCriticalSection 46->48 48->44 52 14007dbb1-14007dbba call 14007d5f0 50->52 53 14007dbeb-14007dbf9 call 140096c98 50->53 58 14007dbe8 52->58 59 14007dbbc-14007dbc6 52->59 60 14007dc00-14007dc0a 53->60 61 14007dbfb-14007dbfe 53->61 58->53 62 14007dbc8 59->62 63 14007dbd2-14007dbe6 call 1400adde0 59->63 64 14007dc0e 60->64 61->64 62->63 66 14007dc11-14007dc14 63->66 64->66 68 14007dc16-14007dc1b 66->68 69 14007dc20-14007dc2e GdipGetImageEncoders 66->69 70 14007dd8e-14007dd91 68->70 71 14007dc34-14007dc3d 69->71 72 14007dd79-14007dd7e 69->72 75 14007ddb4-14007ddb6 70->75 76 14007dd93-14007dd97 70->76 73 14007dc6f 71->73 74 14007dc3f-14007dc4d 71->74 72->70 79 14007dc76-14007dc86 73->79 77 14007dc50-14007dc5b 74->77 75->47 78 14007dda0-14007ddb2 call 140095ee0 76->78 80 14007dc68-14007dc6d 77->80 81 14007dc5d-14007dc62 77->81 78->75 83 14007dc88-14007dc99 79->83 84 14007dc9f-14007dcbb 79->84 80->73 80->77 81->80 85 14007dd1d-14007dd21 81->85 83->72 83->84 87 14007dd28-14007dd67 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 84->87 88 14007dcbd-14007dd16 GdipCreateBitmapFromScan0 GdipSaveImageToStream 84->88 85->79 91 14007dd80-14007dd8d GdipDisposeImage 87->91 92 14007dd69 87->92 89 14007dd18-14007dd1b 88->89 90 14007dd26 88->90 93 14007dd6c-14007dd73 GdipDisposeImage 89->93 90->91 91->70 92->93 93->72
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Gdip$Image$CriticalSection$DisposeEncodersLeave$BitmapCreateEnterErrorFromGdiplusInitializeLastSaveScan0SizeStartupStream
                                                  • String ID: &
                                                  • API String ID: 1703174404-3042966939
                                                  • Opcode ID: 0b8d952391a50375ef43d6746334d8a0080f61def9520b6ac6a34ec75f65a789
                                                  • Instruction ID: 9499a8a96b76f9eeaec96d38e309a061bbf0e919148de72399f1f56bad800c58
                                                  • Opcode Fuzzy Hash: 0b8d952391a50375ef43d6746334d8a0080f61def9520b6ac6a34ec75f65a789
                                                  • Instruction Fuzzy Hash: EE911932200B819AEB229F22E8407D977B4F75CBD8F558217FB5957BA4DB38C995C380

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 848 14007eb00-14007ec26 call 140084730 call 14005c490 call 1400475f0 call 1400408c0 call 1400475f0 call 1400408c0 call 140042fb0 WSAStartup 863 14007ece7 848->863 864 14007ec2c-14007ec4c socket 848->864 865 14007ece9-14007ecf1 863->865 866 14007ec52-14007ec7e htons 864->866 867 14007ece1 WSACleanup 864->867 868 14007ed24-14007ed65 call 1400ad120 865->868 869 14007ecf3-14007ed04 865->869 870 14007ec84-14007ec94 call 14008c3e0 866->870 871 14007ed89-14007edba call 14007ddc0 call 140041690 866->871 867->863 873 14007ed06-14007ed19 869->873 874 14007ed1f call 1400ad140 869->874 884 14007ec96 870->884 885 14007ec99-14007ecc5 inet_pton connect 870->885 890 14007edf2-14007ee0f call 14007ddc0 871->890 891 14007edbc-14007edd2 871->891 873->874 878 14007ee8b-14007ee90 call 140096b14 873->878 874->868 892 14007ee91-14007ee96 call 140096b14 878->892 884->885 888 14007ed66-14007ed70 885->888 889 14007eccb-14007ecd2 885->889 888->871 893 14007ed72-14007ed7b 888->893 889->870 894 14007ecd4-14007ecdb closesocket 889->894 902 14007ee14-14007ee38 call 140041690 890->902 895 14007edd4-14007ede7 891->895 896 14007eded call 1400ad140 891->896 899 14007ed80-14007ed88 call 1400435c0 893->899 900 14007ed7d 893->900 894->867 895->892 895->896 896->890 899->871 900->899 908 14007ee74-14007ee80 902->908 909 14007ee3a-14007ee50 902->909 908->865 910 14007ee67-14007ee6c call 1400ad140 909->910 911 14007ee52-14007ee65 909->911 910->908 911->910 912 14007ee85-14007ee8a call 140096b14 911->912 912->878
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Info$CleanupStartupUserclosesocketconnecthtonsinet_ptonsocket
                                                  • String ID: geo$system
                                                  • API String ID: 213021568-2364779556
                                                  • Opcode ID: a5fc31a0c41ff5a27f15f016aa5db4085f620b944739da052a686bf5863c471a
                                                  • Instruction ID: a025bd78097a622ce99f6dd631d164278a997d1e4bf617748a8d7ff18237b3ae
                                                  • Opcode Fuzzy Hash: a5fc31a0c41ff5a27f15f016aa5db4085f620b944739da052a686bf5863c471a
                                                  • Instruction Fuzzy Hash: BEB18D72B11A8095FB02DBB6D4803DC33B2AB9DB98F415216EB5927BF9DE38C546C340

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2508 14009f1ec-14009f212 2509 14009f22d-14009f231 2508->2509 2510 14009f214-14009f228 call 140093708 call 140093728 2508->2510 2512 14009f607-14009f613 call 140093708 call 140093728 2509->2512 2513 14009f237-14009f23e 2509->2513 2526 14009f61e 2510->2526 2529 14009f619 call 140096af4 2512->2529 2513->2512 2515 14009f244-14009f272 2513->2515 2515->2512 2518 14009f278-14009f27f 2515->2518 2521 14009f281-14009f293 call 140093708 call 140093728 2518->2521 2522 14009f298-14009f29b 2518->2522 2521->2529 2524 14009f2a1-14009f2a7 2522->2524 2525 14009f603-14009f605 2522->2525 2524->2525 2530 14009f2ad-14009f2b0 2524->2530 2531 14009f621-14009f638 2525->2531 2526->2531 2529->2526 2530->2521 2534 14009f2b2-14009f2d7 2530->2534 2536 14009f30a-14009f311 2534->2536 2537 14009f2d9-14009f2db 2534->2537 2541 14009f313-14009f33b call 14009d17c call 14009bc88 * 2 2536->2541 2542 14009f2e6-14009f2fd call 140093708 call 140093728 call 140096af4 2536->2542 2539 14009f2dd-14009f2e4 2537->2539 2540 14009f302-14009f308 2537->2540 2539->2540 2539->2542 2544 14009f388-14009f39f 2540->2544 2569 14009f33d-14009f353 call 140093728 call 140093708 2541->2569 2570 14009f358-14009f383 call 14009f8ac 2541->2570 2573 14009f490 2542->2573 2548 14009f41a-14009f424 call 1400a822c 2544->2548 2549 14009f3a1-14009f3a9 2544->2549 2561 14009f42a-14009f43f 2548->2561 2562 14009f4ae 2548->2562 2549->2548 2553 14009f3ab-14009f3ad 2549->2553 2553->2548 2554 14009f3af-14009f3c5 2553->2554 2554->2548 2558 14009f3c7-14009f3d3 2554->2558 2558->2548 2563 14009f3d5-14009f3d7 2558->2563 2561->2562 2567 14009f441-14009f453 GetConsoleMode 2561->2567 2565 14009f4b3-14009f4d3 ReadFile 2562->2565 2563->2548 2568 14009f3d9-14009f3f1 2563->2568 2571 14009f4d9-14009f4e1 2565->2571 2572 14009f5cd-14009f5d6 call 1400d3168 2565->2572 2567->2562 2574 14009f455-14009f45d 2567->2574 2568->2548 2577 14009f3f3-14009f3ff 2568->2577 2569->2573 2570->2544 2571->2572 2579 14009f4e7 2571->2579 2590 14009f5f3-14009f5f6 2572->2590 2591 14009f5d8-14009f5ee call 140093728 call 140093708 2572->2591 2576 14009f493-14009f49d call 14009bc88 2573->2576 2574->2565 2581 14009f45f-14009f481 ReadConsoleW 2574->2581 2576->2531 2577->2548 2584 14009f401-14009f403 2577->2584 2586 14009f4ee-14009f503 2579->2586 2588 14009f4a2-14009f4ac 2581->2588 2589 14009f483 call 1400d3168 2581->2589 2584->2548 2593 14009f405-14009f415 2584->2593 2586->2576 2595 14009f505-14009f510 2586->2595 2588->2586 2597 14009f489-14009f48b call 14009369c 2589->2597 2590->2597 2599 14009f5fc-14009f5fe 2590->2599 2591->2573 2593->2548 2601 14009f512-14009f52b call 14009ee04 2595->2601 2602 14009f537-14009f53f 2595->2602 2597->2573 2599->2576 2612 14009f530-14009f532 2601->2612 2604 14009f5bb-14009f5c8 call 14009ec44 2602->2604 2605 14009f541-14009f553 2602->2605 2604->2612 2608 14009f5ae-14009f5b6 2605->2608 2609 14009f555 2605->2609 2608->2576 2613 14009f55a-14009f561 2609->2613 2612->2576 2616 14009f59d-14009f5a8 2613->2616 2617 14009f563-14009f567 2613->2617 2616->2608 2618 14009f569-14009f570 2617->2618 2619 14009f583 2617->2619 2618->2619 2620 14009f572-14009f576 2618->2620 2621 14009f589-14009f599 2619->2621 2620->2619 2622 14009f578-14009f581 2620->2622 2621->2613 2623 14009f59b 2621->2623 2622->2621 2623->2608
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 5d540c859c83c58d2e94c1ec18d5dac562cac1a1d1764d75889ecbbe6435b051
                                                  • Instruction ID: 89a76c2e7bd64f2e292d0171c67a85ad1a22fb2b88445312a06a55af962eb3af
                                                  • Opcode Fuzzy Hash: 5d540c859c83c58d2e94c1ec18d5dac562cac1a1d1764d75889ecbbe6435b051
                                                  • Instruction Fuzzy Hash: 2EC1F372218B8192EB629F57A4403FE7BA4F799BD4F594111FB4A077B1CFB8C8859700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection$EnterLeave$DeleteGdiplusObjectShutdown
                                                  • String ID:
                                                  • API String ID: 4268643673-0
                                                  • Opcode ID: 311328e0c1a3d6f09e9d2e4e36d225c093cfd7f693314f7d25c72e43ed53fafa
                                                  • Instruction ID: ccad471ceb86da12b8052557114d3172f4fe174a1baea1f974d0ccb94854474a
                                                  • Opcode Fuzzy Hash: 311328e0c1a3d6f09e9d2e4e36d225c093cfd7f693314f7d25c72e43ed53fafa
                                                  • Instruction Fuzzy Hash: 19112532511B5091EB169F26E84039D73B4FB48FA8F288216AB6E076B4CF39C897C350
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: recv$Cleanupclosesocket
                                                  • String ID:
                                                  • API String ID: 146070474-0
                                                  • Opcode ID: e3529e4f086e916588a050fb794958e2ac0093eb24aceede0b4d9dbc2b460c77
                                                  • Instruction ID: 2da43283a9dc6e515e407d9e93031c35698a04021dc8004dc304920df4a58cdd
                                                  • Opcode Fuzzy Hash: e3529e4f086e916588a050fb794958e2ac0093eb24aceede0b4d9dbc2b460c77
                                                  • Instruction Fuzzy Hash: 6E128D73618BC481EA229B26E4443DEA761F7DD7D0F505216EBAD47AEADF78C580CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                  • String ID:
                                                  • API String ID: 215268677-0
                                                  • Opcode ID: 90ae23b39752d8e562d256ccd9c16a94bf4e7d6f39fa52c22aeb40f361b48fa7
                                                  • Instruction ID: b5218933ea7703c7e048df4ba95b441abb8dda8107fd4ab30233c47b2b803c5e
                                                  • Opcode Fuzzy Hash: 90ae23b39752d8e562d256ccd9c16a94bf4e7d6f39fa52c22aeb40f361b48fa7
                                                  • Instruction Fuzzy Hash: 5211FB72219B8082E7519F16F84038AB7A0FB8DB80F559125FB9947B68CF3CC455CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID: ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                  • API String ID: 3702945584-1787575317
                                                  • Opcode ID: 45beb6f7e78784f3d9509a1d3ea3717a7d34e9a73ec6a4c6398bfce9d8be6136
                                                  • Instruction ID: 0923dad602657fcfdd4189dd7accdda6bd0898d30bf99b6bbaeadf04a2d916fd
                                                  • Opcode Fuzzy Hash: 45beb6f7e78784f3d9509a1d3ea3717a7d34e9a73ec6a4c6398bfce9d8be6136
                                                  • Instruction Fuzzy Hash: 55115E32208B8082EB219F22F4413DAB3A4F79DB88F904215EB9C47B69DFBCC155CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Cleanupclosesocketrecv
                                                  • String ID:
                                                  • API String ID: 3447645871-0
                                                  • Opcode ID: 95e3429f520675f56c4b97f154f99d7dc85828c673adf1d39d37ca96e1e6d654
                                                  • Instruction ID: 7db60b0abc5ae50f8d1ed737cd1e66b44ba841ec5a06357c0ac7b1b80de7ea70
                                                  • Opcode Fuzzy Hash: 95e3429f520675f56c4b97f154f99d7dc85828c673adf1d39d37ca96e1e6d654
                                                  • Instruction Fuzzy Hash: 989150B3A14BC481EA228B26E4443DE6761F7D97E0F505315EBAD07AEADF78C581C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnumOpen
                                                  • String ID:
                                                  • API String ID: 1332880857-0
                                                  • Opcode ID: fa56d9e272c57ab1efd7a57ecb14589b071b14ab9fb351ea4e3d4cd9b7db20a5
                                                  • Instruction ID: 3126900138017e27c26b7e97fdf396bcda76f2f26d0a694c5074764b3548d2ce
                                                  • Opcode Fuzzy Hash: fa56d9e272c57ab1efd7a57ecb14589b071b14ab9fb351ea4e3d4cd9b7db20a5
                                                  • Instruction Fuzzy Hash: DF716C73A04B8486EB11CB66E44479E7761F7897E8F104616FBA917AEADF78C1C1C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnumOpen
                                                  • String ID:
                                                  • API String ID: 3231578192-0
                                                  • Opcode ID: 6550f83a76ef02cb639577a8c322407ba9ca0699da3057204f7e0e5f7f356cfe
                                                  • Instruction ID: d7a65414a419a411271327cc786576db46dcb625295add4502772783f8e551d9
                                                  • Opcode Fuzzy Hash: 6550f83a76ef02cb639577a8c322407ba9ca0699da3057204f7e0e5f7f356cfe
                                                  • Instruction Fuzzy Hash: CB319C32600B8086EB218BA2E854B9E77A4F7497D8F200615EF9917B65DF38C192C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnvironmentFreeStrings$Heap$AllocErrorLast
                                                  • String ID:
                                                  • API String ID: 3331406755-0
                                                  • Opcode ID: 852ce6a3aa10158de52a943532ee1263c9941556433ed56d8c0fe7e0096677f1
                                                  • Instruction ID: 258d45838a42909b4d495c2cc59036331f00c14b156d323c19056bd3fcf00d93
                                                  • Opcode Fuzzy Hash: 852ce6a3aa10158de52a943532ee1263c9941556433ed56d8c0fe7e0096677f1
                                                  • Instruction Fuzzy Hash: F831B13122478081EA269F2768417EA76A4B79CFD4F494319BB4A57BE5DF39C4818B00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 98a3e54482a17532a660a8fa1cab900c309b5f6fda42c005ceacfcf74f8e1bea
                                                  • Instruction ID: 3f4b0842e8fc82fdf074bf0f3e32c2781c2fe54cfa2cd97e6c43f32abcda0346
                                                  • Opcode Fuzzy Hash: 98a3e54482a17532a660a8fa1cab900c309b5f6fda42c005ceacfcf74f8e1bea
                                                  • Instruction Fuzzy Hash: AD218173614B8481EA619B26E49439EA760FBDD7D4F505212FB8E47AB9EE3CC185CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Info$User
                                                  • String ID:
                                                  • API String ID: 2017065092-0
                                                  • Opcode ID: 09ae55b4e622fe248be01bc66097043d67a2342efe4101a7f522a741858beff8
                                                  • Instruction ID: 0da6c51708aae802c1c715e5ab97e643279c3131667dc25065de9ec91bfb8954
                                                  • Opcode Fuzzy Hash: 09ae55b4e622fe248be01bc66097043d67a2342efe4101a7f522a741858beff8
                                                  • Instruction Fuzzy Hash: 3811BF32A1878183D7118F62F41479EB3A2FB84FC8F445125EB8503B69DF7CD5908B84
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CurrentExitTerminate
                                                  • String ID:
                                                  • API String ID: 1703294689-0
                                                  • Opcode ID: 8894e589db04ddd2d14810d04fdd379fe1a67dc706d1f09feb04222f201663c3
                                                  • Instruction ID: 2ea921b5de8585c7ead1c9c47d07aa2049e2c11de3f04c0e1d401d775a7a3a6d
                                                  • Opcode Fuzzy Hash: 8894e589db04ddd2d14810d04fdd379fe1a67dc706d1f09feb04222f201663c3
                                                  • Instruction Fuzzy Hash: 84D0923870070693EB1A6B7268963EC52266F6DBC1F14292CBA03073B3CE3D888E4611
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-3916222277
                                                  • Opcode ID: b97fa85fd6d080112689539a1df79cb63ca38774697952c274d3f990b54ca2e5
                                                  • Instruction ID: 4a1abb7f16d831aa52622629eddc64690d6838a0f628c8f588688f42a2f75156
                                                  • Opcode Fuzzy Hash: b97fa85fd6d080112689539a1df79cb63ca38774697952c274d3f990b54ca2e5
                                                  • Instruction Fuzzy Hash: 93515572304B8496EB268F2AD19439C33A0F388BD4F954622EF5D53BA5CF79D4A6C304
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentProfile
                                                  • String ID: Unknown
                                                  • API String ID: 2104809126-1654365787
                                                  • Opcode ID: 370ad8d10583bea3bf14cf6bd73c985662e30a083e550bf09a4d6a2d7c1b6686
                                                  • Instruction ID: fc0f38fc8322fcab52c5dd085439699fc5d39dddd363d65fb3ed261f826ffc69
                                                  • Opcode Fuzzy Hash: 370ad8d10583bea3bf14cf6bd73c985662e30a083e550bf09a4d6a2d7c1b6686
                                                  • Instruction Fuzzy Hash: 8A31CD33628BC086E711CF22E4403DAB760F7A9B84F545215FBCA17A6ADB7CC695CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 7b4fe20866bdcc0bac301f3d6566340bd892cf834fe267d167d240e53d73b122
                                                  • Instruction ID: 71a22894ff747ab8b3437f2b7930de81b013a1e249af08e6b7946cdfb5fda7e0
                                                  • Opcode Fuzzy Hash: 7b4fe20866bdcc0bac301f3d6566340bd892cf834fe267d167d240e53d73b122
                                                  • Instruction Fuzzy Hash: BB5106B2301B4095EE269F27A5007E96256E74CBE4F590631FF6D0B7F6EE78C4818304
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FolderFreeKnownPathTask
                                                  • String ID:
                                                  • API String ID: 969438705-0
                                                  • Opcode ID: 802f0dca9c775e43cdb46f403647510168036d8998da0434065c44830da239a0
                                                  • Instruction ID: 55715e2a66dfc52912f6fef3d118ca5409f61bb99c4b7665450f664eadaf1565
                                                  • Opcode Fuzzy Hash: 802f0dca9c775e43cdb46f403647510168036d8998da0434065c44830da239a0
                                                  • Instruction Fuzzy Hash: BE316672A14B8081E621CF26E44139EB761F79D7F4F105316FBAD47AA9DB7CC1818B40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 634ca63b1299db0c69c46a9c87062dc1bde1b4139033e41e1825c3da2e6d69db
                                                  • Instruction ID: d670c74a3cad8dea1a861d3376d60556d5dbf12abfbe617c3eb3189632f6d3bf
                                                  • Opcode Fuzzy Hash: 634ca63b1299db0c69c46a9c87062dc1bde1b4139033e41e1825c3da2e6d69db
                                                  • Instruction Fuzzy Hash: BB31DD72210A4481EE56EB56E8613E963A0E79CBC0F940631F75E473F2EB38C545CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpen
                                                  • String ID:
                                                  • API String ID: 47109696-0
                                                  • Opcode ID: e2db2b8549d09c46c0c409d88c472a4204a4d469fc154098e38cf9eddf7af88f
                                                  • Instruction ID: 33e98342e1dbc51f3766f630471af370cdcb195a6e8e0b13f4e2b894d56ac143
                                                  • Opcode Fuzzy Hash: e2db2b8549d09c46c0c409d88c472a4204a4d469fc154098e38cf9eddf7af88f
                                                  • Instruction Fuzzy Hash: C221A332725A8045EE519B23E8507EAA760FB9DFD4F495125FB4E43BA9DF3CC4818700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateCredEnumerateFirstHandleMutexProcess32ReleaseSnapshotToolhelp32recv
                                                  • String ID:
                                                  • API String ID: 420082584-0
                                                  • Opcode ID: 8b8447a8b915974071f3a08b26181bd4282b7d5f4d27517d31bd520b905839d0
                                                  • Instruction ID: f10cd317d46a8061a63238d510a0afd0e99a1dcd5fca171a1b6c180d916f7be3
                                                  • Opcode Fuzzy Hash: 8b8447a8b915974071f3a08b26181bd4282b7d5f4d27517d31bd520b905839d0
                                                  • Instruction Fuzzy Hash: 3C218C7160868141FA27B7B7A4563EE6340AFCE7D0F145A21FB9A436F7DE3CC0809622
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Initialize_invalid_parameter_noinfo_set_fmode
                                                  • String ID:
                                                  • API String ID: 3548387204-0
                                                  • Opcode ID: 9f55e90913658458d0baa701b2b7b8f387f595ce9a8c9f74acf3b7ee8b8922bb
                                                  • Instruction ID: bf1a4c9bad61c6cf295336fbe84c7c5893434da79de8b2b3da9e20f25465f2a6
                                                  • Opcode Fuzzy Hash: 9f55e90913658458d0baa701b2b7b8f387f595ce9a8c9f74acf3b7ee8b8922bb
                                                  • Instruction Fuzzy Hash: 0211A23466024142FE177BF3445B7ED31954BBD3C0F441A29B756972F3EEB889814AA2
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandleMutexReleaserecv
                                                  • String ID:
                                                  • API String ID: 2659716615-0
                                                  • Opcode ID: 795b393336643d9005e1441f54a42898eca0ffb56d6f142cab5f3b3c29d99d1b
                                                  • Instruction ID: 7c7df572d18e132df0cc7954c78060e49782440cc91fd5e23d273308c34aa20c
                                                  • Opcode Fuzzy Hash: 795b393336643d9005e1441f54a42898eca0ffb56d6f142cab5f3b3c29d99d1b
                                                  • Instruction Fuzzy Hash: 24116D7261868141FA67B777A4163EE6350AFCEBD0F145221BB99076F7DE3CC080C611
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFileLastPointer
                                                  • String ID:
                                                  • API String ID: 2976181284-0
                                                  • Opcode ID: bf64b2ca6c828aa2865472cbc32df9119e6dc20bcb509235e4a2de8cfbd7474d
                                                  • Instruction ID: 46564ee9d56e3c7b5ba1a1fab28bafcdd2752c4fc38c25dfd0f57ce0032245ed
                                                  • Opcode Fuzzy Hash: bf64b2ca6c828aa2865472cbc32df9119e6dc20bcb509235e4a2de8cfbd7474d
                                                  • Instruction Fuzzy Hash: 4711A076318B8081EA218B26A4443A9A761E798FF4F644312FF794B7F9DF78C0918740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandleMutexRelease
                                                  • String ID:
                                                  • API String ID: 4207627910-0
                                                  • Opcode ID: 9c337312b80d2d38a3baa7b6c66967634573851b1351c332d2a925c877b67f73
                                                  • Instruction ID: 534bebf3c5aab0f9e7bb800e237f7db9ba722c6094160e883dbefabcf6144a52
                                                  • Opcode Fuzzy Hash: 9c337312b80d2d38a3baa7b6c66967634573851b1351c332d2a925c877b67f73
                                                  • Instruction Fuzzy Hash: FC018F72A086C142FA66AB3BE4153DD6350ABCDBE1F145311BB9A076F6EF3CC081C600
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                  • String ID:
                                                  • API String ID: 1173176844-0
                                                  • Opcode ID: ba3aa8670788eabeaf193c5d6875b73550c8a9037df0e5da198d367d2e00ed63
                                                  • Instruction ID: 8a138c7820b728ff1b6e361a71ad5426c6f0f74126902d65813b18e6a5a28ee9
                                                  • Opcode Fuzzy Hash: ba3aa8670788eabeaf193c5d6875b73550c8a9037df0e5da198d367d2e00ed63
                                                  • Instruction Fuzzy Hash: 21E0127061110555FD2B267318153F520401F6D7F0F1C1B217FB6076F3A978C4D18D10
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 485612231-0
                                                  • Opcode ID: 394618f50db7fbbd1fef49d22478318aab263d5d118c1dceebe5262d95cd9652
                                                  • Instruction ID: 0b5330ced0e29f78a79284f3cf9380b093bbeb4d8d894d7985c437e0057f45df
                                                  • Opcode Fuzzy Hash: 394618f50db7fbbd1fef49d22478318aab263d5d118c1dceebe5262d95cd9652
                                                  • Instruction Fuzzy Hash: 0BE017F5B0160162FF1BA7F3A8563EA12915FACBD0F048420BB19932B2EE3888958610
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: b4170ca246f7b06beccc7ac9e070f92329930d084c876b8179c86b6049eff60d
                                                  • Instruction ID: d0d4a9a4096f2515e684ff415137a2abc53100603a9f39e4ea57f913a362a5d5
                                                  • Opcode Fuzzy Hash: b4170ca246f7b06beccc7ac9e070f92329930d084c876b8179c86b6049eff60d
                                                  • Instruction Fuzzy Hash: E2616873301A8485EA169E17D1543AD37A2F349FD8F558622EF6E0B3E5DB78CA86D300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_fs_directory_iterator_open
                                                  • String ID:
                                                  • API String ID: 4007087469-0
                                                  • Opcode ID: 4ad4d258e8038ebb62c4665b52b0a199e7f30c3b6c0de5d0078ad3618b3c21bd
                                                  • Instruction ID: cf3e95423c2b5032186d8df5afcb552741feadb5e4544773b76807159a3cd90b
                                                  • Opcode Fuzzy Hash: 4ad4d258e8038ebb62c4665b52b0a199e7f30c3b6c0de5d0078ad3618b3c21bd
                                                  • Instruction Fuzzy Hash: 0E61C472B40A8096FB12DF7AD4903ED23A1E74D7E8F40462AFF1957BE5EA34C9918300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 03ce9d0e3375c82842fa70db0fb78aa8d24b2234106e7cf032a5740499f0bb4c
                                                  • Instruction ID: e4b19214cd8291f7c2a3f7ba8663091feaa898583f7ef6e0799addca7407a7b1
                                                  • Opcode Fuzzy Hash: 03ce9d0e3375c82842fa70db0fb78aa8d24b2234106e7cf032a5740499f0bb4c
                                                  • Instruction Fuzzy Hash: 7141BC72304A8481EA229F27E5443ED6365F74DBD4F580A35EFAD0B7A6DF38C8418304
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 91c1d0024a4ceec18961aef921753dc9ec11f4d7a9d20682904b5b8028ae8ee7
                                                  • Instruction ID: 14160285011a48e7f41132f3120126f3728569180f830c231f43946f66594cc4
                                                  • Opcode Fuzzy Hash: 91c1d0024a4ceec18961aef921753dc9ec11f4d7a9d20682904b5b8028ae8ee7
                                                  • Instruction Fuzzy Hash: 0D41D172310B4485EE62AB17A5043EDA251B34CFD4F584A32BF6D0B7E6DE78C585D308
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 5bafbbcb6e6413927c3fc9517177ef75b85603921594b8b89ab5417e025dbab1
                                                  • Instruction ID: d81f1f3b013fd9dff1d6c6ed14603e01849b91a5f7cc6777860c49fb60551185
                                                  • Opcode Fuzzy Hash: 5bafbbcb6e6413927c3fc9517177ef75b85603921594b8b89ab5417e025dbab1
                                                  • Instruction Fuzzy Hash: B041D1B262064087EA768B5AE5507E973A4F75ABD0F141205FB8A877F1CB38D803CB51
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: fe21941772a21cb610d908efc03c2bf21678114c0b14b86b5384dc1c549e5956
                                                  • Instruction ID: ae97ad5adc726308d7a98a4495e6a17c3d23bec2a58afecb9af88f47ba5ca4d6
                                                  • Opcode Fuzzy Hash: fe21941772a21cb610d908efc03c2bf21678114c0b14b86b5384dc1c549e5956
                                                  • Instruction Fuzzy Hash: 8D310372305B8095EE26AF27A5447EC6266E70CBD4F590635BF6D0B7E6DE78C081C304
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InformationVolume
                                                  • String ID:
                                                  • API String ID: 2039140958-0
                                                  • Opcode ID: 8c851119c1025d19680f206ef99bf1d565e4006ab44c0d104981a73e61e7a8bc
                                                  • Instruction ID: 3e4f4deb163ecf7065a35b7f87b05c89be95e7df2a8154597d23eeef62723db6
                                                  • Opcode Fuzzy Hash: 8c851119c1025d19680f206ef99bf1d565e4006ab44c0d104981a73e61e7a8bc
                                                  • Instruction Fuzzy Hash: C9518E33A14B8089E712CF79E8443DD7760F799788F504212EB8C57AA9DF78C684CB40
                                                  APIs
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0000000140041A78
                                                    • Part of subcall function 000000014002B820: __std_exception_copy.LIBVCRUNTIME ref: 000000014002B868
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task__std_exception_copy
                                                  • String ID:
                                                  • API String ID: 317858897-0
                                                  • Opcode ID: b2d8e5f1be8f2f8d542de75146d83861674ac033b6a07a4ff179556af76ea083
                                                  • Instruction ID: a8f0adb98431b775425e9ead8c3c05668da373c0a0ccb6e90c9b6137a0fdfd0e
                                                  • Opcode Fuzzy Hash: b2d8e5f1be8f2f8d542de75146d83861674ac033b6a07a4ff179556af76ea083
                                                  • Instruction Fuzzy Hash: 0121E972702B5441EA1AAB56E1403E86290E788BE4F254731EB7C07BE5EE78C9E29340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: b4453dcf53b1a406caf81c0f7e08a99bf745a785fcbd5ce79fe073e0462c5a7f
                                                  • Instruction ID: 039b51f25f9133a0960bb8f5086f042a09a8f8d88124adaea2b7abbcf7265592
                                                  • Opcode Fuzzy Hash: b4453dcf53b1a406caf81c0f7e08a99bf745a785fcbd5ce79fe073e0462c5a7f
                                                  • Instruction Fuzzy Hash: 8131E3B2614640D6F727AFA7D8413ED6B90A748BE4F810205FB65433F2DBB8C8829B51
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: HandleModule$AddressFreeLibraryProc
                                                  • String ID:
                                                  • API String ID: 3947729631-0
                                                  • Opcode ID: 9a4319b1a9349b175a2ab261d3967c41928b3e2b203d956efbe5c9eb3dbfe620
                                                  • Instruction ID: 1fc59b4a59ae85b46f6b9166bdbff0bb4c7d0c063c157e92636b79c63da886d1
                                                  • Opcode Fuzzy Hash: 9a4319b1a9349b175a2ab261d3967c41928b3e2b203d956efbe5c9eb3dbfe620
                                                  • Instruction Fuzzy Hash: 84214AB6A00B848EEB268F65C8443EC37B0E758758F545B2AF72947AE5DF38C585CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: d348ac23900305c462c0690c0df5af421cd1f821f12a258e8e5c958353d8cc37
                                                  • Instruction ID: 963f332baa30f0764726ce0e89d6d1f8c441babd3b41037a9d74ad3d40288263
                                                  • Opcode Fuzzy Hash: d348ac23900305c462c0690c0df5af421cd1f821f12a258e8e5c958353d8cc37
                                                  • Instruction Fuzzy Hash: F6219672214EC087DB669F6AE4403A977B1E788BD4F644224F75D4B6F5DB39C8008B00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 277766cc613ac521deff1262cc5973a4c6dda0ce244441028124d0478fb53980
                                                  • Instruction ID: 76031a156d145f1e75ff053a72b768cc5537241a87ef5f05dfead53edc72914a
                                                  • Opcode Fuzzy Hash: 277766cc613ac521deff1262cc5973a4c6dda0ce244441028124d0478fb53980
                                                  • Instruction Fuzzy Hash: 11119631224A4481FA62DF9394107EEA3B4F78DBC8F444421FB94577B6DB7DC8418B52
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: send
                                                  • String ID:
                                                  • API String ID: 2809346765-0
                                                  • Opcode ID: 7b014de7d978259952d8fbf9b19179fb3552117fbf4d6986a0cc05869dadf4b1
                                                  • Instruction ID: ed63c22e22b379f3c336386ece21b3ad8a2337843b1b8e3a89cebf0bef14ddfa
                                                  • Opcode Fuzzy Hash: 7b014de7d978259952d8fbf9b19179fb3552117fbf4d6986a0cc05869dadf4b1
                                                  • Instruction Fuzzy Hash: DE016D36718A8881EB518F2BBA4076AA7A0F78CFD4F589135EF9D43B58DA38C8418740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 68ea0e6e30933e9dd76abf56f21314c638998a57c534cc3687c594a1fb5b02e7
                                                  • Instruction ID: 12817fefe43cbe0e35e8e44782809c7bb200d723c329c7900ab39acf6a87230c
                                                  • Opcode Fuzzy Hash: 68ea0e6e30933e9dd76abf56f21314c638998a57c534cc3687c594a1fb5b02e7
                                                  • Instruction Fuzzy Hash: 8BE092B121674085EF267BBBA1813AD65509B0C7F0F548321B774076F6DB74C8604B01
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFindNext
                                                  • String ID:
                                                  • API String ID: 2029273394-0
                                                  • Opcode ID: 05abf0131c8b098d1a61f2295ae7c7f0a4315664c5cc964735d2d131e1c6be8e
                                                  • Instruction ID: d77e7af20007b7e33648d6574d0470e4b7856eca6e046ac06dd638d9c475ad65
                                                  • Opcode Fuzzy Hash: 05abf0131c8b098d1a61f2295ae7c7f0a4315664c5cc964735d2d131e1c6be8e
                                                  • Instruction Fuzzy Hash: 16C09238F16902D2E65A2FB75CC338A12E0AB9C780F844020E304822B1DA3C81E7CB31
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoNativeSystem
                                                  • String ID:
                                                  • API String ID: 1721193555-0
                                                  • Opcode ID: a58d1d1940ea9a1276aa9ae53fd9a4567027d1a2ff5bbf1696185df6648e20bf
                                                  • Instruction ID: 2d4ebf22e8ea44c3de85ce703a090383597d96474293fc5e484319a26ec3cfd3
                                                  • Opcode Fuzzy Hash: a58d1d1940ea9a1276aa9ae53fd9a4567027d1a2ff5bbf1696185df6648e20bf
                                                  • Instruction Fuzzy Hash: 2AB09236A148C0E7C612EB04E8422497331FB98B18FD00000E38943624CF2CDA2A8E10
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocHeap
                                                  • String ID:
                                                  • API String ID: 4292702814-0
                                                  • Opcode ID: e225fa2b0dbec660310bef0d9b6d64f65c59680a2a45183e3c4b35eee9a22bf5
                                                  • Instruction ID: 02b13d49a3f81dd7a96231731d72b5532a686b3fe38c3284392ef13d9092b2b0
                                                  • Opcode Fuzzy Hash: e225fa2b0dbec660310bef0d9b6d64f65c59680a2a45183e3c4b35eee9a22bf5
                                                  • Instruction Fuzzy Hash: C8F0377A39524456FE675BB368113E962905B4C7E0F4857217F26873F1DE7CC441C610
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrcat$AllocateInitLockMemoryObjectStringUnicodeVirtual$AcquireEnumerateFolderFreeInitializeKnownLoadedModulesPathReleaseTaskUninitialize
                                                  • String ID: 0
                                                  • API String ID: 1424456515-4108050209
                                                  • Opcode ID: f9a4b21bba6b5778666b90edc385f803ff7b984533bf3915daa45dc885927a08
                                                  • Instruction ID: e604d7167b34311c8e0fe99e090bcd918b4f7d2940aac51addfe585592677c6d
                                                  • Opcode Fuzzy Hash: f9a4b21bba6b5778666b90edc385f803ff7b984533bf3915daa45dc885927a08
                                                  • Instruction Fuzzy Hash: F8C2B836626F988AD7908F69E88169EB3B5F788B88F105215FFCD57B18EB38C154C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Close$ErrorFileFindHandleLast$AttributesFirst__std_fs_open_handle
                                                  • String ID:
                                                  • API String ID: 2398595512-0
                                                  • Opcode ID: 49566460a907a601e1f093275e7cedc738230c471b32bdcbe51d950a59750163
                                                  • Instruction ID: bd0a7feb077c907354969762849b34151d67fe78fda9ec3b2a3bd20647f569a0
                                                  • Opcode Fuzzy Hash: 49566460a907a601e1f093275e7cedc738230c471b32bdcbe51d950a59750163
                                                  • Instruction Fuzzy Hash: 42914131310E0146EAB69FABA8547EA62A0AB9E7F4F144714FB76477F4DB3CC8458710
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Handle$Query$CloseInformationProcessSystem$AddressCurrentFinalModuleNameObjectOpenPathProc
                                                  • String ID: File$NtDuplicateObject$ntdll.dll
                                                  • API String ID: 2729825427-3955674919
                                                  • Opcode ID: bf9a0ccce2cd6c5d3e29f71ce3efbea8b02204595c9946da31666db7e6f30529
                                                  • Instruction ID: 88f1b79f6286c0e5e0663165defaf3d7e800104a22575653cc64f1d0f6badeec
                                                  • Opcode Fuzzy Hash: bf9a0ccce2cd6c5d3e29f71ce3efbea8b02204595c9946da31666db7e6f30529
                                                  • Instruction Fuzzy Hash: 60E19D73B14A8089FB12DBA6D4143ED23A1F759BD8F408521EF5D57BA9DE38C64A8300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID: @
                                                  • API String ID: 2538663250-2766056989
                                                  • Opcode ID: a125fe2303840c706b5ee053514d2150593645abf7ef0f0a97918224f0960ca1
                                                  • Instruction ID: 316128c581b16c4d3f4b3da09d2500f057a97763de5d99de1d399ef9cdafa0b3
                                                  • Opcode Fuzzy Hash: a125fe2303840c706b5ee053514d2150593645abf7ef0f0a97918224f0960ca1
                                                  • Instruction Fuzzy Hash: C6A14872B04A808AF722CF76E41479D7771B78CB98F104225EF9A17AA8EB39C555C384
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: .cmd$.exe$.exe$.ps1$.vbs$abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+=-&^%$#@!(){}[},.;'$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$open$runas
                                                  • API String ID: 587946157-4093014531
                                                  • Opcode ID: 3919d5103fc52e39aa8093160adb8a9ff8b111d864faf494cefd85f1eaf09e41
                                                  • Instruction ID: 1c4fe17788cb8f09727e1eb0c249120cc654e615ca3ad5b5903190ad2158ec18
                                                  • Opcode Fuzzy Hash: 3919d5103fc52e39aa8093160adb8a9ff8b111d864faf494cefd85f1eaf09e41
                                                  • Instruction Fuzzy Hash: 78229D72A10B8099EB11DF3AE8843DD77A1F789798F505216FB5D07AA9EF78C584C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Crypt$AlgorithmConcurrency::cancel_current_taskGenerateOpenPropertyProviderSymmetric
                                                  • String ID: AES$ChainingMode$ChainingModeGCM
                                                  • API String ID: 2222192889-1213888626
                                                  • Opcode ID: 9a1a3cd6e6ddd17ddf90823c6e7be3f2930cf914a1463a096f49e54039a43834
                                                  • Instruction ID: 8d1d121c70002e2b68f3aba67cbb1f4ecb0d904613cd8cca5b9a22352f8360ed
                                                  • Opcode Fuzzy Hash: 9a1a3cd6e6ddd17ddf90823c6e7be3f2930cf914a1463a096f49e54039a43834
                                                  • Instruction Fuzzy Hash: B061D472700B8482EB269B66E8407E96760E78DBE8F544725BF6C07BF6DB78C5918300
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID: *$.
                                                  • API String ID: 1164774033-3886413389
                                                  • Opcode ID: 1ad28d0ae4af48d40e9119588df1c5008e8f9d7b3627aa4813c3e566a8eb1879
                                                  • Instruction ID: bb8dae3c1409eb6689c1f28325972438da041be7112d086679c92e1d07e8a173
                                                  • Opcode Fuzzy Hash: 1ad28d0ae4af48d40e9119588df1c5008e8f9d7b3627aa4813c3e566a8eb1879
                                                  • Instruction Fuzzy Hash: D7A1D82BB1865741EA62AF2394853B9E350EB44FE4FC45533EA9E47BC9DE3CE4418312
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
                                                  • String ID: utf8
                                                  • API String ID: 3069159798-905460609
                                                  • Opcode ID: b6b5f0871776deda8e7c69fea737524f09f83080a3327ccb47b1bd94534ebeda
                                                  • Instruction ID: d5ac7b476c8a9bce444684ebd37fc73749f6f001cbd1fa0b2ab8da16a1f6a6e0
                                                  • Opcode Fuzzy Hash: b6b5f0871776deda8e7c69fea737524f09f83080a3327ccb47b1bd94534ebeda
                                                  • Instruction Fuzzy Hash: 74918E36700B4081EB669F23D941BED63A4E7ACBC0F448221EF4D477A6EB78C592CB50
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                                                  • String ID:
                                                  • API String ID: 2591520935-0
                                                  • Opcode ID: b1335ece248e5c8e3195e4a98367805ba8d0dabbc837c8d301c8a4141c46c529
                                                  • Instruction ID: eff23689320ff5adc5df77f7c9cc30a6b599853c8a01bd4f4dfa4f293dad0dfa
                                                  • Opcode Fuzzy Hash: b1335ece248e5c8e3195e4a98367805ba8d0dabbc837c8d301c8a4141c46c529
                                                  • Instruction Fuzzy Hash: E6718E3270060099FB629B62D850BED33B4BB5CBC4F448625EF59577E5EB38C98ACB50
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 703016598f4b49543d9c9636df41fb7a299657f8bb96d1c8adaf98595dcbe2c0
                                                  • Instruction ID: a19f4d4dd226900b17526e20b5fafa90e03417e286ce2ffd30ddf7d13e5ead07
                                                  • Opcode Fuzzy Hash: 703016598f4b49543d9c9636df41fb7a299657f8bb96d1c8adaf98595dcbe2c0
                                                  • Instruction Fuzzy Hash: 67316576608B8586EB609F61F8907EDB360FB44B44F84443ADA4E87B99EF38D548C721
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 3140674995-0
                                                  • Opcode ID: 3efb770cfb16d5d0ed57f42d694c11b3d6a4fbf3d96f685e31a20390ead54e25
                                                  • Instruction ID: 9f7744655287aa887559b9cff32dfa778d51491bd1e8afa760c84834dbf292cd
                                                  • Opcode Fuzzy Hash: 3efb770cfb16d5d0ed57f42d694c11b3d6a4fbf3d96f685e31a20390ead54e25
                                                  • Instruction Fuzzy Hash: B0315072615B8086EB619F61E8403ED7374F798784F44452AEB4E47BA8DF78C649CB10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_exception_destroy
                                                  • String ID: value
                                                  • API String ID: 2453523683-494360628
                                                  • Opcode ID: 82c3d6565131afdded86e4ebd0b109237adc3dcd0665d894327a522c76d62dca
                                                  • Instruction ID: 4e7bf3bedcc79ae228617acf5de83c008c58e0c15488d6f1396da54890448ec7
                                                  • Opcode Fuzzy Hash: 82c3d6565131afdded86e4ebd0b109237adc3dcd0665d894327a522c76d62dca
                                                  • Instruction Fuzzy Hash: 18028E72614BC095EB02CB76D8803ED6761E79A7E4F605612FB9D43AEADF78C185C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 84edda72ec9d520141983e74228c668a6a8178568ee7aa51ae599cd2c23f2f3d
                                                  • Instruction ID: ad0f95758fd167a0fd64ab865eefe04252a62a320204b8bc2b7d772ca4270480
                                                  • Opcode Fuzzy Hash: 84edda72ec9d520141983e74228c668a6a8178568ee7aa51ae599cd2c23f2f3d
                                                  • Instruction Fuzzy Hash: 16318736608F8186DB60DF25E8507AEB3A0FB84B54F900136EA9D87B59EF3CD545CB11
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 18b3e5fdd1cd8cc2a5e6ef0b7725685d0a25d59a69a4c718c7a281717e56691c
                                                  • Instruction ID: d26cc2fd36ed465307e52bae6993abbfc5e3a174f8213072b128481ce9152def
                                                  • Opcode Fuzzy Hash: 18b3e5fdd1cd8cc2a5e6ef0b7725685d0a25d59a69a4c718c7a281717e56691c
                                                  • Instruction Fuzzy Hash: E9315E32614B8096DB61CF26E8403EE73A4F788794F544226FB9D43BA9DF38C5568B00
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Crypt$AlgorithmProvider$CloseGenerateOpenPropertySymmetric
                                                  • String ID: content$filename$ios_base::badbit set
                                                  • API String ID: 4024084497-879919306
                                                  • Opcode ID: 14c71fb6276344ef19c53a2a71fb7fb04c5672c6c98d0b482d8362fcc0b25232
                                                  • Instruction ID: 6a15648fd45475ec90e58d21107993b85f51eda2aafa867f6bfef3ffdab46c03
                                                  • Opcode Fuzzy Hash: 14c71fb6276344ef19c53a2a71fb7fb04c5672c6c98d0b482d8362fcc0b25232
                                                  • Instruction Fuzzy Hash: EF82D132119BC595D6B28B15F8803DAB3A4F7C9780F505226EBCD53BA9EF78C594CB40
                                                  APIs
                                                  Strings
                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00000001400BC147
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DebugDebuggerErrorLastOutputPresentString
                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                  • API String ID: 389471666-631824599
                                                  • Opcode ID: 43761d7ed95dfb62d4f325219cf79311bad23dd39b30918d63012676194dbb3d
                                                  • Instruction ID: b65f4da7e0dac3f6acdcda201eed9de570067186433dc723f279dd9dd717984a
                                                  • Opcode Fuzzy Hash: 43761d7ed95dfb62d4f325219cf79311bad23dd39b30918d63012676194dbb3d
                                                  • Instruction Fuzzy Hash: 90115A32210B40A7FB469B67E6953E933A4FB48794F448125D74983AA1EF78D0B8C750
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Virtual$AllocInfoProtectQuerySystem
                                                  • String ID:
                                                  • API String ID: 3562403962-0
                                                  • Opcode ID: 98c2ba8c49363c7f84277756ec2bc7ed58b48c13a2b72fa2159cecfb20083f2f
                                                  • Instruction ID: 2998d681f4290f3cdbfd7160d335f1a03f64a6088aad891686837b0353e6d884
                                                  • Opcode Fuzzy Hash: 98c2ba8c49363c7f84277756ec2bc7ed58b48c13a2b72fa2159cecfb20083f2f
                                                  • Instruction Fuzzy Hash: 45312632310A819EDB21CF22D8447DD63A5F749B88F844525AA4E47B68DA38D646C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FormatInfoLocaleMessage
                                                  • String ID: !x-sys-default-locale
                                                  • API String ID: 4235545615-2729719199
                                                  • Opcode ID: 55a1076e367a08c173ecc78b5cea65c2f0ec9f8033976bc3287741c8c55a0f17
                                                  • Instruction ID: ecd46ce48cd802a89ea887e817bce2d3b7e480950ffb0d184572ec913a52b2bd
                                                  • Opcode Fuzzy Hash: 55a1076e367a08c173ecc78b5cea65c2f0ec9f8033976bc3287741c8c55a0f17
                                                  • Instruction Fuzzy Hash: 73018CB2704B8182E7268B53B4507AAA7A5F788BD4F088015EB4547AA9DB3CC505C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 1791019856-0
                                                  • Opcode ID: 673738c239811e8e6aaf94bb473114a5deef8476c39fa87607a7713143cb4c6a
                                                  • Instruction ID: 9e1b7eb3e14f3d8ac36dcfc1f2b4f11521ad031e9c983c2225f320651a2be65f
                                                  • Opcode Fuzzy Hash: 673738c239811e8e6aaf94bb473114a5deef8476c39fa87607a7713143cb4c6a
                                                  • Instruction Fuzzy Hash: 6761C3722106419AEB368F12E940BED73A5F7A87C4F04C225EB9E976E1DB3CD591CB10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: GetLocaleInfoEx
                                                  • API String ID: 2299586839-2904428671
                                                  • Opcode ID: 2b548483d6ca9974e9528b0b11ada6c599aa6070ea1349b93d38a40a587da536
                                                  • Instruction ID: faaad8ddc682d51d181ac9566c78053e2375318c11b0efb789bebad2f8088488
                                                  • Opcode Fuzzy Hash: 2b548483d6ca9974e9528b0b11ada6c599aa6070ea1349b93d38a40a587da536
                                                  • Instruction Fuzzy Hash: E8016D71704B8096EB469B57F4447DAA760EB9CBD0F584026FF4907BB9CE38C5428750
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CryptDecrypt
                                                  • String ID:
                                                  • API String ID: 2620231605-0
                                                  • Opcode ID: 3f72a23f1a509a65aa81e6d6b4530ce515d9c6eb0a3b9f4af59a408d351eb8e9
                                                  • Instruction ID: d84c1dc56733cdec245b05dd482f086fb593878f4377b85cef3af088a038052b
                                                  • Opcode Fuzzy Hash: 3f72a23f1a509a65aa81e6d6b4530ce515d9c6eb0a3b9f4af59a408d351eb8e9
                                                  • Instruction Fuzzy Hash: 1FB16872B08B809AEB12CB66E4507AD37B1F3497C8F008216EF5C17BA9DB79C599D340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CryptDataFreeLocalUnprotect
                                                  • String ID:
                                                  • API String ID: 1561624719-0
                                                  • Opcode ID: e459822f5a965e7c6491091ff3b3fd437f3160b492302602bf1c7777a9c0efb9
                                                  • Instruction ID: 4a8dd4eae84605777de1b5a55a80b2e635676b3498c47d1070251cd38370cd5e
                                                  • Opcode Fuzzy Hash: e459822f5a965e7c6491091ff3b3fd437f3160b492302602bf1c7777a9c0efb9
                                                  • Instruction Fuzzy Hash: DB616932B14B809AF712DFB5E4503DD77A1E75978CF008229EB8917EAADB78C5A49340
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CryptDataFreeLocalProtect
                                                  • String ID:
                                                  • API String ID: 2714945720-0
                                                  • Opcode ID: cb202edfd23743d2fd92808a2a0732f52d9921990abee17e7841283a167b08e9
                                                  • Instruction ID: fc4154c7915ed78d34f09a56cb44b59f23928a8851b000cbb18bd55c4212d758
                                                  • Opcode Fuzzy Hash: cb202edfd23743d2fd92808a2a0732f52d9921990abee17e7841283a167b08e9
                                                  • Instruction Fuzzy Hash: A5414032614B80CAE3219F75E8403ED37A4F75878CF084229BB8917E9ADB79C6A4C754
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastValue$InfoLocale
                                                  • String ID:
                                                  • API String ID: 673564084-0
                                                  • Opcode ID: fded36e5e65a151f08a0f66363fda748c04ed3a24ba9da3fcc630165be26dd08
                                                  • Instruction ID: 8cd3d3dfa80cbff10c7d00d3e39445a1fedefada0f8de76d674014353bb7882c
                                                  • Opcode Fuzzy Hash: fded36e5e65a151f08a0f66363fda748c04ed3a24ba9da3fcc630165be26dd08
                                                  • Instruction Fuzzy Hash: 8F31A23270468586EB69CB23E8417EE73A1F79C7C5F40C229AB4D833A6DF38D5918B00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystemValue
                                                  • String ID:
                                                  • API String ID: 3029459697-0
                                                  • Opcode ID: 079d62a3b16f0b0a01b59833b99c059b9cb939bc8a4f10147e07732002005d14
                                                  • Instruction ID: 46995d5bafc0c3402748cc3b4101f87f573535573610cbd06ba996400d9f120b
                                                  • Opcode Fuzzy Hash: 079d62a3b16f0b0a01b59833b99c059b9cb939bc8a4f10147e07732002005d14
                                                  • Instruction Fuzzy Hash: B411E473A146448AEB168F16D844BDC7BA0F3A4BE0F558216E719433E4DB38C5D1CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$InfoLocaleValue
                                                  • String ID:
                                                  • API String ID: 3796814847-0
                                                  • Opcode ID: f3e7ee2f1e66ffaf43a4bced11d96202e06a1caf3c24797c856a856d3c8d1eb4
                                                  • Instruction ID: f16e9421c9f2d1d566c09731a7727aa721697d00e81b9315a0a2733411359802
                                                  • Opcode Fuzzy Hash: f3e7ee2f1e66ffaf43a4bced11d96202e06a1caf3c24797c856a856d3c8d1eb4
                                                  • Instruction Fuzzy Hash: F411A73271465183E77AC626A840F9E7261E79C7E4F548761E76D476E4DA36CCC18B00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystemValue
                                                  • String ID:
                                                  • API String ID: 3029459697-0
                                                  • Opcode ID: 74688f5bb3302222e7b7870a00f7552f5ce206872596a426f55045067d3bf4cb
                                                  • Instruction ID: 93d18b90c9ad416a7767668315f223f5f191bc074b56e8ec44abd2766402557f
                                                  • Opcode Fuzzy Hash: 74688f5bb3302222e7b7870a00f7552f5ce206872596a426f55045067d3bf4cb
                                                  • Instruction Fuzzy Hash: 0101F77270428086E7264F17E840FDEB6E5E768BE4F45C322E769472E5DB7484C5CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AlgorithmCloseCryptProvider
                                                  • String ID:
                                                  • API String ID: 3378198380-0
                                                  • Opcode ID: 1c8b21d10fd9b400f35e2c8dd6f8ddd75c7af018214b600343906388e6c3a10d
                                                  • Instruction ID: 900497187b3b4a0feb06abdb1ee795e4bdb6587cd79a1e1914cdb7c24f71ecd3
                                                  • Opcode Fuzzy Hash: 1c8b21d10fd9b400f35e2c8dd6f8ddd75c7af018214b600343906388e6c3a10d
                                                  • Instruction Fuzzy Hash: 3601C2B2700A8491EB159B22D4147AD2361E74CFC8F944411EF4D076A9EF7DC8958380
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnumLocalesSystem
                                                  • String ID:
                                                  • API String ID: 2099609381-0
                                                  • Opcode ID: 12efd337fa0535e7eae3a7ae34cc0435095ae515fa5323edd15366a4afb89750
                                                  • Instruction ID: af0fca8f4bd2b2ee9942c1d59f6fd3f147f5c30faaa08c128de7f41e83c5a0a7
                                                  • Opcode Fuzzy Hash: 12efd337fa0535e7eae3a7ae34cc0435095ae515fa5323edd15366a4afb89750
                                                  • Instruction Fuzzy Hash: 01F032B2300B4083E705DB6AE8917D963A2F7ADBC0F158129EB4987379DE3CC9A1C740
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 65fcb47a17adf94f373ff647ddafb07328eb1c747429ddd71517b78256354565
                                                  • Instruction ID: feaac658b55cd5a518db28881bd34f119ec81d8d184e8a90d42a3b47355d6b8e
                                                  • Opcode Fuzzy Hash: 65fcb47a17adf94f373ff647ddafb07328eb1c747429ddd71517b78256354565
                                                  • Instruction Fuzzy Hash: 0AF0CDABA1D7D45AE35356250C7E3CC2FA19BAAFA2F8D804AAB40835D3905A0C079361
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8237b216de9d9a066abcd393a2c4069bfa76417ce4e254e20f0625e9b59a03dd
                                                  • Instruction ID: f7555e13b67f83bd5e4671688c2997cb84ca8aa1e17461c55e46489618308b5b
                                                  • Opcode Fuzzy Hash: 8237b216de9d9a066abcd393a2c4069bfa76417ce4e254e20f0625e9b59a03dd
                                                  • Instruction Fuzzy Hash: 11E09AA761EBD04EE3634A350C2938C2FB09BA6F90F8E8097D790832D3D45D0C0A8731
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c2580bbaa354115e7f20c0c041466b1133d77912a340e4dfa20e2b14a994162f
                                                  • Instruction ID: 807357067a33cd9dbbc180bd060d868107053995f6cb2ef0b650bc1105693623
                                                  • Opcode Fuzzy Hash: c2580bbaa354115e7f20c0c041466b1133d77912a340e4dfa20e2b14a994162f
                                                  • Instruction Fuzzy Hash: 7CE04F97A4EAC01DF31742600E3F74C1ED15F7AB01F4C808ED784036E3B89D6D058221
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 013c9eb1bbae44dc1fe28faa0fbcf7e9e22a98f8467d9c8eac31ad16be168e19
                                                  • Instruction ID: 0f0087ff7abf1e05183dbc0c12280a4f3ab72410a3df019b4580b266f686766c
                                                  • Opcode Fuzzy Hash: 013c9eb1bbae44dc1fe28faa0fbcf7e9e22a98f8467d9c8eac31ad16be168e19
                                                  • Instruction Fuzzy Hash: 89A002FBA548A4ADF77A04058C867C80BD1AF2E350E090000A900434925069445F1150
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a2399e545077be4c239cdb40de846485da12f3b9bab83b8262a0220d2cfdd1bc
                                                  • Instruction ID: 8ce1e87cc5c7ca1878e14d3a9fd1ee2c8b6aee086471b09dfc4fcf91158af670
                                                  • Opcode Fuzzy Hash: a2399e545077be4c239cdb40de846485da12f3b9bab83b8262a0220d2cfdd1bc
                                                  • Instruction Fuzzy Hash:
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f01a4154ba30de378ee8f3a0bf3b2dfb59d47392f9fc814d815bb3a6ccc76d7c
                                                  • Instruction ID: da55c2c18e9676a3eb711f31b27adcba68c4fdb093675fe9984136224095ec55
                                                  • Opcode Fuzzy Hash: f01a4154ba30de378ee8f3a0bf3b2dfb59d47392f9fc814d815bb3a6ccc76d7c
                                                  • Instruction Fuzzy Hash:
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$Process32Token$InformationNextOpenProcess$ConvertCreateErrorFirstLastSnapshotStringToolhelp32
                                                  • String ID:
                                                  • API String ID: 3925315391-0
                                                  • Opcode ID: 7edf554f1bf2a2b69477646fe94745f43607bc3d76044443717152cf58783ea9
                                                  • Instruction ID: f53f4db26f8ffbc74954225dbf8234fb85c2b61d4e8944f31e63d5fabcb49364
                                                  • Opcode Fuzzy Hash: 7edf554f1bf2a2b69477646fe94745f43607bc3d76044443717152cf58783ea9
                                                  • Instruction Fuzzy Hash: 66813736214B8182FB529B27E84479EA7A4FB8CBD4F404125EF8A57BA8DF7CC545CB00
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: No closed word$key declared, but no value$key opened, but never closed$object is not closed with '}'$quote was opened but not closed.$unexpected '}'$unexpected key without object$word wasnt properly ended
                                                  • API String ID: 0-2700065129
                                                  • Opcode ID: b9eb38c5ab060a2dda8520568620628a99a67b8189105732fd21080a6df660b0
                                                  • Instruction ID: f9c7333ff1f4887109b71b21fa7058ec3d63239c43aa84505dd9f7712b489e47
                                                  • Opcode Fuzzy Hash: b9eb38c5ab060a2dda8520568620628a99a67b8189105732fd21080a6df660b0
                                                  • Instruction Fuzzy Hash: 0BB11071601AC6A5EB72DF21DC917D833A4F759388F415216E74C4B9B9EF74C689C700
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: 0$0$0
                                                  • API String ID: 3215553584-3137946472
                                                  • Opcode ID: 4b936a4394e80428ad7bf41d875096a3e7add69c0315c25dc0869b4c3066c4ac
                                                  • Instruction ID: 3ec9a172ff9cd9a56723fab73356c2b78239a766e83f6ecce63c72710ed58d98
                                                  • Opcode Fuzzy Hash: 4b936a4394e80428ad7bf41d875096a3e7add69c0315c25dc0869b4c3066c4ac
                                                  • Instruction Fuzzy Hash: 55E1D3335056D58AF7629F2A94903ED3BA5F35ABC4F588022FB85477F2C7398A5AC301
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name$false$true
                                                  • API String ID: 164343898-1062449267
                                                  • Opcode ID: 89e8eebeb0e5851c78bde8427c4241be1561912327ea848c90b167f0a42bcdf2
                                                  • Instruction ID: 9f833d7ac4b076529d01c46f3f154de4dc3d8a729371acaec3c7ca5394b3b07c
                                                  • Opcode Fuzzy Hash: 89e8eebeb0e5851c78bde8427c4241be1561912327ea848c90b167f0a42bcdf2
                                                  • Instruction Fuzzy Hash: F7711B32702B408AEB16DFB2D4503EC37B6EB58788F144129EB4967BA9DB38C515D344
                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,?,?,00007FF7E4E39B6C,?,?,00000000,00007FF7E4E3BCDB,?,?,?,00007FF7E4E36809), ref: 00007FF7E4E39D18
                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF7E4E39B6C,?,?,00000000,00007FF7E4E3BCDB,?,?,?,00007FF7E4E36809), ref: 00007FF7E4E39D24
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: MZx$api-ms-$ext-ms-
                                                  • API String ID: 3013587201-2431898299
                                                  • Opcode ID: a5097e6e42886596c98c0385f634c4aef1c640e8f28c7c219958798091b78743
                                                  • Instruction ID: 672fff71cef5829e4ecab3e383766a6b11fc4a617cacda937379c3a9c14a6a21
                                                  • Opcode Fuzzy Hash: a5097e6e42886596c98c0385f634c4aef1c640e8f28c7c219958798091b78743
                                                  • Instruction Fuzzy Hash: 0541FF66B19A0341EB17EF17A8A0775A2D5BF48F90F885536CD4D87788EF3CE4068322
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Session$ListProcess$CurrentRegisterResourcesStart
                                                  • String ID:
                                                  • API String ID: 3299295986-0
                                                  • Opcode ID: d42b2751b4845f6e5fc378a235a32170e364fb9c24da67feea4ad67c232641f0
                                                  • Instruction ID: 3625db88a6373b96de9670bab8ed7edf633392ac4bb2a85a491946533c032ab6
                                                  • Opcode Fuzzy Hash: d42b2751b4845f6e5fc378a235a32170e364fb9c24da67feea4ad67c232641f0
                                                  • Instruction Fuzzy Hash: A6512A32B10A418AF725CFA6E4507DD33B1B74C7D8F90452AEE0A63BA8DE38C906C750
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 0099af5d98ffdce3721754b948236ddbf4b8c0d9695b8f044c3694728437dd46
                                                  • Instruction ID: 4a8ad397a79cc99d1452e9872f915c247bcf326e907c62c69331acbf9bbb4070
                                                  • Opcode Fuzzy Hash: 0099af5d98ffdce3721754b948236ddbf4b8c0d9695b8f044c3694728437dd46
                                                  • Instruction Fuzzy Hash: 4ED18F76A0874286EB21EF66D4813ADB7A0FB45B88F900136EE8D57795CF38E481C752
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 849930591-393685449
                                                  • Opcode ID: 66fcb54f63042a77bb9752ac00b10eb6a43643c2f85347937ebb7186689712c3
                                                  • Instruction ID: 2dddcf81e393266e6dd364431a01f1ce124f9e37c2573fe0043309711653aeb7
                                                  • Opcode Fuzzy Hash: 66fcb54f63042a77bb9752ac00b10eb6a43643c2f85347937ebb7186689712c3
                                                  • Instruction Fuzzy Hash: 9BD14A72A04B808AEB22DFA694413DD77B0F759BD8F104216EF8957BA6DF38D491CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: FileModuleName
                                                  • String ID: @$U$h
                                                  • API String ID: 514040917-1769436074
                                                  • Opcode ID: 30403d80bbda924b6a9616881aacd3132cf0f86eb79a681510f7f61da3fc2d23
                                                  • Instruction ID: 1e3365fd5add29436541bd292b1ea0f080156eace45c6b3a35aa9fd3f751da81
                                                  • Opcode Fuzzy Hash: 30403d80bbda924b6a9616881aacd3132cf0f86eb79a681510f7f61da3fc2d23
                                                  • Instruction Fuzzy Hash: C6711B7A60CB8681DA60DF46F4903AAB760FBC9B94F405126EACE83B59DF3CD0458F51
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3013587201-537541572
                                                  • Opcode ID: 2932ed60a38164b99968e515f80e2e6bc9311783d2898aba8cd640b210738e5b
                                                  • Instruction ID: 8b663572d4e9df061dfb5452e7c122c2f59b72ac8eb05063979d288c5e28a2e1
                                                  • Opcode Fuzzy Hash: 2932ed60a38164b99968e515f80e2e6bc9311783d2898aba8cd640b210738e5b
                                                  • Instruction Fuzzy Hash: 7641C4B1721B1082FA17DB17A914BDA27D5BB4DBE0F4A4529FF098B7A4DE3CD4868300
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF7E4E3D72E,?,?,?,00007FF7E4E398A4,?,?,?,00007FF7E4E364AD), ref: 00007FF7E4E3D7E1
                                                  • GetLastError.KERNEL32(?,?,?,00007FF7E4E3D72E,?,?,?,00007FF7E4E398A4,?,?,?,00007FF7E4E364AD), ref: 00007FF7E4E3D7EF
                                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF7E4E3D72E,?,?,?,00007FF7E4E398A4,?,?,?,00007FF7E4E364AD), ref: 00007FF7E4E3D819
                                                  • FreeLibrary.KERNEL32(?,?,?,00007FF7E4E3D72E,?,?,?,00007FF7E4E398A4,?,?,?,00007FF7E4E364AD), ref: 00007FF7E4E3D887
                                                  • GetProcAddress.KERNEL32(?,?,?,00007FF7E4E3D72E,?,?,?,00007FF7E4E398A4,?,?,?,00007FF7E4E364AD), ref: 00007FF7E4E3D893
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: MZx$api-ms-
                                                  • API String ID: 2559590344-259127448
                                                  • Opcode ID: 5289a04243e8a248cb5820b37202154a20ba6c64b1fa020b3a1c062f1bb2b80b
                                                  • Instruction ID: b8ea4295c107d053e6a5ac8fe7a67d8027b0bb33e2b8b7e4c96f5c9ff7e6094d
                                                  • Opcode Fuzzy Hash: 5289a04243e8a248cb5820b37202154a20ba6c64b1fa020b3a1c062f1bb2b80b
                                                  • Instruction Fuzzy Hash: A0318125A1A64391EE13BF03A890A75A2A8BF48F64F890536DD5D47794EF3CF4458322
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseFileHandleOpenRead
                                                  • String ID: File Downloader
                                                  • API String ID: 4038090926-3631955488
                                                  • Opcode ID: ef0b4a100551ad57f85878d3ad68814330c2d85b7b679f70ec8f93c3db496011
                                                  • Instruction ID: 0399ce1682de07f0aa1206abe99c22717857691dc5a833c9d493158f508467bf
                                                  • Opcode Fuzzy Hash: ef0b4a100551ad57f85878d3ad68814330c2d85b7b679f70ec8f93c3db496011
                                                  • Instruction Fuzzy Hash: C5316732214B8082EB218F26F85479AB3A0FB89BC4F585115FF8943B69DF7DC5928B00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: f$p$p
                                                  • API String ID: 3215553584-1995029353
                                                  • Opcode ID: eea83e675726579202ae46558f478e57f494447b85c4049c91ddb9471f815998
                                                  • Instruction ID: b8dc3e9cdc22bec2f5ab832ac5804bf8a86bae0c64d7de0205dfc1d31eeff702
                                                  • Opcode Fuzzy Hash: eea83e675726579202ae46558f478e57f494447b85c4049c91ddb9471f815998
                                                  • Instruction Fuzzy Hash: 4F12B27260924286FB26AF17E0547FEB6A1F3587D4FD94116F79247AE4D738C980CB10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                                  • String ID: api-ms-
                                                  • API String ID: 2559590344-2084034818
                                                  • Opcode ID: 996ade3048ece8fd6c5d5c54d4ec564cddc8ae1be39e9acb717a9eca008d3d5f
                                                  • Instruction ID: cc2d99b39676e9a48d292cfa973c6d7b264006a7d65043fdb1f58a40d0113fec
                                                  • Opcode Fuzzy Hash: 996ade3048ece8fd6c5d5c54d4ec564cddc8ae1be39e9acb717a9eca008d3d5f
                                                  • Instruction Fuzzy Hash: 8C315A31312A4092EE279F97A90479923A4BB5CBE4F4A4525FE2A4B7B4EF38D446C350
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: bee91ac4fc1df0eaa3ab10e4276ba3f484bc5e8253822d5f97decf6bc27b5b6b
                                                  • Instruction ID: 4b4d8deacd497249436f39071c19fb311b5fdefea0622a1cc046aa47ab187ae1
                                                  • Opcode Fuzzy Hash: bee91ac4fc1df0eaa3ab10e4276ba3f484bc5e8253822d5f97decf6bc27b5b6b
                                                  • Instruction Fuzzy Hash: 2921937070824042FA6767775A927EE52928B4C7F0F544B28BF3657BF6DE38C4524B01
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: eccb84783a33b6acb2369927ad856cb4a6f1e39df1dbbcb1c74e1911e2e9c731
                                                  • Instruction ID: eae4bfb8c083e0692cd4f6268983dec34201a1e8c08b7e627dacda113d9eb37c
                                                  • Opcode Fuzzy Hash: eccb84783a33b6acb2369927ad856cb4a6f1e39df1dbbcb1c74e1911e2e9c731
                                                  • Instruction Fuzzy Hash: 6611B421718A4582E7509F12F864729A3A0FB48FE4F941235D95DC7B98DF3CD8448755
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 423033ad9a26eeb1fe2838e88a30b5d5e8e126e9df3eade86433f6e59bd70d34
                                                  • Instruction ID: dccac7cf86dd691c8986e58b5ea5a29b4595da972c7e7c068490d770517f9d1c
                                                  • Opcode Fuzzy Hash: 423033ad9a26eeb1fe2838e88a30b5d5e8e126e9df3eade86433f6e59bd70d34
                                                  • Instruction Fuzzy Hash: 23116A31714A8086E7628B57E8543A9A7A0FB9CFE4F444228FF5A87BA4DF7CC9458740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$CompareInfoString
                                                  • String ID:
                                                  • API String ID: 2984826149-0
                                                  • Opcode ID: a1f78f492e3696b6019f48ed1e7001af74d1872a9e55038d413a28a56ba35231
                                                  • Instruction ID: bcf1b6b93dcecc1946cad78135b827772f34e8b074e1d02fcb1409f9e20e2999
                                                  • Opcode Fuzzy Hash: a1f78f492e3696b6019f48ed1e7001af74d1872a9e55038d413a28a56ba35231
                                                  • Instruction Fuzzy Hash: D5A1C172210A8086FB329FA6D4547ED77A1E74CBE8F584621FB690B7E5EB78C9458300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiStringWide
                                                  • String ID:
                                                  • API String ID: 2829165498-0
                                                  • Opcode ID: 270ae4f9d9f08dcff0b9067bef15d1f35fc8560d5ec39fb7ed6a8b55e081ca3d
                                                  • Instruction ID: 3cae8b1818a4245b37a95ea3dbb25334b2cbdcdea68dea16613d2c78e82ac99f
                                                  • Opcode Fuzzy Hash: 270ae4f9d9f08dcff0b9067bef15d1f35fc8560d5ec39fb7ed6a8b55e081ca3d
                                                  • Instruction Fuzzy Hash: 8D81B172200B4087EB22CF66E4407A9B7E5FB58BE8F144625FB5A47BE8DFB8C5458700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: cdce36b549f9a139a57fc9ed1dc92bc6bf26bb61d742b9d05d56d54ff17284a9
                                                  • Instruction ID: 1d4139813600b4928fe05de513d8c91a672c6bd4c6413c1d6dc083dce2f2dfb8
                                                  • Opcode Fuzzy Hash: cdce36b549f9a139a57fc9ed1dc92bc6bf26bb61d742b9d05d56d54ff17284a9
                                                  • Instruction Fuzzy Hash: 0D516177105A84C6FB639F36E4903FD7B91B74ABC4F588011E7C8473A6CA398946D702
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                  • String ID: csm$csm$csm
                                                  • API String ID: 3523768491-393685449
                                                  • Opcode ID: 9f4e64e61b5b2eeaf6a6c9105b8820c6d72dd74f9dd23350b1755da3e83c2826
                                                  • Instruction ID: 151a497a614de7a2d148bc646ebc8b93af069f99db54679d45a2247bfb3a51cc
                                                  • Opcode Fuzzy Hash: 9f4e64e61b5b2eeaf6a6c9105b8820c6d72dd74f9dd23350b1755da3e83c2826
                                                  • Instruction Fuzzy Hash: 95E17D73504B808AE722DFA6D4813ED7BB0F759B98F144216EF89577A6DB34D582CB00
                                                  APIs
                                                  • GetLastError.KERNEL32 ref: 0000000140098933
                                                  • FlsSetValue.KERNEL32(?,?,-2723E8D8DEBC5093,0000000140093731,?,?,?,?,000000014009BCBC), ref: 0000000140098969
                                                  • FlsSetValue.KERNEL32(?,?,-2723E8D8DEBC5093,0000000140093731,?,?,?,?,000000014009BCBC), ref: 0000000140098996
                                                  • FlsSetValue.KERNEL32(?,?,-2723E8D8DEBC5093,0000000140093731,?,?,?,?,000000014009BCBC), ref: 00000001400989A7
                                                  • FlsSetValue.KERNEL32(?,?,-2723E8D8DEBC5093,0000000140093731,?,?,?,?,000000014009BCBC), ref: 00000001400989B8
                                                  • SetLastError.KERNEL32 ref: 00000001400989D3
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: edb01e077f2569079692cbdca2a01a9a7407672766c19d691501073eb6422a11
                                                  • Instruction ID: 7761718c07057579b4a836c862f773882c17a7b063c5f03bbeab8f09a7883271
                                                  • Opcode Fuzzy Hash: edb01e077f2569079692cbdca2a01a9a7407672766c19d691501073eb6422a11
                                                  • Instruction Fuzzy Hash: 91117F7071824042FA67A32756927FE62929B4C7F0F084728BF76577F6DE38C4528B02
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID: MZx
                                                  • API String ID: 2718003287-2575928145
                                                  • Opcode ID: 56001a688be59e779d38c89167cf0233533a9f369d0b07dbb42eba76e8af94f0
                                                  • Instruction ID: d1c8cf039d274e1fe3774f28fc69a65805f06740cf5de206c350a0af52060462
                                                  • Opcode Fuzzy Hash: 56001a688be59e779d38c89167cf0233533a9f369d0b07dbb42eba76e8af94f0
                                                  • Instruction Fuzzy Hash: C8D13936B08A4289E712DF7AD4803BCB771FB54B98B814236DE9D97B89DE38D406C711
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_exception_destroy$ApisFile__std_fs_code_page
                                                  • String ID: ", "$: "
                                                  • API String ID: 741338541-747220369
                                                  • Opcode ID: 7236c7701d50e5aacc4dcf5dcf6662693d96fc61544f264361e5dd32f6629178
                                                  • Instruction ID: 2fc4354da3f7ac5633768660396deded93c7b25156e114866fa5e57279866451
                                                  • Opcode Fuzzy Hash: 7236c7701d50e5aacc4dcf5dcf6662693d96fc61544f264361e5dd32f6629178
                                                  • Instruction Fuzzy Hash: 23B1AD72700A8096EB01EF66E0843ED3361E759BC8F508526EF5D17BAADF78C895C384
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 56dec27a48c382bae8c9dbc998320d3297bdff6e0d22f776c03b946996f6de0c
                                                  • Instruction ID: c6d8d84720fd6ae2f1313f65956cbb14b16d02e5e04c1e425e315cbc5edd905b
                                                  • Opcode Fuzzy Hash: 56dec27a48c382bae8c9dbc998320d3297bdff6e0d22f776c03b946996f6de0c
                                                  • Instruction Fuzzy Hash: AFF06865A1960681EF206F35F4543799360EF85F61FD41237C56D851E8DF3CD048C322
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: be92eb9bbaaa625829bc9471fb326967c68e4fbed633ca4a062594c979a01ac3
                                                  • Instruction ID: ac3b12a74c1955f63a223aafc9c7af301689ef38f5382d6585260c25f0642c2f
                                                  • Opcode Fuzzy Hash: be92eb9bbaaa625829bc9471fb326967c68e4fbed633ca4a062594c979a01ac3
                                                  • Instruction Fuzzy Hash: ADF06271301B0592FB158B66E84439E5360AF9D7E1F541315F765472F8DF3CC1868710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AdjustPointer
                                                  • String ID:
                                                  • API String ID: 1740715915-0
                                                  • Opcode ID: 3f39c1b9ed79e73c84211ab22038048c5d1c6819f99b6ac50b6bfdd9f9c1b3ec
                                                  • Instruction ID: e8579fd3734454176f596904cbd10330809381039630ccf5f49c986ac4bd2f62
                                                  • Opcode Fuzzy Hash: 3f39c1b9ed79e73c84211ab22038048c5d1c6819f99b6ac50b6bfdd9f9c1b3ec
                                                  • Instruction Fuzzy Hash: 29B19332201A8485EA67DF93D1807F967A1EB6CBD4F198626BF49077B5DB74C4C2EB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 9c3edce3a00c59cfada856729e56e09c68419cddf2c103ca818f489642505782
                                                  • Instruction ID: 932a995cfb9503593ddab9fc7f713a1ab8e6f93bff8132766f35255785ab954d
                                                  • Opcode Fuzzy Hash: 9c3edce3a00c59cfada856729e56e09c68419cddf2c103ca818f489642505782
                                                  • Instruction Fuzzy Hash: 2481D232604A4886F7778F37E9503FA66A1EB5D7D8F148301BF5A275F5D734C982AA00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: 52608bc6d143c9dc7bfa0a8c4855f078bb6d55b13afd5a83babe45fd19c9ed63
                                                  • Instruction ID: 7a05c3dbcfdc48c25ebeef28d2c14fb46630c93b3759fd792914f038a7c82263
                                                  • Opcode Fuzzy Hash: 52608bc6d143c9dc7bfa0a8c4855f078bb6d55b13afd5a83babe45fd19c9ed63
                                                  • Instruction Fuzzy Hash: 2E1121AAE18A0305FE943D76E5D9375D2406F953B0E9C0E76E9EE062D68E7CFC404126
                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,00000001400967B7,?,?,00000000,0000000140096A52,?,?,?,?,-2723E8D8DEBC5093,00000001400969DE), ref: 0000000140098A0B
                                                  • FlsSetValue.KERNEL32(?,?,?,00000001400967B7,?,?,00000000,0000000140096A52,?,?,?,?,-2723E8D8DEBC5093,00000001400969DE), ref: 0000000140098A2A
                                                  • FlsSetValue.KERNEL32(?,?,?,00000001400967B7,?,?,00000000,0000000140096A52,?,?,?,?,-2723E8D8DEBC5093,00000001400969DE), ref: 0000000140098A52
                                                  • FlsSetValue.KERNEL32(?,?,?,00000001400967B7,?,?,00000000,0000000140096A52,?,?,?,?,-2723E8D8DEBC5093,00000001400969DE), ref: 0000000140098A63
                                                  • FlsSetValue.KERNEL32(?,?,?,00000001400967B7,?,?,00000000,0000000140096A52,?,?,?,?,-2723E8D8DEBC5093,00000001400969DE), ref: 0000000140098A74
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: e352fa2ba264ddbbfa8a83f13ad18c47375a7d3919fb80aa5095cfa037bd6b32
                                                  • Instruction ID: 5562d8217f5fbb2e2b042148076d670c8644ef2b037ad8581d2eb7d4cbc5fe19
                                                  • Opcode Fuzzy Hash: e352fa2ba264ddbbfa8a83f13ad18c47375a7d3919fb80aa5095cfa037bd6b32
                                                  • Instruction Fuzzy Hash: 6C118670B1824042FA6A572756527EA12815B4C7F0F485729BF3A577F6DE38C4524702
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: fef79bcd01217ff1732ce6d7f5bbbbb61dca6c16b20e38246b54353a88e43eaf
                                                  • Instruction ID: 135bf7c654784475f414f90b50b8b4482b0a63263d3d079bdd787230d7cce6e6
                                                  • Opcode Fuzzy Hash: fef79bcd01217ff1732ce6d7f5bbbbb61dca6c16b20e38246b54353a88e43eaf
                                                  • Instruction Fuzzy Hash: 53113D58F0C20341FA5A7B276991379D2525F44FA0EC8573AD8AE57AD6DE3CA8418222
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: aeac32c67af560e7dd41213ee240f8e898738199f89f2047ccf14657de905ef3
                                                  • Instruction ID: cd125b27746cb6ac91a5f66ffa739dc1054c97539802566e512f256013ea258b
                                                  • Opcode Fuzzy Hash: aeac32c67af560e7dd41213ee240f8e898738199f89f2047ccf14657de905ef3
                                                  • Instruction Fuzzy Hash: F21129B060820542FA7BA33758967FA12824B4C7F4F5C5728BF365B3F2DE3898524B52
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$GetcollLocinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name
                                                  • API String ID: 1287851536-1405518554
                                                  • Opcode ID: fab0e095f8c7ed654faf4468b22ec1401334c6b8314a09414ceb4f5f9351b23d
                                                  • Instruction ID: 05c14c64210617226be52844fee93a87bdf04712ef8590b9b58c4d55bb14e304
                                                  • Opcode Fuzzy Hash: fab0e095f8c7ed654faf4468b22ec1401334c6b8314a09414ceb4f5f9351b23d
                                                  • Instruction Fuzzy Hash: FD918C72701B408AFB16DFB6D4503ED3362EB48BC8F444526EF5917AA9DE78C4A5C384
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                  • API String ID: 3215553584-1196891531
                                                  • Opcode ID: 9e2d0ea007b7d59ffb8b8322be5f141d45b6f7305a3d4721c3becb03152af675
                                                  • Instruction ID: a7f85e871348f964b5b2985e56f5b2cb913dc045045e7003f2b8ca248ccae572
                                                  • Opcode Fuzzy Hash: 9e2d0ea007b7d59ffb8b8322be5f141d45b6f7305a3d4721c3becb03152af675
                                                  • Instruction Fuzzy Hash: FB818C72604A41C5FB678FAB82507E9FBB0E319BC8F568017EB06576F5E339C8419706
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: ff7130a31c3838eae5dc4e9040a01fbf81571be333e3600a34bda6294f9903e2
                                                  • Instruction ID: 5ffffaaada14817aa3187c5423479fd319e85f9884be44b803de71811ffbdc7c
                                                  • Opcode Fuzzy Hash: ff7130a31c3838eae5dc4e9040a01fbf81571be333e3600a34bda6294f9903e2
                                                  • Instruction Fuzzy Hash: 4C916B73614B808AE712DFA6E8803DD7BB0F3497C8F54421AEB8957769DB38C1A5CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2395640692-1018135373
                                                  • Opcode ID: b8fdca9cded4bbb6aa06f1f5ade378c1037bc301aacae7e2f84c1045c81e75ca
                                                  • Instruction ID: 4cd7bee9a26cc419e8b81d2986580f1948a8901570d81832d37b3b683d29d3e3
                                                  • Opcode Fuzzy Hash: b8fdca9cded4bbb6aa06f1f5ade378c1037bc301aacae7e2f84c1045c81e75ca
                                                  • Instruction Fuzzy Hash: 5C51D33AB196038ADB15EF16E484B7DB391EB44F88F958172DA8A43748DF3CE841C711
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: 67d3760316c7ac8e6f5febe830b8f7d34bf4c5dbdb36519f52684cd6ad08a349
                                                  • Instruction ID: 9f0466f866ee4ff427f77e06671de2da4f11fe575c64fa0ace73db801e6d04ac
                                                  • Opcode Fuzzy Hash: 67d3760316c7ac8e6f5febe830b8f7d34bf4c5dbdb36519f52684cd6ad08a349
                                                  • Instruction Fuzzy Hash: A1618D3AD0828786EB66AF13948437CB6E1BB54F84F944136EADC47A91CF3CE450C792
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 8256bd98bb7a5e1e5654349a1a6cf87bcda44b3a148a411127153f0ac98a1ecd
                                                  • Instruction ID: 2e7da2e513639e17fbf96c73367f028812467a1694eb269069ac0658dd49409e
                                                  • Opcode Fuzzy Hash: 8256bd98bb7a5e1e5654349a1a6cf87bcda44b3a148a411127153f0ac98a1ecd
                                                  • Instruction Fuzzy Hash: D8618236908B8681D721AF26E4807A9B7A0FB85B84F444226EBDC07B99DF7CD190CB11
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 3896166516-3733052814
                                                  • Opcode ID: 095a41cf6f88e6130bf65bc0ed5de3fd02173d0230e8279c947ec4f4a2f09324
                                                  • Instruction ID: 09f6dde7808521b70217c70a336bd6f0befd6cb2b189c9e0ff49262e5f14330a
                                                  • Opcode Fuzzy Hash: 095a41cf6f88e6130bf65bc0ed5de3fd02173d0230e8279c947ec4f4a2f09324
                                                  • Instruction Fuzzy Hash: 3E517F72600B80CAEB758F93A4443D877B4E798BD4F984225EB5A47BA9CB34C491CB01
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CallEncodePointerTranslator
                                                  • String ID: MOC$RCC
                                                  • API String ID: 3544855599-2084237596
                                                  • Opcode ID: 07992d41df9ad80eb188af37fb9b0e6db73788ea83bdb0dcdeea906dcb818229
                                                  • Instruction ID: 17eb707fb36a4e926c94bb033cda9fe31027dfba4c2e9a3a8a32eca6d0b63af4
                                                  • Opcode Fuzzy Hash: 07992d41df9ad80eb188af37fb9b0e6db73788ea83bdb0dcdeea906dcb818229
                                                  • Instruction Fuzzy Hash: 68617C32608BC486EB72DF56E4403EAB7A0F799BD4F044615FB9907BA9DB78D194CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_exception_destroy
                                                  • String ID: at line $, column
                                                  • API String ID: 2453523683-191570568
                                                  • Opcode ID: ea0931f80faea3a1458766356af7855d0ac9163cdf1165e6ea0833dd366c92db
                                                  • Instruction ID: 914463d450a43cb4f7ea3de808729a8ac489e12741d6c37c1533c495ea6b9385
                                                  • Opcode Fuzzy Hash: ea0931f80faea3a1458766356af7855d0ac9163cdf1165e6ea0833dd366c92db
                                                  • Instruction Fuzzy Hash: 0151A37260478081EA11DB2BE5803AE7761F78DBD4F504225FBA907BEADF78C891C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$GetctypeLocinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name
                                                  • API String ID: 1612978173-1405518554
                                                  • Opcode ID: 0fdf44e750821479e315e268955e66de4311686768919f7e860fce24ecb21b9a
                                                  • Instruction ID: 5692f8161d49c62ceb7944d53b891567dd2b94ab8c399e88a064e650bba4c44d
                                                  • Opcode Fuzzy Hash: 0fdf44e750821479e315e268955e66de4311686768919f7e860fce24ecb21b9a
                                                  • Instruction Fuzzy Hash: D8514936711B408AEB16DFB2D4913ED33B5EB48788F444429EF8927AA5DF34CA25D344
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID: ?
                                                  • API String ID: 71445658-1684325040
                                                  • Opcode ID: fac0b721db4333e5878d97004158c7f0cb9c596c5e158db9a56ab25e623e2ca1
                                                  • Instruction ID: 54d39e097882213c5b733bf086f40d23d8995db644f53b8c5f5849c5aff69d53
                                                  • Opcode Fuzzy Hash: fac0b721db4333e5878d97004158c7f0cb9c596c5e158db9a56ab25e623e2ca1
                                                  • Instruction Fuzzy Hash: 31418072618B8082EB51DB26F4803AEB7A0F7D97D4F105215FB9943AA9DF7CC194CB44
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                  • String ID: MZx
                                                  • API String ID: 3251591375-2575928145
                                                  • Opcode ID: 541ff40e58d353be9d847ea1bee9263a9859c2f33cd014f189e106e5bf34516c
                                                  • Instruction ID: c26e7b45bed8017d571ed8a4885d80ce25704a09cb27f8fc6661146242a51dc6
                                                  • Opcode Fuzzy Hash: 541ff40e58d353be9d847ea1bee9263a9859c2f33cd014f189e106e5bf34516c
                                                  • Instruction Fuzzy Hash: A2319E29A0C25342FA16BF27A4A23B9A2919F41B44FC45437E98E473D7DE3DA8048773
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: GetTempPath2W$kernel32.dll
                                                  • API String ID: 1646373207-1846531799
                                                  • Opcode ID: aba5ed2ee6ba4ce48385ce636e4a4acb6d4aac54e4449c193f436a8d268e96e8
                                                  • Instruction ID: 7945943dde90ce79e9ea268502fb856af871c4c7814340627f58557ecb3581ff
                                                  • Opcode Fuzzy Hash: aba5ed2ee6ba4ce48385ce636e4a4acb6d4aac54e4449c193f436a8d268e96e8
                                                  • Instruction Fuzzy Hash: 48E01AB1710A4592EE069B12F9883AD6361FF8CBC1F889029EA0E07338DE3CC446C710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process32$CloseHandleImpersonateLoggedNextOpenProcessUser$CreateFirstRevertSelfSnapshotTokenToolhelp32
                                                  • String ID:
                                                  • API String ID: 1562318730-0
                                                  • Opcode ID: 78111f010a6ea5b5ae6ae8d162778a791ededbfc55de02017354f219b5f97645
                                                  • Instruction ID: 725f3c8a4bb51d22fdc93160e2ff128e938ee97f23015ef30f5c7d66809f76c4
                                                  • Opcode Fuzzy Hash: 78111f010a6ea5b5ae6ae8d162778a791ededbfc55de02017354f219b5f97645
                                                  • Instruction Fuzzy Hash: D0227CB2B14B8086FB02DB6AD4543DD2761E79A7E4F505215FBAD07AEADB78C480D700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 0f4573ad5ab6b01d73635eec7536a5d729b1e7ad683b81b449e6e28c999a8dea
                                                  • Instruction ID: c74fe89f61bfa30f28c8e94184cb44ca258f1dcc1b28fecb56b8b96372769064
                                                  • Opcode Fuzzy Hash: 0f4573ad5ab6b01d73635eec7536a5d729b1e7ad683b81b449e6e28c999a8dea
                                                  • Instruction Fuzzy Hash: AAD1E072B14A8489E712CFBAD5403EC37B1F358BE8F544216EF5A97BA9DA38C506C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: a8be48e25dcd1c4f8a4168961d870eb76e92b48431727c0765876aa17b118fd9
                                                  • Instruction ID: 430cb94ec275b1b006606032aa0a0ac97a79295e9cf0530a9309411366c7b0e5
                                                  • Opcode Fuzzy Hash: a8be48e25dcd1c4f8a4168961d870eb76e92b48431727c0765876aa17b118fd9
                                                  • Instruction Fuzzy Hash: 85919F72710A9085FB629F6796803ED2BA4B74DBE8F544109EF4A67BA5DB38C482C701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: 60a411c71040640233f3d61c6a9d19a4bd584ca0be3b067abe8c2bac933effdd
                                                  • Instruction ID: 87614b44d38542f14f75cb2792130d7ba5be830d49dae15ef5b7799370aa2660
                                                  • Opcode Fuzzy Hash: 60a411c71040640233f3d61c6a9d19a4bd584ca0be3b067abe8c2bac933effdd
                                                  • Instruction Fuzzy Hash: EA91E736E0865385F752EF6A94C03BDABA0BB14F88F95413ADE8E53684DF38D441C722
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: AdjustPointer
                                                  • String ID:
                                                  • API String ID: 1740715915-0
                                                  • Opcode ID: 25fc134e6c63f0dacb96735037029e45b4d702db581d39d025ef25b43ec03c5f
                                                  • Instruction ID: e96cf7c03c3ff926b32b2f96160c8c1469c34fe3cbf8ddb91e53704026a04f87
                                                  • Opcode Fuzzy Hash: 25fc134e6c63f0dacb96735037029e45b4d702db581d39d025ef25b43ec03c5f
                                                  • Instruction Fuzzy Hash: 99718269E0A64381EE66AE2395C077CA2D4FF44F80F894877DA8D07685DE3CE44583A3
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnvironmentInitStringStringsUnicode$Free
                                                  • String ID:
                                                  • API String ID: 2488768755-0
                                                  • Opcode ID: 03050de4473a7036840b3f814e3b1606e0f3ac0b841f86a6d84b765ac0863df6
                                                  • Instruction ID: 249d8477ed98fc917396095c4ed7d3802801dfc0ba70534cb905eba45bdc7ad3
                                                  • Opcode Fuzzy Hash: 03050de4473a7036840b3f814e3b1606e0f3ac0b841f86a6d84b765ac0863df6
                                                  • Instruction Fuzzy Hash: 25519A72A14B8082EB228F16E44039D7361FB98BD4F549215EF9D03BA6DF78D6E1C704
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_RegisterSetgloballocalestd::locale::_
                                                  • String ID:
                                                  • API String ID: 3698853521-0
                                                  • Opcode ID: eed450fc87f7b90693e9453fe6d78228114555bdcea7261450a71dd83f0eb7c1
                                                  • Instruction ID: 236d6389257f28c7c4492d83038e332ebcfbc23cf179b41e14085838a707cd19
                                                  • Opcode Fuzzy Hash: eed450fc87f7b90693e9453fe6d78228114555bdcea7261450a71dd83f0eb7c1
                                                  • Instruction Fuzzy Hash: F8412732224B4081EB56DB56E8843DA73A4F78DBD4F595622BB9E07BB9DF38C442C704
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 86078050b35c3d83f66a5f3c361acaaa1e6b6eb617984a3c991cabd19b075f59
                                                  • Instruction ID: ffa9c572a7e4a5e066940d6fcd93473eef70c18ca386996d5ac19e9d5ffa0d93
                                                  • Opcode Fuzzy Hash: 86078050b35c3d83f66a5f3c361acaaa1e6b6eb617984a3c991cabd19b075f59
                                                  • Instruction Fuzzy Hash: 0A413A77504A848AEB639F36D4103ED7BA0F749FC4F49C052EB88473A7DA398945DB12
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                                  • String ID:
                                                  • API String ID: 1168246061-0
                                                  • Opcode ID: 9372afe047aa4cc0eae63c1b6c1241976da657e1e17b1950321beacb823c7ea0
                                                  • Instruction ID: a4e2e4869f216a93c3555fe410e8c924b94c3ccb6d48aa5672fd74940a3f9b6e
                                                  • Opcode Fuzzy Hash: 9372afe047aa4cc0eae63c1b6c1241976da657e1e17b1950321beacb823c7ea0
                                                  • Instruction Fuzzy Hash: CB414A32214B4081FB16DF67E4403D96760F78DBE8F591626AB8E477B5EE38C482CB15
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                                  • String ID:
                                                  • API String ID: 1168246061-0
                                                  • Opcode ID: f43f1546969bcc0bc2afbc257653b84f1bc5d930af1f407b475991def0315af4
                                                  • Instruction ID: 84f0272817a06c5c3477c8b36134a0f56f515ea9523122fac0f48a6a6587710e
                                                  • Opcode Fuzzy Hash: f43f1546969bcc0bc2afbc257653b84f1bc5d930af1f407b475991def0315af4
                                                  • Instruction Fuzzy Hash: 03413A32214A4085FB26DF67E9803D96764F78DBE8F581621AB8E47BB5DF3CC4428700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                                  • String ID:
                                                  • API String ID: 1168246061-0
                                                  • Opcode ID: d3fce6e4a644a7405e72c1ab96fc402567e2800d73aaf2439b09d84a5f1f45ee
                                                  • Instruction ID: 16fa0f5e4538a510978ef81ad45d7d3382f56bc736d23ff421205b4c4ce0a84b
                                                  • Opcode Fuzzy Hash: d3fce6e4a644a7405e72c1ab96fc402567e2800d73aaf2439b09d84a5f1f45ee
                                                  • Instruction Fuzzy Hash: 49415836215A4081FA26DF57E4403D9B7A0F79CBE4F591622BB9E477F9DE38C4828704
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharErrorLastMultiWide
                                                  • String ID:
                                                  • API String ID: 203985260-0
                                                  • Opcode ID: 632c629cd5f3082fb104fc700d54a245379ea41028df2d6bfc62e537c178c61a
                                                  • Instruction ID: 732770dae735fb1ee09a7bed1d2b51e1158dd485e33b6057137ecc77f848afbf
                                                  • Opcode Fuzzy Hash: 632c629cd5f3082fb104fc700d54a245379ea41028df2d6bfc62e537c178c61a
                                                  • Instruction Fuzzy Hash: 61215C76614B8587E7218F17E44435EBAB4F79DBC4F244129EB8993B69DB38C8018B00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Handle$AddressAttributesCloseErrorFeatureFileLastModulePresentProcProcessor__std_fs_open_handle
                                                  • String ID:
                                                  • API String ID: 156590933-0
                                                  • Opcode ID: b1371cc999af6c120738bad54607841319b72b2770334362f7f3709bf50731cc
                                                  • Instruction ID: 299d0bcef7e4c936e736a2796c6b4b3e96ec945ce56f71dcb84488a010b228e1
                                                  • Opcode Fuzzy Hash: b1371cc999af6c120738bad54607841319b72b2770334362f7f3709bf50731cc
                                                  • Instruction Fuzzy Hash: CD118635218A4045EB565FABE4843BA6671E74E7F0F105614FB7747AF5DA3DC4418B00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 1ef9cfd6a28bfbf257edefedf7c8203de68038772214ee7f848650bd26ef0748
                                                  • Instruction ID: 5f7e12e76bee5f0e6e3dedb7664e20730f3461ac4a07ab1e8a2c9a0807655ffc
                                                  • Opcode Fuzzy Hash: 1ef9cfd6a28bfbf257edefedf7c8203de68038772214ee7f848650bd26ef0748
                                                  • Instruction Fuzzy Hash: E2114F22B14B0589EF009F60F8643B873A4F758B58F841A32DA6D87758EF78D1558350
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 994afb034ad63c778ea227749b14eccab6c02e75851fdf0a55821c6d844240c7
                                                  • Instruction ID: 2d033e041bdf3d7227269b0f70d14b42616edc8a7a419766452458ae47f0e022
                                                  • Opcode Fuzzy Hash: 994afb034ad63c778ea227749b14eccab6c02e75851fdf0a55821c6d844240c7
                                                  • Instruction Fuzzy Hash: 5011FA36710F008AEB01CFA1E8553A833A4F75DB68F441E25EB6D477A4DF78C1A58350
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: [json.exception.
                                                  • API String ID: 0-791563284
                                                  • Opcode ID: 5c87c9bb96a017de208679fcf324a245d5c2211a00183e68301472191dddbe2a
                                                  • Instruction ID: 6b50a091b2802ad2945aeadc0d55fe758afa20c7301277ed6e57d09efbd5c6ee
                                                  • Opcode Fuzzy Hash: 5c87c9bb96a017de208679fcf324a245d5c2211a00183e68301472191dddbe2a
                                                  • Instruction Fuzzy Hash: FC71E272F10B9085FB01CB7AE8413DD67A1E799BD4F644226EF5917BAADB78C482C340
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __except_validate_context_record
                                                  • String ID: csm$csm
                                                  • API String ID: 1467352782-3733052814
                                                  • Opcode ID: d612173bfaa8a2380fe5b48d2d485991192f6fc7e1eabacda55b96e47468999e
                                                  • Instruction ID: 732827d43b81279fc09f351b0f2266c69a4f1640728df4e45fd91df2211a6454
                                                  • Opcode Fuzzy Hash: d612173bfaa8a2380fe5b48d2d485991192f6fc7e1eabacda55b96e47468999e
                                                  • Instruction Fuzzy Hash: 80718176204AC086EB628F66D4507ED7BB0F788BC5F548216FF8857AADCB38C591CB41
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unwind__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2208346422-1018135373
                                                  • Opcode ID: 66bbef8c19356e990cfb8f89928e01c6fdd1ce5aed4229e3d09978b89fbc63e4
                                                  • Instruction ID: 89e5e8f779c4e8b204e1a98a4adc9b963e8ad9f1d18d37424198852836f041da
                                                  • Opcode Fuzzy Hash: 66bbef8c19356e990cfb8f89928e01c6fdd1ce5aed4229e3d09978b89fbc63e4
                                                  • Instruction Fuzzy Hash: 2051E6363116018AEB55CF96E044BBC33A5F76CBD8F508221FB5A477A8DB79C981DB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name
                                                  • API String ID: 3988782225-1405518554
                                                  • Opcode ID: 28d15cfe3afaff4e70186dc69545f2dcaf145971d976bdeeb826c8756c6efb46
                                                  • Instruction ID: 808e80a19e9a8367672ecaf7a1c34fe7cc6f7304543fb875a4e8aeb018317e5d
                                                  • Opcode Fuzzy Hash: 28d15cfe3afaff4e70186dc69545f2dcaf145971d976bdeeb826c8756c6efb46
                                                  • Instruction Fuzzy Hash: F2518C32711A0089FB16EFB2D4913ED33B5EB88B88F484425FF4967AA5DE39C925C344
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name
                                                  • API String ID: 3988782225-1405518554
                                                  • Opcode ID: 53b0fcf59b7055776f2f4b1ce98978138a0590209bea8aaf15bd716caedf58d6
                                                  • Instruction ID: 1c6d693c5901f9d80c69387f4c3a86c5155362670e00a8e852182763da2cabe9
                                                  • Opcode Fuzzy Hash: 53b0fcf59b7055776f2f4b1ce98978138a0590209bea8aaf15bd716caedf58d6
                                                  • Instruction Fuzzy Hash: EE514B32302B4089EB16DFB2D4903EC33B5EB58788F454535FB4967AA5DE34C965D348
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _get_daylight$_invalid_parameter_noinfo
                                                  • String ID: ?
                                                  • API String ID: 1286766494-1684325040
                                                  • Opcode ID: 22609105de1f0d9301de2f8044ec8bdf8c9c884c101727823ff363954f5f8222
                                                  • Instruction ID: f30818a0088620f31da01904ea9adbefb6569b303ba16c750db778e40d9abdaf
                                                  • Opcode Fuzzy Hash: 22609105de1f0d9301de2f8044ec8bdf8c9c884c101727823ff363954f5f8222
                                                  • Instruction Fuzzy Hash: 9041E33261478046FB669B27E5113EE6AA0E7E8BE4F144325BF9847AF5DB38C4C18F00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFrameInfo__except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 2558813199-1018135373
                                                  • Opcode ID: 30dd612b4e4b9212e9166655247be16b5f23695bfc4863c6a6ebc2986465c29c
                                                  • Instruction ID: 3dac7b5d3b0d881bcd455e3888886abadacebbcbcc28f580a094f6440ece58b6
                                                  • Opcode Fuzzy Hash: 30dd612b4e4b9212e9166655247be16b5f23695bfc4863c6a6ebc2986465c29c
                                                  • Instruction Fuzzy Hash: AB510677615B4086E661AF66E4403AE77B4F38DBD0F540225AF890BB66CF38D4A2CB00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 4a2143aea001407eb2cc82c9df801d17e9c15ad72bb50a2a20f8f3de8da8662b
                                                  • Instruction ID: 89ead30a20bd16dcceb0d53b747a976d3c97590e3f83350b03132f3d9b215ecd
                                                  • Opcode Fuzzy Hash: 4a2143aea001407eb2cc82c9df801d17e9c15ad72bb50a2a20f8f3de8da8662b
                                                  • Instruction Fuzzy Hash: CA41C72271868685DB21DF2AE4847B9B7A0F798F94F814032EE8D87748EF3CD441C751
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFileLastWrite
                                                  • String ID: U
                                                  • API String ID: 442123175-4171548499
                                                  • Opcode ID: 7b6b0220355e4baf3ced440fd77bc49a04f673044c496e04ac13764c72edacc7
                                                  • Instruction ID: e6320d284cb9a528543140e404914897430357409d217e9d910f130c428e9124
                                                  • Opcode Fuzzy Hash: 7b6b0220355e4baf3ced440fd77bc49a04f673044c496e04ac13764c72edacc7
                                                  • Instruction Fuzzy Hash: 44419F72214A8082DB219F26E4443EA77A1F798BD4F414121EF4D877A8EB7CC441CB40
                                                  APIs
                                                  • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E4E34E57), ref: 00007FF7E4E35A30
                                                  • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7E4E34E57), ref: 00007FF7E4E35A71
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1830732038.00007FF7E4E31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7E4E30000, based on PE: true
                                                  • Associated: 00000001.00000002.1830706817.00007FF7E4E30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E4E43000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830763235.00007FF7E5147000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830968491.00007FF7E514D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E514F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1830995182.00007FF7E5152000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000001.00000002.1831051325.00007FF7E5154000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_7ff7e4e30000_Loader.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 967fbbe814c9c1e701ed63cdd0d532d980ddcea8b093fe1b68fbd27a0b08e2d1
                                                  • Instruction ID: 61329c0a98d5c637fec39467c87a442690352db6dfe335f04bcf1c09a643fd24
                                                  • Opcode Fuzzy Hash: 967fbbe814c9c1e701ed63cdd0d532d980ddcea8b093fe1b68fbd27a0b08e2d1
                                                  • Instruction Fuzzy Hash: 9A114936619B8582EB219F15F490269B7E5FB88F84F984232DECC47758DF3CD5518B00
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.1829282890.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_140000000_Loader.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: 8fa98aa95e9aae2a90a459b42b1f704c9c51d3f3bc5b4355a873c03fa23ea9e8
                                                  • Instruction ID: 2cd2fca06ac07b3d24a383fcaf9b1e00f30e6730416406c57118f0930f6fa0f4
                                                  • Opcode Fuzzy Hash: 8fa98aa95e9aae2a90a459b42b1f704c9c51d3f3bc5b4355a873c03fa23ea9e8
                                                  • Instruction Fuzzy Hash: 8011D736219B8082EB628F26E44039D77E5FB98BD4F584225EB8D07768DF3CC5918B40